必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Egypt

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.218.214.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16165
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;196.218.214.140.		IN	A

;; AUTHORITY SECTION:
.			252	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 10:48:26 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
140.214.218.196.in-addr.arpa domain name pointer host-196.218.214.140-static.tedata.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.214.218.196.in-addr.arpa	name = host-196.218.214.140-static.tedata.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
188.227.195.126 attack
Autoban   188.227.195.126 AUTH/CONNECT
2019-07-22 10:14:11
188.53.206.160 attackspam
Autoban   188.53.206.160 AUTH/CONNECT
2019-07-22 09:45:12
115.178.97.63 attack
Sun, 21 Jul 2019 18:26:47 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 10:03:57
188.252.199.63 attackspambots
Autoban   188.252.199.63 AUTH/CONNECT
2019-07-22 10:05:27
13.57.247.100 attackspam
Sun, 21 Jul 2019 18:26:46 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 10:07:42
212.239.129.222 attack
Sun, 21 Jul 2019 18:26:54 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 09:38:15
77.40.24.183 attack
SMTP
2019-07-22 09:44:21
189.234.230.76 attackbots
2019-07-21T19:59:49.559315ldap.arvenenaske.de sshd[16819]: Connection from 189.234.230.76 port 56914 on 5.199.128.55 port 22
2019-07-21T19:59:56.767782ldap.arvenenaske.de sshd[16819]: Invalid user tena from 189.234.230.76 port 56914
2019-07-21T19:59:56.775126ldap.arvenenaske.de sshd[16819]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.234.230.76 user=tena
2019-07-21T19:59:56.776200ldap.arvenenaske.de sshd[16819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.234.230.76
2019-07-21T19:59:49.559315ldap.arvenenaske.de sshd[16819]: Connection from 189.234.230.76 port 56914 on 5.199.128.55 port 22
2019-07-21T19:59:56.767782ldap.arvenenaske.de sshd[16819]: Invalid user tena from 189.234.230.76 port 56914
2019-07-21T19:59:58.490316ldap.arvenenaske.de sshd[16819]: Failed password for invalid user tena from 189.234.230.76 port 56914 ssh2
2019-07-21T20:06:34.336041ldap.arvenenaske.de sshd[16........
------------------------------
2019-07-22 09:54:57
107.160.241.24 attackbotsspam
Jul 22 02:39:44 ArkNodeAT sshd\[31774\]: Invalid user hadoop from 107.160.241.24
Jul 22 02:39:44 ArkNodeAT sshd\[31774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.160.241.24
Jul 22 02:39:47 ArkNodeAT sshd\[31774\]: Failed password for invalid user hadoop from 107.160.241.24 port 34684 ssh2
2019-07-22 10:14:29
46.21.100.222 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-22 10:06:15
109.190.1.7 attackspambots
Jul 21 18:26:37 sshgateway sshd\[16697\]: Invalid user admin from 109.190.1.7
Jul 21 18:26:37 sshgateway sshd\[16697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.190.1.7
Jul 21 18:26:40 sshgateway sshd\[16697\]: Failed password for invalid user admin from 109.190.1.7 port 33090 ssh2
2019-07-22 10:16:53
14.188.48.2 attack
Sun, 21 Jul 2019 18:26:46 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 10:07:17
218.92.0.201 attackspambots
Jul 22 01:42:10 MK-Soft-VM7 sshd\[14371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.201  user=root
Jul 22 01:42:12 MK-Soft-VM7 sshd\[14371\]: Failed password for root from 218.92.0.201 port 17701 ssh2
Jul 22 01:42:15 MK-Soft-VM7 sshd\[14371\]: Failed password for root from 218.92.0.201 port 17701 ssh2
...
2019-07-22 09:50:50
13.126.93.219 attackspambots
Jul 22 07:40:22 areeb-Workstation sshd\[15360\]: Invalid user alex from 13.126.93.219
Jul 22 07:40:22 areeb-Workstation sshd\[15360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.126.93.219
Jul 22 07:40:24 areeb-Workstation sshd\[15360\]: Failed password for invalid user alex from 13.126.93.219 port 49720 ssh2
...
2019-07-22 10:18:21
185.10.68.50 attack
2019-07-21 23:12:59,273 [snip] proftpd[23302] [snip] (50.68.10.185.ro.ovo.sc[185.10.68.50]): USER %null%: no such user found from 50.68.10.185.ro.ovo.sc [185.10.68.50] to ::ffff:[snip]:22
2019-07-21 23:12:59,744 [snip] proftpd[23303] [snip] (50.68.10.185.ro.ovo.sc[185.10.68.50]): USER alabala123: no such user found from 50.68.10.185.ro.ovo.sc [185.10.68.50] to ::ffff:[snip]:22
2019-07-21 23:13:00,241 [snip] proftpd[23304] [snip] (50.68.10.185.ro.ovo.sc[185.10.68.50]): USER nologln: no such user found from 50.68.10.185.ro.ovo.sc [185.10.68.50] to ::ffff:[snip]:22[...]
2019-07-22 10:03:12

最近上报的IP列表

196.217.113.227 196.218.233.37 196.219.102.196 196.218.156.40
196.219.142.177 196.218.143.159 196.219.142.45 196.219.72.180
196.219.94.198 196.221.165.194 196.221.36.4 196.221.36.83
196.221.68.40 196.22.142.198 196.223.154.2 196.234.161.206
196.224.35.109 196.221.151.72 196.234.167.77 196.235.66.223