必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 19.214.223.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10884
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;19.214.223.241.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022802 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 08:44:03 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 241.223.214.19.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 241.223.214.19.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
104.248.187.179 attack
k+ssh-bruteforce
2019-10-09 04:30:55
92.119.160.107 attackspam
Oct  8 19:17:27 mc1 kernel: \[1841444.412320\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.107 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=12519 PROTO=TCP SPT=50475 DPT=464 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct  8 19:17:44 mc1 kernel: \[1841461.961193\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.107 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=25136 PROTO=TCP SPT=50475 DPT=15 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct  8 19:20:15 mc1 kernel: \[1841612.835879\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.107 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=4361 PROTO=TCP SPT=50475 DPT=35 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-09 03:54:37
200.216.30.10 attackbotsspam
Oct  8 22:01:01 km20725 sshd\[19857\]: Invalid user testuser from 200.216.30.10Oct  8 22:01:03 km20725 sshd\[19857\]: Failed password for invalid user testuser from 200.216.30.10 port 7946 ssh2Oct  8 22:06:34 km20725 sshd\[20074\]: Invalid user harvard from 200.216.30.10Oct  8 22:06:36 km20725 sshd\[20074\]: Failed password for invalid user harvard from 200.216.30.10 port 59492 ssh2
...
2019-10-09 04:10:18
207.154.243.255 attack
Oct  8 10:17:07 php1 sshd\[21026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.243.255  user=root
Oct  8 10:17:09 php1 sshd\[21026\]: Failed password for root from 207.154.243.255 port 47598 ssh2
Oct  8 10:20:53 php1 sshd\[21375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.243.255  user=root
Oct  8 10:20:56 php1 sshd\[21375\]: Failed password for root from 207.154.243.255 port 60060 ssh2
Oct  8 10:24:32 php1 sshd\[21689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.243.255  user=root
2019-10-09 04:33:20
5.55.26.42 attackbotsspam
Telnet Server BruteForce Attack
2019-10-09 04:27:22
45.80.65.83 attack
Oct  8 05:02:09 kapalua sshd\[18256\]: Invalid user Par0la1234% from 45.80.65.83
Oct  8 05:02:09 kapalua sshd\[18256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.83
Oct  8 05:02:11 kapalua sshd\[18256\]: Failed password for invalid user Par0la1234% from 45.80.65.83 port 49182 ssh2
Oct  8 05:06:31 kapalua sshd\[18622\]: Invalid user P4\$\$1234 from 45.80.65.83
Oct  8 05:06:31 kapalua sshd\[18622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.83
2019-10-09 03:50:27
183.87.157.202 attackspambots
Oct  8 12:46:35 web8 sshd\[11973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.87.157.202  user=root
Oct  8 12:46:37 web8 sshd\[11973\]: Failed password for root from 183.87.157.202 port 59298 ssh2
Oct  8 12:51:22 web8 sshd\[14436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.87.157.202  user=root
Oct  8 12:51:24 web8 sshd\[14436\]: Failed password for root from 183.87.157.202 port 43348 ssh2
Oct  8 12:56:02 web8 sshd\[16547\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.87.157.202  user=root
2019-10-09 04:02:59
222.186.175.220 attackbots
Oct  8 19:56:11 *** sshd[30170]: User root from 222.186.175.220 not allowed because not listed in AllowUsers
2019-10-09 04:02:10
117.50.9.31 attack
117.50.9.31 - - \[08/Oct/2019:19:31:04 +0200\] "GET /TP/public/index.php HTTP/1.1" 403 465 "-" "Mozilla/5.0 \(Windows\; U\; Windows NT 6.0\;en-US\; rv:1.9.2\) Gecko/20100115 Firefox/3.6\)"
117.50.9.31 - - \[08/Oct/2019:19:31:04 +0200\] "GET /TP/index.php HTTP/1.1" 403 458 "-" "Mozilla/5.0 \(Windows\; U\; Windows NT 6.0\;en-US\; rv:1.9.2\) Gecko/20100115 Firefox/3.6\)"
117.50.9.31 - - \[08/Oct/2019:19:31:05 +0200\] "GET /thinkphp/html/public/index.php HTTP/1.1" 403 476 "-" "Mozilla/5.0 \(Windows\; U\; Windows NT 6.0\;en-US\; rv:1.9.2\) Gecko/20100115 Firefox/3.6\)"
...
2019-10-09 03:44:08
148.70.65.31 attack
2019-10-08T16:27:17.843707shield sshd\[21237\]: Invalid user Wolf@2017 from 148.70.65.31 port 46909
2019-10-08T16:27:17.849916shield sshd\[21237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.65.31
2019-10-08T16:27:19.742248shield sshd\[21237\]: Failed password for invalid user Wolf@2017 from 148.70.65.31 port 46909 ssh2
2019-10-08T16:33:22.787053shield sshd\[21923\]: Invalid user Photo2017 from 148.70.65.31 port 29148
2019-10-08T16:33:22.791361shield sshd\[21923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.65.31
2019-10-09 03:46:58
66.249.64.216 attack
Automatic report - Banned IP Access
2019-10-09 03:58:58
51.75.248.251 attackspam
10/08/2019-16:22:18.563564 51.75.248.251 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-09 04:22:56
37.139.9.23 attackbots
Oct  8 14:37:40 TORMINT sshd\[3224\]: Invalid user www from 37.139.9.23
Oct  8 14:37:40 TORMINT sshd\[3224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.9.23
Oct  8 14:37:41 TORMINT sshd\[3224\]: Failed password for invalid user www from 37.139.9.23 port 42914 ssh2
...
2019-10-09 03:50:57
110.35.173.2 attack
Oct  8 09:57:36 tdfoods sshd\[18903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.35.173.2  user=root
Oct  8 09:57:38 tdfoods sshd\[18903\]: Failed password for root from 110.35.173.2 port 7915 ssh2
Oct  8 10:01:51 tdfoods sshd\[19257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.35.173.2  user=root
Oct  8 10:01:53 tdfoods sshd\[19257\]: Failed password for root from 110.35.173.2 port 16844 ssh2
Oct  8 10:06:08 tdfoods sshd\[19637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.35.173.2  user=root
2019-10-09 04:25:06
180.167.155.201 attack
villaromeo.de 180.167.155.201 \[08/Oct/2019:22:06:20 +0200\] "POST /wp-login.php HTTP/1.1" 200 2061 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
villaromeo.de 180.167.155.201 \[08/Oct/2019:22:06:21 +0200\] "POST /wp-login.php HTTP/1.1" 200 2025 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-10-09 04:15:47

最近上报的IP列表

217.171.100.9 109.209.120.152 234.13.170.106 230.229.167.81
126.92.103.88 24.222.76.15 67.140.115.63 23.124.188.162
195.163.221.174 78.199.57.149 164.10.123.29 203.64.77.239
68.107.150.79 77.239.135.2 231.169.166.133 73.15.227.7
159.222.125.247 159.238.64.126 154.16.120.154 48.188.22.3