必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): DoD Network Information Center

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.114.4.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58553
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;214.114.4.19.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062201 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 22 23:41:48 CST 2019
;; MSG SIZE  rcvd: 116
HOST信息:
Host 19.4.114.214.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 19.4.114.214.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
78.46.61.245 attack
URL Probing: /webshop-oeffentlich/feuerschalen/feuerschale-d--75-cm.php
2020-10-08 02:54:51
51.81.152.2 attackspambots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-10-08 02:36:59
80.244.179.6 attackspambots
(sshd) Failed SSH login from 80.244.179.6 (GB/United Kingdom/school.asazs.co.uk): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  7 13:12:41 server sshd[16981]: Failed password for root from 80.244.179.6 port 37980 ssh2
Oct  7 13:22:13 server sshd[19286]: Failed password for root from 80.244.179.6 port 41804 ssh2
Oct  7 13:25:09 server sshd[19987]: Failed password for root from 80.244.179.6 port 38632 ssh2
Oct  7 13:28:13 server sshd[20789]: Failed password for root from 80.244.179.6 port 35462 ssh2
Oct  7 13:31:33 server sshd[21565]: Failed password for root from 80.244.179.6 port 60534 ssh2
2020-10-08 03:04:39
186.93.96.80 attack
20/10/6@16:38:39: FAIL: Alarm-Network address from=186.93.96.80
...
2020-10-08 02:36:24
128.14.137.180 attackspambots
Found on   Github Combined on 3 lists    / proto=6  .  srcport=30347  .  dstport=80 HTTP  .     (2144)
2020-10-08 02:54:02
103.83.36.101 attackspambots
103.83.36.101 - - [07/Oct/2020:12:20:07 -0600] "GET /wp-login.php HTTP/1.1" 301 4594 "http://www.tbi.equipment/wp-login.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-08 02:51:05
140.143.248.32 attack
2020-10-06T22:42:56.844595hostname sshd[17439]: Failed password for root from 140.143.248.32 port 60526 ssh2
...
2020-10-08 02:42:30
178.69.12.30 attackspambots
Dovecot Invalid User Login Attempt.
2020-10-08 02:40:28
52.251.39.67 attackbotsspam
[2020-10-07 16:41:05] SECURITY[5295] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2020-10-07T16:41:05.801+0200",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="",SessionID="1135716333",LocalAddress="IPV4/UDP/51.255.2.242/5060",RemoteAddress="IPV4/UDP/52.251.39.67/5543",Challenge="1602081665/60ef6b0a73f0862268ca43e21f04966e",Response="20a89a556f1b13d21e39356081c3275b",ExpectedResponse=""
[2020-10-07 16:41:05] SECURITY[5295] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2020-10-07T16:41:05.852+0200",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="",SessionID="3826012407",LocalAddress="IPV4/UDP/51.255.2.242/5060",RemoteAddress="IPV4/UDP/52.251.39.67/5543",Challenge="1602081665/60ef6b0a73f0862268ca43e21f04966e",Response="e6c9f20450368a272c66f99cf5c4bab0",ExpectedResponse=""
[2020-10-07 16:41:05] SECURITY[5295] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2020-10-07T16:41:05.92
...
2020-10-08 03:01:52
125.72.106.51 attackspambots
Oct  6 22:32:06 v26 sshd[25105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.72.106.51  user=r.r
Oct  6 22:32:08 v26 sshd[25105]: Failed password for r.r from 125.72.106.51 port 57088 ssh2
Oct  6 22:32:08 v26 sshd[25105]: Received disconnect from 125.72.106.51 port 57088:11: Bye Bye [preauth]
Oct  6 22:32:08 v26 sshd[25105]: Disconnected from 125.72.106.51 port 57088 [preauth]
Oct  6 22:46:09 v26 sshd[26931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.72.106.51  user=r.r
Oct  6 22:46:11 v26 sshd[26931]: Failed password for r.r from 125.72.106.51 port 39131 ssh2
Oct  6 22:46:12 v26 sshd[26931]: Received disconnect from 125.72.106.51 port 39131:11: Bye Bye [preauth]
Oct  6 22:46:12 v26 sshd[26931]: Disconnected from 125.72.106.51 port 39131 [preauth]
Oct  6 22:49:25 v26 sshd[27412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.72.........
-------------------------------
2020-10-08 02:35:55
139.59.255.166 attackbots
Oct  8 05:39:48 localhost sshd[2651051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.255.166  user=root
Oct  8 05:39:50 localhost sshd[2651051]: Failed password for root from 139.59.255.166 port 40074 ssh2
...
2020-10-08 02:43:58
68.183.55.223 attack
Misc Attack - Port=20285
2020-10-08 02:59:19
49.233.204.30 attackbotsspam
Oct  7 14:57:59 * sshd[15473]: Failed password for root from 49.233.204.30 port 36398 ssh2
2020-10-08 02:56:09
194.5.206.145 attack
(sshd) Failed SSH login from 194.5.206.145 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  7 13:30:54 optimus sshd[14464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.5.206.145  user=root
Oct  7 13:30:56 optimus sshd[14464]: Failed password for root from 194.5.206.145 port 53704 ssh2
Oct  7 13:46:24 optimus sshd[18409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.5.206.145  user=root
Oct  7 13:46:26 optimus sshd[18409]: Failed password for root from 194.5.206.145 port 36152 ssh2
Oct  7 14:05:27 optimus sshd[25650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.5.206.145  user=root
2020-10-08 02:35:18
103.93.17.149 attackspam
Oct  6 23:51:13 pornomens sshd\[9034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.93.17.149  user=root
Oct  6 23:51:14 pornomens sshd\[9034\]: Failed password for root from 103.93.17.149 port 35384 ssh2
Oct  6 23:53:47 pornomens sshd\[9061\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.93.17.149  user=root
...
2020-10-08 03:06:45

最近上报的IP列表

197.194.242.16 141.31.76.212 83.2.118.145 35.132.220.0
69.76.31.37 168.171.195.116 203.223.131.202 189.57.157.51
35.242.17.145 89.216.252.176 181.80.225.81 170.16.62.88
159.178.155.110 158.38.61.225 212.60.5.166 39.10.137.109
103.54.30.241 80.254.14.235 160.143.175.56 52.160.228.138