必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.139.196.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18028
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.139.196.19.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022802 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 12:49:37 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 19.196.139.214.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 214.139.196.19.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
193.56.28.220 attackspam
2020-02-09T05:52:54.335856www postfix/smtpd[1058]: warning: unknown[193.56.28.220]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-02-09T05:53:02.388829www postfix/smtpd[1058]: warning: unknown[193.56.28.220]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-02-09T05:53:06.039860www postfix/smtpd[1071]: warning: unknown[193.56.28.220]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-02-09 17:14:13
193.112.44.102 attackbots
2020-02-09T01:50:06.1133971495-001 sshd[2806]: Invalid user gjd from 193.112.44.102 port 43670
2020-02-09T01:50:06.1221441495-001 sshd[2806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.44.102
2020-02-09T01:50:06.1133971495-001 sshd[2806]: Invalid user gjd from 193.112.44.102 port 43670
2020-02-09T01:50:08.1357771495-001 sshd[2806]: Failed password for invalid user gjd from 193.112.44.102 port 43670 ssh2
2020-02-09T01:52:39.0819551495-001 sshd[2905]: Invalid user wsk from 193.112.44.102 port 58138
2020-02-09T01:52:39.0861841495-001 sshd[2905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.44.102
2020-02-09T01:52:39.0819551495-001 sshd[2905]: Invalid user wsk from 193.112.44.102 port 58138
2020-02-09T01:52:41.1002231495-001 sshd[2905]: Failed password for invalid user wsk from 193.112.44.102 port 58138 ssh2
2020-02-09T01:55:28.4972221495-001 sshd[3076]: Invalid user bi from 193.112.44.1
...
2020-02-09 17:04:47
193.70.42.33 attackbots
Feb  9 05:53:35 odroid64 sshd\[24346\]: Invalid user eez from 193.70.42.33
Feb  9 05:53:35 odroid64 sshd\[24346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.42.33
...
2020-02-09 16:55:42
217.217.90.149 attackspam
Feb  9 09:34:22 legacy sshd[14443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.217.90.149
Feb  9 09:34:24 legacy sshd[14443]: Failed password for invalid user mkd from 217.217.90.149 port 44419 ssh2
Feb  9 09:37:31 legacy sshd[14548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.217.90.149
...
2020-02-09 16:49:12
78.161.110.72 attack
Unauthorized connection attempt detected from IP address 78.161.110.72 to port 445
2020-02-09 16:54:01
116.31.124.117 attackspambots
$f2bV_matches
2020-02-09 16:45:27
185.176.27.34 attackspam
02/09/2020-09:22:50.050127 185.176.27.34 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-02-09 17:06:32
36.79.249.249 attack
Automatic report - Port Scan Attack
2020-02-09 17:12:23
162.243.128.228 attack
Port probing on unauthorized port 6379
2020-02-09 17:11:53
140.82.23.29 attackbotsspam
Feb  9 07:55:54 legacy sshd[8251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.82.23.29
Feb  9 07:55:56 legacy sshd[8251]: Failed password for invalid user ymf from 140.82.23.29 port 48514 ssh2
Feb  9 07:59:08 legacy sshd[8480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.82.23.29
...
2020-02-09 16:56:16
222.186.30.187 attack
Feb  9 10:11:14 MK-Soft-VM4 sshd[12985]: Failed password for root from 222.186.30.187 port 44972 ssh2
Feb  9 10:11:17 MK-Soft-VM4 sshd[12985]: Failed password for root from 222.186.30.187 port 44972 ssh2
...
2020-02-09 17:14:41
5.30.251.83 attackbotsspam
SSH Brute Force
2020-02-09 16:52:21
188.151.3.0 attackspambots
23/tcp
[2020-02-09]1pkt
2020-02-09 16:31:18
178.128.124.204 attack
Feb  9 06:12:07 game-panel sshd[27018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.124.204
Feb  9 06:12:09 game-panel sshd[27018]: Failed password for invalid user ral from 178.128.124.204 port 49892 ssh2
Feb  9 06:15:40 game-panel sshd[27170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.124.204
2020-02-09 16:42:46
167.99.66.193 attackspam
Feb  9 08:16:43 mout sshd[27721]: Invalid user eut from 167.99.66.193 port 42063
2020-02-09 16:44:52

最近上报的IP列表

118.253.1.82 233.229.209.57 152.60.11.57 94.5.90.255
109.150.228.49 117.211.233.82 131.14.147.142 31.20.202.184
242.105.47.73 182.134.69.114 160.129.133.76 82.205.164.238
101.84.212.61 77.134.54.52 29.242.68.207 128.24.11.158
142.43.95.231 60.35.55.71 147.11.9.198 152.201.97.157