必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 19.131.205.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21705
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;19.131.205.214.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121100 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 11 22:31:12 CST 2024
;; MSG SIZE  rcvd: 107
HOST信息:
Host 214.205.131.19.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.205.131.19.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
124.154.103.82 attack
 TCP (SYN) 124.154.103.82:17954 -> port 80, len 44
2020-08-06 08:42:03
58.221.204.114 attackspam
Aug  5 23:45:26 vps1 sshd[17131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.221.204.114  user=root
Aug  5 23:45:28 vps1 sshd[17131]: Failed password for invalid user root from 58.221.204.114 port 35546 ssh2
Aug  5 23:48:16 vps1 sshd[17178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.221.204.114  user=root
Aug  5 23:48:17 vps1 sshd[17178]: Failed password for invalid user root from 58.221.204.114 port 48556 ssh2
Aug  5 23:50:58 vps1 sshd[17238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.221.204.114  user=root
Aug  5 23:51:01 vps1 sshd[17238]: Failed password for invalid user root from 58.221.204.114 port 33336 ssh2
...
2020-08-06 08:31:12
192.144.172.50 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-05T20:23:41Z and 2020-08-05T20:35:57Z
2020-08-06 08:43:44
178.33.216.187 attackspambots
Aug  6 00:01:05 cosmoit sshd[31779]: Failed password for root from 178.33.216.187 port 47893 ssh2
2020-08-06 08:31:40
194.26.29.14 attackspambots
Aug  6 02:42:58 debian-2gb-nbg1-2 kernel: \[18933036.463620\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.14 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=24562 PROTO=TCP SPT=59938 DPT=3208 WINDOW=1024 RES=0x00 SYN URGP=0
2020-08-06 08:50:42
106.12.100.206 attack
Aug  5 21:32:35 ajax sshd[11335]: Failed password for root from 106.12.100.206 port 54598 ssh2
2020-08-06 08:28:13
222.92.38.182 attackspambots
IDS multiserver
2020-08-06 08:20:54
37.204.193.209 attackspambots
Fail2Ban Ban Triggered
2020-08-06 08:21:10
51.255.197.164 attack
fail2ban detected brute force on sshd
2020-08-06 08:52:19
219.133.71.26 attackspam
Aug  5 22:33:00 Ubuntu-1404-trusty-64-minimal sshd\[15554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.133.71.26  user=root
Aug  5 22:33:02 Ubuntu-1404-trusty-64-minimal sshd\[15554\]: Failed password for root from 219.133.71.26 port 39508 ssh2
Aug  5 22:34:23 Ubuntu-1404-trusty-64-minimal sshd\[15990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.133.71.26  user=root
Aug  5 22:34:24 Ubuntu-1404-trusty-64-minimal sshd\[15990\]: Failed password for root from 219.133.71.26 port 51550 ssh2
Aug  5 22:35:49 Ubuntu-1404-trusty-64-minimal sshd\[16415\]: Invalid user com from 219.133.71.26
Aug  5 22:35:49 Ubuntu-1404-trusty-64-minimal sshd\[16415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.133.71.26
2020-08-06 08:46:29
110.49.70.240 attackbotsspam
Aug  6 00:16:44 server sshd[14332]: Failed password for root from 110.49.70.240 port 43801 ssh2
Aug  6 00:30:36 server sshd[19161]: Failed password for root from 110.49.70.240 port 35034 ssh2
Aug  6 00:49:12 server sshd[25316]: Failed password for root from 110.49.70.240 port 60982 ssh2
2020-08-06 08:53:49
138.197.129.38 attackbots
Aug  5 23:26:35 django-0 sshd[28429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.129.38  user=root
Aug  5 23:26:38 django-0 sshd[28429]: Failed password for root from 138.197.129.38 port 57798 ssh2
...
2020-08-06 08:47:21
111.231.89.140 attackbotsspam
Aug  6 03:10:33 gw1 sshd[1184]: Failed password for root from 111.231.89.140 port 30686 ssh2
...
2020-08-06 08:52:05
205.185.125.164 attackspambots
firewall-block, port(s): 389/udp
2020-08-06 08:41:42
67.201.8.10 attackspambots
2020-08-05T22:36:08.377960vfs-server-01 sshd\[2092\]: Invalid user admin from 67.201.8.10 port 53511
2020-08-05T22:36:09.805045vfs-server-01 sshd\[2096\]: Invalid user admin from 67.201.8.10 port 53531
2020-08-05T22:36:11.222714vfs-server-01 sshd\[2099\]: Invalid user admin from 67.201.8.10 port 53556
2020-08-06 08:32:44

最近上报的IP列表

228.20.202.71 121.255.97.138 190.94.62.75 104.228.33.151
16.243.25.126 250.217.8.247 22.80.100.228 145.25.102.139
224.54.186.201 175.216.145.21 147.194.141.253 239.68.106.199
234.217.130.80 116.8.78.245 204.110.235.232 9.111.111.40
174.13.39.60 135.82.100.131 25.170.117.166 226.116.178.74