必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 191.16.14.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31800
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;191.16.14.21.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040900 1800 900 604800 86400

;; Query time: 107 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 09 13:39:24 CST 2020
;; MSG SIZE  rcvd: 116
HOST信息:
21.14.16.191.in-addr.arpa domain name pointer 191-16-14-21.user.vivozap.com.br.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.14.16.191.in-addr.arpa	name = 191-16-14-21.user.vivozap.com.br.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
141.98.81.108 attackbotsspam
Jun  4 23:07:21 vmd26974 sshd[16809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.108
Jun  4 23:07:23 vmd26974 sshd[16809]: Failed password for invalid user admin from 141.98.81.108 port 40033 ssh2
...
2020-06-05 05:23:22
206.189.178.171 attackbots
2020-06-04T20:15:05.958555abusebot-7.cloudsearch.cf sshd[32644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.178.171  user=root
2020-06-04T20:15:08.213015abusebot-7.cloudsearch.cf sshd[32644]: Failed password for root from 206.189.178.171 port 42414 ssh2
2020-06-04T20:17:48.585536abusebot-7.cloudsearch.cf sshd[325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.178.171  user=root
2020-06-04T20:17:50.549261abusebot-7.cloudsearch.cf sshd[325]: Failed password for root from 206.189.178.171 port 37168 ssh2
2020-06-04T20:20:31.725708abusebot-7.cloudsearch.cf sshd[523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.178.171  user=root
2020-06-04T20:20:33.732409abusebot-7.cloudsearch.cf sshd[523]: Failed password for root from 206.189.178.171 port 60152 ssh2
2020-06-04T20:23:16.040342abusebot-7.cloudsearch.cf sshd[682]: pam_unix(sshd:auth): aut
...
2020-06-05 05:33:57
101.78.182.242 attackbots
2020-06-04T20:10:57.214225ionos.janbro.de sshd[44801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.182.242  user=root
2020-06-04T20:10:59.419823ionos.janbro.de sshd[44801]: Failed password for root from 101.78.182.242 port 57230 ssh2
2020-06-04T20:13:57.002136ionos.janbro.de sshd[44816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.182.242  user=root
2020-06-04T20:13:59.116600ionos.janbro.de sshd[44816]: Failed password for root from 101.78.182.242 port 55394 ssh2
2020-06-04T20:17:06.577447ionos.janbro.de sshd[44823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.182.242  user=root
2020-06-04T20:17:08.453001ionos.janbro.de sshd[44823]: Failed password for root from 101.78.182.242 port 53560 ssh2
2020-06-04T20:20:17.844728ionos.janbro.de sshd[44825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=10
...
2020-06-05 05:17:51
84.236.96.65 attack
(sshd) Failed SSH login from 84.236.96.65 (HU/Hungary/84-236-96-65.pool.digikabel.hu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun  4 22:22:31 amsweb01 sshd[24051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.236.96.65  user=root
Jun  4 22:22:33 amsweb01 sshd[24051]: Failed password for root from 84.236.96.65 port 41563 ssh2
Jun  4 22:25:48 amsweb01 sshd[25059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.236.96.65  user=root
Jun  4 22:25:50 amsweb01 sshd[25059]: Failed password for root from 84.236.96.65 port 43637 ssh2
Jun  4 22:29:01 amsweb01 sshd[25874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.236.96.65  user=root
2020-06-05 05:03:36
188.217.53.229 attackbotsspam
Jun  4 22:03:16 master sshd[1549]: Failed password for root from 188.217.53.229 port 48506 ssh2
Jun  4 22:12:45 master sshd[1560]: Failed password for root from 188.217.53.229 port 59800 ssh2
Jun  4 22:16:16 master sshd[1579]: Failed password for root from 188.217.53.229 port 34888 ssh2
Jun  4 22:19:43 master sshd[1587]: Failed password for root from 188.217.53.229 port 38200 ssh2
Jun  4 22:22:58 master sshd[1589]: Failed password for root from 188.217.53.229 port 41520 ssh2
Jun  4 22:26:33 master sshd[1596]: Failed password for root from 188.217.53.229 port 44844 ssh2
