必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Nowon-gu

省份(region): Seoul

国家(country): South Korea

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): SK Broadband Co Ltd

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.214.101.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28003
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;211.214.101.194.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072600 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jul 27 00:06:57 CST 2019
;; MSG SIZE  rcvd: 119
HOST信息:
Host 194.101.214.211.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 194.101.214.211.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.42.7 attackspambots
Mar 12 21:00:51 plusreed sshd[27511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7  user=root
Mar 12 21:00:54 plusreed sshd[27511]: Failed password for root from 222.186.42.7 port 59980 ssh2
...
2020-03-13 09:13:00
200.52.80.34 attackspam
2020-03-13T04:05:00.078466shield sshd\[1247\]: Invalid user cpanellogin from 200.52.80.34 port 50250
2020-03-13T04:05:00.087522shield sshd\[1247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34
2020-03-13T04:05:01.612575shield sshd\[1247\]: Failed password for invalid user cpanellogin from 200.52.80.34 port 50250 ssh2
2020-03-13T04:07:26.338179shield sshd\[1843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34  user=root
2020-03-13T04:07:28.239545shield sshd\[1843\]: Failed password for root from 200.52.80.34 port 47458 ssh2
2020-03-13 12:10:20
91.134.185.86 attack
Automatic report - Banned IP Access
2020-03-13 09:10:04
223.197.175.171 attackspam
Mar 13 04:54:32 vps sshd[10879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.197.175.171 
Mar 13 04:54:33 vps sshd[10879]: Failed password for invalid user romanondracek from 223.197.175.171 port 53168 ssh2
Mar 13 04:58:24 vps sshd[11049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.197.175.171 
...
2020-03-13 12:10:42
59.152.237.118 attackspam
2020-03-13T00:21:03.667268v22018076590370373 sshd[26454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.152.237.118  user=root
2020-03-13T00:21:05.641361v22018076590370373 sshd[26454]: Failed password for root from 59.152.237.118 port 51798 ssh2
2020-03-13T00:25:11.490426v22018076590370373 sshd[25834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.152.237.118  user=root
2020-03-13T00:25:13.178161v22018076590370373 sshd[25834]: Failed password for root from 59.152.237.118 port 36248 ssh2
2020-03-13T00:30:03.515316v22018076590370373 sshd[24057]: Invalid user XiaB from 59.152.237.118 port 48942
...
2020-03-13 09:12:22
183.89.215.23 attack
2020-03-1222:04:171jCV05-0005Bx-3f\<=info@whatsup2013.chH=\(localhost\)[183.89.238.6]:57159P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2303id=D2D7613239EDC370ACA9E058ACB030AC@whatsup2013.chT="fromDarya"fornikhidoppalapudi9010@gmail.comuniquenick0.0@gmail.com2020-03-1222:04:471jCV0Z-0005GT-II\<=info@whatsup2013.chH=ip92-101-232-242.onego.ru\(localhost\)[92.101.232.242]:41255P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2371id=F5F046151ECAE4578B8EC77F8B44F4C0@whatsup2013.chT="fromDarya"forbadass4x4_530@yahoo.comrich.tomes@hotmail.com2020-03-1222:05:051jCV0o-0005H1-Ar\<=info@whatsup2013.chH=\(localhost\)[183.89.215.23]:53033P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2320id=A6A315464D99B704D8DD942CD8FAB76E@whatsup2013.chT="fromDarya"forjs4111628@gmail.comcraigbarry452@gmail.com2020-03-1222:06:351jCV2I-0005Oh-9N\<=info@whatsup2013.chH=\(localhost\)[14.168.231.211]:52031P
