必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.142.137.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49593
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.142.137.30.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022110800 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 08 18:04:01 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 30.137.142.214.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
server can't find 214.142.137.30.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.81.85.184 attackspambots
Automatic report generated by Wazuh
2019-07-30 21:05:24
35.247.187.68 attackspam
Automatic report - Banned IP Access
2019-07-30 20:44:58
223.71.139.97 attack
Triggered by Fail2Ban at Vostok web server
2019-07-30 20:50:14
114.243.128.227 attackspam
23/tcp
[2019-07-30]1pkt
2019-07-30 21:18:57
111.254.4.236 attackspambots
23/tcp
[2019-07-30]1pkt
2019-07-30 20:38:41
191.181.12.45 attackbots
2019-07-30T13:06:30.323816abusebot-7.cloudsearch.cf sshd\[27886\]: Invalid user hero from 191.181.12.45 port 33476
2019-07-30 21:19:39
142.93.15.179 attackbotsspam
Jul 30 10:24:19 vtv3 sshd\[8934\]: Invalid user sai from 142.93.15.179 port 57414
Jul 30 10:24:19 vtv3 sshd\[8934\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.15.179
Jul 30 10:24:21 vtv3 sshd\[8934\]: Failed password for invalid user sai from 142.93.15.179 port 57414 ssh2
Jul 30 10:29:46 vtv3 sshd\[11511\]: Invalid user angie from 142.93.15.179 port 52162
Jul 30 10:29:46 vtv3 sshd\[11511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.15.179
Jul 30 10:39:50 vtv3 sshd\[16689\]: Invalid user teamspeak from 142.93.15.179 port 41834
Jul 30 10:39:50 vtv3 sshd\[16689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.15.179
Jul 30 10:39:52 vtv3 sshd\[16689\]: Failed password for invalid user teamspeak from 142.93.15.179 port 41834 ssh2
Jul 30 10:45:02 vtv3 sshd\[19182\]: Invalid user kruspe from 142.93.15.179 port 36552
Jul 30 10:45:02 vtv3 sshd\[19182\]: pam
2019-07-30 20:33:26
190.211.160.253 attackspambots
Jul 30 14:06:52 mail1 sshd\[26641\]: Invalid user sanjay from 190.211.160.253 port 51810
Jul 30 14:06:52 mail1 sshd\[26641\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.211.160.253
Jul 30 14:06:54 mail1 sshd\[26641\]: Failed password for invalid user sanjay from 190.211.160.253 port 51810 ssh2
Jul 30 14:22:36 mail1 sshd\[1383\]: Invalid user hath from 190.211.160.253 port 56938
Jul 30 14:22:36 mail1 sshd\[1383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.211.160.253
...
2019-07-30 20:56:25
106.6.171.137 attackspambots
Jul 30 14:14:35 m3061 sshd[31097]: Invalid user admin from 106.6.171.137
Jul 30 14:14:35 m3061 sshd[31097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.6.171.137


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.6.171.137
2019-07-30 20:46:07
51.68.230.54 attack
Jul 30 14:22:45 [host] sshd[3338]: Invalid user oracle from 51.68.230.54
Jul 30 14:22:45 [host] sshd[3338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.230.54
Jul 30 14:22:48 [host] sshd[3338]: Failed password for invalid user oracle from 51.68.230.54 port 56374 ssh2
2019-07-30 20:44:15
89.248.162.168 attackspambots
30.07.2019 12:22:36 Connection to port 3689 blocked by firewall
2019-07-30 20:58:10
58.200.120.95 attackbotsspam
Jul 30 15:19:14 server sshd\[21801\]: Invalid user kerry from 58.200.120.95 port 23032
Jul 30 15:19:14 server sshd\[21801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.200.120.95
Jul 30 15:19:16 server sshd\[21801\]: Failed password for invalid user kerry from 58.200.120.95 port 23032 ssh2
Jul 30 15:22:49 server sshd\[28283\]: Invalid user sme from 58.200.120.95 port 43307
Jul 30 15:22:49 server sshd\[28283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.200.120.95
2019-07-30 20:42:14
194.126.182.131 attackspam
19/7/30@08:22:38: FAIL: Alarm-Intrusion address from=194.126.182.131
...
2019-07-30 20:54:16
104.248.215.110 attackbots
Automatic report - Banned IP Access
2019-07-30 21:22:06
103.240.245.16 attackspam
SPAM Delivery Attempt
2019-07-30 21:14:59

最近上报的IP列表

197.46.212.250 95.52.210.62 254.247.13.83 63.166.71.143
116.173.84.27 107.250.128.198 219.34.9.66 233.243.203.253
255.76.115.75 134.125.122.160 254.78.13.12 208.62.238.51
135.164.84.128 55.246.205.227 99.95.254.41 53.133.52.95
174.112.150.157 161.241.172.100 186.8.151.132 35.39.253.102