Jun  4 22:29:57 master sshd[1608]: Failed password for root from 188.217.53.229 port 48162 ssh2
Jun  4 22:33:21 master sshd[1629]: Failed password for root from 188.217.53.229 port 51472 ssh2
Jun  4 22:37:01 master sshd[1639]: Failed password for root from 188.217.53.229 port 54792 ssh2
Jun  4 22:40:23 master sshd[1646]: Failed password for root from 188.217.53.229 port 58132 ssh2
2020-06-05 05:22:05
2.80.168.28 attackbots
Jun  4 22:19:39 serwer sshd\[12538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.80.168.28  user=root
Jun  4 22:19:41 serwer sshd\[12538\]: Failed password for root from 2.80.168.28 port 43266 ssh2
Jun  4 22:23:31 serwer sshd\[13058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.80.168.28  user=root
...
2020-06-05 05:18:17
14.241.39.26 attackbots
Icarus honeypot on github
2020-06-05 05:20:45
188.116.49.58 attackbotsspam
Jun  4 04:36:29 server6 sshd[7079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.116.49.58  user=r.r
Jun  4 04:36:32 server6 sshd[7079]: Failed password for r.r from 188.116.49.58 port 58990 ssh2
Jun  4 04:36:32 server6 sshd[7079]: Received disconnect from 188.116.49.58: 11: Bye Bye [preauth]
Jun  4 04:45:08 server6 sshd[16284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.116.49.58  user=r.r
Jun  4 04:45:10 server6 sshd[16284]: Failed password for r.r from 188.116.49.58 port 47184 ssh2
Jun  4 04:45:10 server6 sshd[16284]: Received disconnect from 188.116.49.58: 11: Bye Bye [preauth]
Jun  4 04:50:01 server6 sshd[21031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.116.49.58  user=r.r
Jun  4 04:50:03 server6 sshd[21031]: Failed password for r.r from 188.116.49.58 port 47114 ssh2
Jun  4 04:50:04 server6 sshd[21031]: Received disconne........
-------------------------------
2020-06-05 05:28:38
222.186.15.115 attackspambots
Blocked by jail recidive
2020-06-05 05:05:59
178.128.41.102 attackbots
(sshd) Failed SSH login from 178.128.41.102 (GB/United Kingdom/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun  5 00:01:06 s1 sshd[15099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.41.102  user=root
Jun  5 00:01:08 s1 sshd[15099]: Failed password for root from 178.128.41.102 port 43496 ssh2
Jun  5 00:04:11 s1 sshd[15240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.41.102  user=root
Jun  5 00:04:14 s1 sshd[15240]: Failed password for root from 178.128.41.102 port 46690 ssh2
Jun  5 00:07:20 s1 sshd[15521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.41.102  user=root
2020-06-05 05:35:58
202.104.112.217 attackbotsspam
Jun  4 23:06:49 vps687878 sshd\[12262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.104.112.217  user=root
Jun  4 23:06:51 vps687878 sshd\[12262\]: Failed password for root from 202.104.112.217 port 49282 ssh2
Jun  4 23:08:30 vps687878 sshd\[12324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.104.112.217  user=root
Jun  4 23:08:32 vps687878 sshd\[12324\]: Failed password for root from 202.104.112.217 port 33137 ssh2
Jun  4 23:10:03 vps687878 sshd\[12506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.104.112.217  user=root
...
2020-06-05 05:13:22
188.165.251.208 attackspam
Jun  4 18:26:05 vps46666688 sshd[9463]: Failed password for root from 188.165.251.208 port 43446 ssh2
...
2020-06-05 05:35:31
36.26.82.40 attackbotsspam
Brute force attempt
2020-06-05 05:20:33
194.218.47.122 attack
/_api/v2.0/shares/u!aHR0cHM6Ly9ibG9nLmhhbWV0YmVub2l0LmluZm8vd3AtY29udGVudC91cGxvYWRzLzIwMjAvMDYvaW1hZ2VfdGh1bWIucG5n/driveItem/thumbnails/0/c400x99999/content/?preferNoRedirect=true&prefer=extendCacheMaxAge&clientType=modernWebPart
2020-06-05 05:07:46
118.27.14.123 attackbots
Unauthorized SSH login attempts
2020-06-05 04:57:24

最近上报的IP列表

42.118.253.147 74.208.42.26 202.67.46.249 167.71.213.174
58.23.49.57 34.214.176.156 117.23.162.20 58.85.204.154
68.63.242.184 61.53.184.23 31.130.33.161 218.79.126.216
198.103.153.52 5.75.94.234 116.251.158.121 72.239.4.230
47.44.70.137 89.236.233.85 111.20.68.34 45.95.168.98