必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 208.214.105.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42679
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;208.214.105.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 17:08:31 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
b'Host 99.105.214.208.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 99.105.214.208.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.38.126.122 attack
Unauthorized connection attempt detected from IP address 103.38.126.122 to port 8000
2020-06-22 07:49:27
27.120.30.229 attackbotsspam
Unauthorized connection attempt detected from IP address 27.120.30.229 to port 5555
2020-06-22 07:57:41
170.106.36.56 attack
Unauthorized connection attempt detected from IP address 170.106.36.56 to port 7171
2020-06-22 07:46:36
43.243.120.89 attack
Jun 21 16:50:22 dignus sshd[9624]: Failed password for invalid user msr from 43.243.120.89 port 49324 ssh2
Jun 21 16:52:28 dignus sshd[9817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.243.120.89  user=root
Jun 21 16:52:30 dignus sshd[9817]: Failed password for root from 43.243.120.89 port 41098 ssh2
Jun 21 16:54:33 dignus sshd[10003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.243.120.89  user=root
Jun 21 16:54:36 dignus sshd[10003]: Failed password for root from 43.243.120.89 port 32868 ssh2
...
2020-06-22 07:57:07
218.30.19.190 attackspambots
Automatic report BANNED IP
2020-06-22 07:41:25
178.175.235.74 attack
Unauthorized connection attempt detected from IP address 178.175.235.74 to port 88
2020-06-22 08:04:59
60.175.90.102 attackspambots
Unauthorized connection attempt detected from IP address 60.175.90.102 to port 23
2020-06-22 07:35:00
95.132.240.82 attack
Unauthorized connection attempt detected from IP address 95.132.240.82 to port 2323
2020-06-22 07:31:03
188.186.237.180 attack
Automatic report - Port Scan Attack
2020-06-22 08:02:55
170.82.109.196 attack
Unauthorized connection attempt detected from IP address 170.82.109.196 to port 5555
2020-06-22 08:05:19
189.235.13.78 attackspambots
Unauthorized connection attempt detected from IP address 189.235.13.78 to port 81
2020-06-22 07:43:30
78.172.188.18 attackbotsspam
Unauthorized connection attempt detected from IP address 78.172.188.18 to port 23
2020-06-22 07:53:19
31.27.149.45 attackspam
Unauthorized connection attempt detected from IP address 31.27.149.45 to port 23
2020-06-22 07:57:28
201.49.225.52 attackbotsspam
Unauthorized connection attempt detected from IP address 201.49.225.52 to port 23
2020-06-22 08:00:08
2.187.85.37 attackspam
Unauthorized connection attempt detected from IP address 2.187.85.37 to port 80
2020-06-22 07:39:32

最近上报的IP列表

228.56.250.25 234.75.77.138 54.76.215.90 144.25.49.231
249.114.173.35 201.109.190.55 66.93.86.250 239.83.197.7
157.51.85.39 130.65.191.68 246.161.113.102 199.97.211.90
108.198.6.114 165.155.160.235 2.230.133.238 85.170.63.95
203.120.19.14 208.29.100.114 196.186.153.191 15.47.213.161