必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Slemmestad

省份(region): Viken

国家(country): Norway

运营商(isp): Telenor

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.214.43.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10091
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;193.214.43.169.			IN	A

;; AUTHORITY SECTION:
.			518	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020092001 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 21 08:56:04 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
169.43.214.193.in-addr.arpa domain name pointer 169.43.214.193.static.cust.telenor.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
169.43.214.193.in-addr.arpa	name = 169.43.214.193.static.cust.telenor.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
221.208.6.164 attack
Port probing on unauthorized port 1433
2020-02-29 09:14:16
108.212.98.124 attackspambots
Lines containing failures of 108.212.98.124
Feb 25 11:12:00 shared10 sshd[24282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.212.98.124  user=r.r
Feb 25 11:12:02 shared10 sshd[24282]: Failed password for r.r from 108.212.98.124 port 45750 ssh2
Feb 25 11:12:02 shared10 sshd[24282]: Received disconnect from 108.212.98.124 port 45750:11: Bye Bye [preauth]
Feb 25 11:12:02 shared10 sshd[24282]: Disconnected from authenticating user r.r 108.212.98.124 port 45750 [preauth]
Feb 25 11:32:23 shared10 sshd[31465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.212.98.124  user=list
Feb 25 11:32:26 shared10 sshd[31465]: Failed password for list from 108.212.98.124 port 40168 ssh2
Feb 25 11:32:27 shared10 sshd[31465]: Received disconnect from 108.212.98.124 port 40168:11: Bye Bye [preauth]
Feb 25 11:32:27 shared10 sshd[31465]: Disconnected from authenticating user list 108.212.98.124 port 40........
------------------------------
2020-02-29 09:17:18
45.133.99.130 attack
Feb 29 03:02:35 mail1 sendmail[48532]: 01T12Mht048532: [45.133.99.130] did not issue MAIL/EXPN/VRFY/ETRN during connection to TLSMTA
Feb 29 03:02:49 mail1 sendmail[48578]: 01T12arr048578: [45.133.99.130] did not issue MAIL/EXPN/VRFY/ETRN during connection to TLSMTA
Feb 29 03:03:56 mail1 sendmail[48652]: 01T13hMd048652: [45.133.99.130] did not issue MAIL/EXPN/VRFY/ETRN during connection to TLSMTA
...
2020-02-29 09:18:43
79.7.241.94 attackspambots
Feb 28 19:24:25 NPSTNNYC01T sshd[2778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.7.241.94
Feb 28 19:24:28 NPSTNNYC01T sshd[2778]: Failed password for invalid user hue from 79.7.241.94 port 19374 ssh2
Feb 28 19:26:21 NPSTNNYC01T sshd[2870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.7.241.94
...
2020-02-29 09:36:52
106.13.181.170 attackbots
Feb 29 01:10:12 nextcloud sshd\[27826\]: Invalid user smmsp from 106.13.181.170
Feb 29 01:10:12 nextcloud sshd\[27826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.181.170
Feb 29 01:10:13 nextcloud sshd\[27826\]: Failed password for invalid user smmsp from 106.13.181.170 port 21624 ssh2
2020-02-29 09:06:47
103.98.160.50 attack
" "
2020-02-29 09:44:35
177.37.71.40 attackbotsspam
Invalid user sam from 177.37.71.40 port 39467
2020-02-29 09:27:17
36.236.209.129 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 28-02-2020 21:55:11.
2020-02-29 09:09:45
213.238.179.93 attackbots
Feb 28 21:55:32 XXX sshd[18645]: Invalid user lichaonan from 213.238.179.93 port 52802
2020-02-29 09:11:38
58.23.153.10 attackbots
Invalid user adm from 58.23.153.10 port 58830
2020-02-29 09:26:04
121.13.252.226 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-29 09:34:00
188.120.245.214 attackbotsspam
Feb 28 20:59:52 firewall sshd[15716]: Invalid user minecraft from 188.120.245.214
Feb 28 20:59:54 firewall sshd[15716]: Failed password for invalid user minecraft from 188.120.245.214 port 47814 ssh2
Feb 28 21:09:44 firewall sshd[15892]: Invalid user cisco from 188.120.245.214
...
2020-02-29 09:22:50
190.206.127.175 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 28-02-2020 21:55:10.
2020-02-29 09:10:00
42.157.224.33 attackspam
PORT TCP 16384
2020-02-29 09:13:56
179.182.125.181 attackspambots
Automatic report - Port Scan Attack
2020-02-29 09:33:15

最近上报的IP列表

172.87.77.163 173.183.143.86 5.31.7.225 188.178.207.219
100.37.22.195 213.149.246.11 12.21.125.130 58.62.246.223
189.110.96.19 188.37.191.128 123.14.146.159 134.98.53.28
41.22.39.36 61.78.149.209 24.171.5.114 107.21.237.176
193.69.210.47 88.243.82.124 183.244.105.247 124.131.153.188