必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.116.78.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13789
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.116.78.40.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 03:28:30 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 40.78.116.214.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 214.116.78.40.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.33.172.122 attack
05/09/2020-23:46:48.368233 114.33.172.122 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-05-10 19:37:18
170.106.3.225 attack
May 10 05:36:45 mail sshd\[7627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.3.225  user=root
...
2020-05-10 19:50:52
111.229.219.226 attackspam
2020-05-10T10:46:25.517610shield sshd\[6110\]: Invalid user appuser from 111.229.219.226 port 33694
2020-05-10T10:46:25.521357shield sshd\[6110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.219.226
2020-05-10T10:46:27.643723shield sshd\[6110\]: Failed password for invalid user appuser from 111.229.219.226 port 33694 ssh2
2020-05-10T10:49:49.896682shield sshd\[7066\]: Invalid user testing from 111.229.219.226 port 42358
2020-05-10T10:49:49.900640shield sshd\[7066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.219.226
2020-05-10 19:34:18
159.65.136.196 attackbots
May 10 12:05:07 srv01 sshd[14398]: Invalid user us from 159.65.136.196 port 52306
May 10 12:05:07 srv01 sshd[14398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.136.196
May 10 12:05:07 srv01 sshd[14398]: Invalid user us from 159.65.136.196 port 52306
May 10 12:05:10 srv01 sshd[14398]: Failed password for invalid user us from 159.65.136.196 port 52306 ssh2
May 10 12:09:09 srv01 sshd[14693]: Invalid user kelly from 159.65.136.196 port 59650
...
2020-05-10 19:32:46
106.12.193.96 attackbotsspam
May 10 12:57:00 xeon sshd[53182]: Failed password for invalid user mcserver from 106.12.193.96 port 50241 ssh2
2020-05-10 19:42:21
37.49.226.178 attack
May 10 02:05:12 v26 sshd[25847]: Did not receive identification string from 37.49.226.178 port 40440
May 10 02:05:25 v26 sshd[25855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.226.178  user=r.r
May 10 02:05:27 v26 sshd[25855]: Failed password for r.r from 37.49.226.178 port 34450 ssh2
May 10 02:05:27 v26 sshd[25855]: Received disconnect from 37.49.226.178 port 34450:11: Normal Shutdown, Thank you for playing [preauth]
May 10 02:05:27 v26 sshd[25855]: Disconnected from 37.49.226.178 port 34450 [preauth]
May 10 02:05:34 v26 sshd[25870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.226.178  user=r.r
May 10 02:05:36 v26 sshd[25870]: Failed password for r.r from 37.49.226.178 port 58842 ssh2
May 10 02:05:36 v26 sshd[25870]: Received disconnect from 37.49.226.178 port 58842:11: Normal Shutdown, Thank you for playing [preauth]
May 10 02:05:36 v26 sshd[25870]: Disconnected from ........
-------------------------------
2020-05-10 19:45:53
54.37.233.192 attackbotsspam
May 10 10:07:39 sigma sshd\[23814\]: Invalid user ftpuser from 54.37.233.192May 10 10:07:41 sigma sshd\[23814\]: Failed password for invalid user ftpuser from 54.37.233.192 port 50300 ssh2
...
2020-05-10 19:49:37
82.99.206.18 attackspam
Brute-force attempt banned
2020-05-10 19:39:11
117.157.99.102 attack
IP reached maximum auth failures
2020-05-10 20:02:39
191.238.212.50 attackbotsspam
2020-05-10T10:50:28.754973v22018076590370373 sshd[3114]: Invalid user odoo from 191.238.212.50 port 50582
2020-05-10T10:50:28.762391v22018076590370373 sshd[3114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.238.212.50
2020-05-10T10:50:28.754973v22018076590370373 sshd[3114]: Invalid user odoo from 191.238.212.50 port 50582
2020-05-10T10:50:30.478908v22018076590370373 sshd[3114]: Failed password for invalid user odoo from 191.238.212.50 port 50582 ssh2
2020-05-10T11:05:16.513334v22018076590370373 sshd[20479]: Invalid user admin from 191.238.212.50 port 36784
...
2020-05-10 20:05:49
85.202.161.118 attackbots
2020-05-10T09:27:24.4250661240 sshd\[32393\]: Invalid user support from 85.202.161.118 port 41338
2020-05-10T09:27:24.4288911240 sshd\[32393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.202.161.118
2020-05-10T09:27:26.2616891240 sshd\[32393\]: Failed password for invalid user support from 85.202.161.118 port 41338 ssh2
...
2020-05-10 19:55:04
78.128.113.76 attackbots
2020-05-10 13:58:09 dovecot_plain authenticator failed for \(\[78.128.113.76\]\) \[78.128.113.76\]: 535 Incorrect authentication data \(set_id=backup@opso.it\)
2020-05-10 13:58:18 dovecot_plain authenticator failed for \(\[78.128.113.76\]\) \[78.128.113.76\]: 535 Incorrect authentication data
2020-05-10 13:58:29 dovecot_plain authenticator failed for \(\[78.128.113.76\]\) \[78.128.113.76\]: 535 Incorrect authentication data
2020-05-10 13:58:35 dovecot_plain authenticator failed for \(\[78.128.113.76\]\) \[78.128.113.76\]: 535 Incorrect authentication data
2020-05-10 13:58:49 dovecot_plain authenticator failed for \(\[78.128.113.76\]\) \[78.128.113.76\]: 535 Incorrect authentication data
2020-05-10 20:02:13
119.148.35.143 attack
2020-05-10T12:34:18.724461  sshd[6800]: Invalid user user1 from 119.148.35.143 port 56751
2020-05-10T12:34:18.906517  sshd[6800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.148.35.143
2020-05-10T12:34:18.724461  sshd[6800]: Invalid user user1 from 119.148.35.143 port 56751
2020-05-10T12:34:20.893723  sshd[6800]: Failed password for invalid user user1 from 119.148.35.143 port 56751 ssh2
...
2020-05-10 19:58:59
5.187.0.216 attack
SSH brute-force attempt
2020-05-10 19:39:57
79.137.84.214 attackbots
79.137.84.214 - - [10/May/2020:11:18:09 +0200] "GET /wp-login.php HTTP/1.1" 200 6124 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
79.137.84.214 - - [10/May/2020:11:18:11 +0200] "POST /wp-login.php HTTP/1.1" 200 6354 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
79.137.84.214 - - [10/May/2020:11:18:12 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-10 19:50:19

最近上报的IP列表

63.174.4.51 244.221.231.8 13.91.227.217 73.112.116.6
171.99.72.118 32.165.35.102 160.73.121.252 106.42.152.38
24.190.62.128 27.153.148.186 174.192.87.239 25.85.14.15
28.112.208.143 32.89.3.82 192.32.155.18 236.116.84.195
6.137.96.185 154.174.1.100 190.102.243.126 114.191.238.191