必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.120.174.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57939
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.120.174.197.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022602 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 14:40:56 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 197.174.120.214.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 214.120.174.197.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.136.109.82 attackbotsspam
10/22/2019-14:16:53.779324 45.136.109.82 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-23 03:51:00
77.136.205.4 attackbots
Lines containing failures of 77.136.205.4
Oct 22 13:22:17 server01 postfix/smtpd[31953]: connect from 4.205.136.77.rev.sfr.net[77.136.205.4]
Oct x@x
Oct x@x
Oct 22 13:22:18 server01 postfix/policy-spf[31956]: : Policy action=550 Please see hxxp://www.openspf.org/Why?s=mfrom;id=aba4fae%40orisline.es;ip=77.136.205.4;r=server01.2800km.de
Oct x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=77.136.205.4
2019-10-23 03:41:58
107.170.249.6 attackspam
2019-10-22T07:32:40.7545441495-001 sshd\[60745\]: Failed password for invalid user 1 from 107.170.249.6 port 52572 ssh2
2019-10-22T08:35:51.0006551495-001 sshd\[63364\]: Invalid user 1234 from 107.170.249.6 port 33405
2019-10-22T08:35:51.0081841495-001 sshd\[63364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.249.6
2019-10-22T08:35:52.9400891495-001 sshd\[63364\]: Failed password for invalid user 1234 from 107.170.249.6 port 33405 ssh2
2019-10-22T08:41:19.9163851495-001 sshd\[63607\]: Invalid user abc123 from 107.170.249.6 port 52983
2019-10-22T08:41:19.9236221495-001 sshd\[63607\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.249.6
...
2019-10-23 03:52:18
178.46.215.236 attack
23/tcp
[2019-10-22]1pkt
2019-10-23 03:25:44
193.112.23.81 attack
$f2bV_matches
2019-10-23 03:35:21
58.254.132.156 attackbots
Oct 22 21:44:12 server sshd\[16110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.254.132.156  user=root
Oct 22 21:44:14 server sshd\[16110\]: Failed password for root from 58.254.132.156 port 55154 ssh2
Oct 22 21:51:03 server sshd\[18025\]: Invalid user volmer from 58.254.132.156
Oct 22 21:51:03 server sshd\[18025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.254.132.156 
Oct 22 21:51:05 server sshd\[18025\]: Failed password for invalid user volmer from 58.254.132.156 port 55159 ssh2
...
2019-10-23 03:27:08
45.243.53.111 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-10-23 03:25:07
114.227.80.224 attack
Oct 22 07:27:19 esmtp postfix/smtpd[5831]: lost connection after AUTH from unknown[114.227.80.224]
Oct 22 07:27:21 esmtp postfix/smtpd[5831]: lost connection after AUTH from unknown[114.227.80.224]
Oct 22 07:27:24 esmtp postfix/smtpd[5831]: lost connection after AUTH from unknown[114.227.80.224]
Oct 22 07:27:27 esmtp postfix/smtpd[5831]: lost connection after AUTH from unknown[114.227.80.224]
Oct 22 07:27:29 esmtp postfix/smtpd[5831]: lost connection after AUTH from unknown[114.227.80.224]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=114.227.80.224
2019-10-23 03:54:59
178.242.57.248 attack
Automatic report - Port Scan Attack
2019-10-23 03:53:13
159.65.136.141 attackspam
Oct 22 20:59:24 mail sshd[28475]: Invalid user mustang from 159.65.136.141
Oct 22 20:59:24 mail sshd[28475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.136.141
Oct 22 20:59:24 mail sshd[28475]: Invalid user mustang from 159.65.136.141
Oct 22 20:59:26 mail sshd[28475]: Failed password for invalid user mustang from 159.65.136.141 port 54730 ssh2
Oct 22 21:09:59 mail sshd[29916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.136.141  user=root
Oct 22 21:10:01 mail sshd[29916]: Failed password for root from 159.65.136.141 port 58044 ssh2
...
2019-10-23 03:31:29
45.125.65.54 attack
\[2019-10-22 15:30:44\] SECURITY\[2046\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-22T15:30:44.325-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="1715201148413828003",SessionID="0x7f6130286de8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.65.54/54361",ACLName="no_extension_match"
\[2019-10-22 15:31:32\] SECURITY\[2046\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-22T15:31:32.239-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="2131401148632170017",SessionID="0x7f6130286de8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.65.54/64463",ACLName="no_extension_match"
\[2019-10-22 15:31:34\] SECURITY\[2046\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-22T15:31:34.675-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="1297101148323235034",SessionID="0x7f61300a2fa8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.65.54/52870",ACLNam
2019-10-23 03:52:44
112.105.151.65 attack
Honeypot attack, port: 23, PTR: 112-105-151-65.adsl.dynamic.seed.net.tw.
2019-10-23 04:02:46
43.229.89.197 attackspam
Oct 22 13:22:10 mxgate1 postfix/postscreen[9736]: CONNECT from [43.229.89.197]:50586 to [176.31.12.44]:25
Oct 22 13:22:10 mxgate1 postfix/dnsblog[9740]: addr 43.229.89.197 listed by domain cbl.abuseat.org as 127.0.0.2
Oct 22 13:22:10 mxgate1 postfix/dnsblog[10046]: addr 43.229.89.197 listed by domain zen.spamhaus.org as 127.0.0.11
Oct 22 13:22:10 mxgate1 postfix/dnsblog[10046]: addr 43.229.89.197 listed by domain zen.spamhaus.org as 127.0.0.4
Oct 22 13:22:10 mxgate1 postfix/dnsblog[9741]: addr 43.229.89.197 listed by domain b.barracudacentral.org as 127.0.0.2
Oct 22 13:22:16 mxgate1 postfix/postscreen[9736]: DNSBL rank 4 for [43.229.89.197]:50586
Oct x@x
Oct 22 13:22:17 mxgate1 postfix/postscreen[9736]: HANGUP after 0.79 from [43.229.89.197]:50586 in tests after SMTP handshake
Oct 22 13:22:17 mxgate1 postfix/postscreen[9736]: DISCONNECT [43.229.89.197]:50586


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=43.229.89.197
2019-10-23 03:40:01
106.12.23.128 attackspam
Oct 22 21:20:53 pkdns2 sshd\[34219\]: Invalid user org from 106.12.23.128Oct 22 21:20:56 pkdns2 sshd\[34219\]: Failed password for invalid user org from 106.12.23.128 port 47988 ssh2Oct 22 21:25:10 pkdns2 sshd\[34430\]: Invalid user bai123 from 106.12.23.128Oct 22 21:25:13 pkdns2 sshd\[34430\]: Failed password for invalid user bai123 from 106.12.23.128 port 56058 ssh2Oct 22 21:29:30 pkdns2 sshd\[34597\]: Invalid user conferenceroom from 106.12.23.128Oct 22 21:29:31 pkdns2 sshd\[34597\]: Failed password for invalid user conferenceroom from 106.12.23.128 port 35882 ssh2
...
2019-10-23 03:44:53
50.236.62.30 attack
Repeated brute force against a port
2019-10-23 04:00:39

最近上报的IP列表

53.213.209.88 60.161.245.71 153.112.230.36 70.39.105.128
249.50.140.201 227.20.166.244 192.135.35.93 249.84.42.108
143.139.101.108 169.193.126.146 115.85.155.79 31.99.182.175
247.200.175.197 73.105.14.125 71.88.135.219 194.119.160.90
21.68.122.89 41.38.231.199 95.169.197.69 147.202.199.20