2020-03-13 09:16:54
222.186.180.6 attackspam
Mar 13 02:13:44 sso sshd[9296]: Failed password for root from 222.186.180.6 port 7020 ssh2
Mar 13 02:13:48 sso sshd[9296]: Failed password for root from 222.186.180.6 port 7020 ssh2
...
2020-03-13 09:22:36
92.101.232.242 attack
2020-03-1222:04:171jCV05-0005Bx-3f\<=info@whatsup2013.chH=\(localhost\)[183.89.238.6]:57159P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2303id=D2D7613239EDC370ACA9E058ACB030AC@whatsup2013.chT="fromDarya"fornikhidoppalapudi9010@gmail.comuniquenick0.0@gmail.com2020-03-1222:04:471jCV0Z-0005GT-II\<=info@whatsup2013.chH=ip92-101-232-242.onego.ru\(localhost\)[92.101.232.242]:41255P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2371id=F5F046151ECAE4578B8EC77F8B44F4C0@whatsup2013.chT="fromDarya"forbadass4x4_530@yahoo.comrich.tomes@hotmail.com2020-03-1222:05:051jCV0o-0005H1-Ar\<=info@whatsup2013.chH=\(localhost\)[183.89.215.23]:53033P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2320id=A6A315464D99B704D8DD942CD8FAB76E@whatsup2013.chT="fromDarya"forjs4111628@gmail.comcraigbarry452@gmail.com2020-03-1222:06:351jCV2I-0005Oh-9N\<=info@whatsup2013.chH=\(localhost\)[14.168.231.211]:52031P
2020-03-13 09:19:18
117.28.254.77 attack
$f2bV_matches
2020-03-13 12:12:26
210.175.50.124 attackspambots
Invalid user qdxx from 210.175.50.124 port 1542
2020-03-13 09:21:40
202.44.54.48 attack
202.44.54.48 - - \[12/Mar/2020:22:06:39 +0100\] "POST /wp-login.php HTTP/1.0" 200 6517 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
202.44.54.48 - - \[12/Mar/2020:22:06:41 +0100\] "POST /wp-login.php HTTP/1.0" 200 6495 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
202.44.54.48 - - \[12/Mar/2020:22:06:42 +0100\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-03-13 09:12:06
103.129.222.207 attack
Invalid user testftp from 103.129.222.207 port 33608
2020-03-13 09:09:39
14.215.47.223 attack
Mar 13 04:53:51 minden010 sshd[22486]: Failed password for root from 14.215.47.223 port 36864 ssh2
Mar 13 04:56:12 minden010 sshd[23275]: Failed password for root from 14.215.47.223 port 33190 ssh2
Mar 13 04:58:28 minden010 sshd[24042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.215.47.223
...
2020-03-13 12:10:02
112.85.42.72 attackbotsspam
2020-03-12T23:56:50.091781xentho-1 sshd[374185]: Failed password for root from 112.85.42.72 port 52146 ssh2
2020-03-12T23:56:48.108851xentho-1 sshd[374185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.72  user=root
2020-03-12T23:56:50.091781xentho-1 sshd[374185]: Failed password for root from 112.85.42.72 port 52146 ssh2
2020-03-12T23:56:53.969960xentho-1 sshd[374185]: Failed password for root from 112.85.42.72 port 52146 ssh2
2020-03-12T23:56:48.108851xentho-1 sshd[374185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.72  user=root
2020-03-12T23:56:50.091781xentho-1 sshd[374185]: Failed password for root from 112.85.42.72 port 52146 ssh2
2020-03-12T23:56:53.969960xentho-1 sshd[374185]: Failed password for root from 112.85.42.72 port 52146 ssh2
2020-03-12T23:56:57.319256xentho-1 sshd[374185]: Failed password for root from 112.85.42.72 port 52146 ssh2
2020-03-12T23:58:12.964996xent
...
2020-03-13 12:17:40
193.251.169.165 attack
$f2bV_matches
2020-03-13 09:14:39

最近上报的IP列表

164.15.9.250 185.232.182.153 58.241.227.19 50.125.204.91
36.129.137.229 47.86.163.177 27.36.189.196 177.10.241.113
125.162.161.182 131.244.117.23 3.1.17.182 191.53.252.16
106.180.0.22 190.114.208.226 102.43.170.188 104.181.91.55
4.17.89.146 114.37.68.68 86.125.23.31 49.71.126.38