必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.142.246.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32133
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.142.246.67.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022301 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 07:32:48 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 67.246.142.214.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 214.142.246.67.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.101.105.183 attackbots
Jul 29 12:08:18 vdcadm1 sshd[17156]: Address 46.101.105.183 maps to www.google.co.kr, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jul 29 12:08:18 vdcadm1 sshd[17156]: Invalid user ubnt from 46.101.105.183
Jul 29 12:08:18 vdcadm1 sshd[17157]: Received disconnect from 46.101.105.183: 11: Bye Bye
Jul 29 12:08:19 vdcadm1 sshd[17158]: Address 46.101.105.183 maps to www.google.co.kr, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jul 29 12:08:19 vdcadm1 sshd[17158]: Invalid user admin from 46.101.105.183
Jul 29 12:08:19 vdcadm1 sshd[17159]: Received disconnect from 46.101.105.183: 11: Bye Bye
Jul 29 12:08:19 vdcadm1 sshd[17160]: Address 46.101.105.183 maps to www.google.co.kr, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jul 29 12:08:19 vdcadm1 sshd[17160]: User r.r from 46.101.105.183 not allowed because listed in DenyUsers
Jul 29 12:08:19 vdcadm1 sshd[17161]: Received disconnect from 46.101.105.183........
-------------------------------
2020-07-29 21:24:52
191.234.167.166 attackspam
Jul 29 15:13:04 hosting sshd[22041]: Invalid user xguest from 191.234.167.166 port 33890
...
2020-07-29 21:32:59
171.233.103.199 attackspam
Automatic report - Port Scan Attack
2020-07-29 21:03:48
88.202.239.30 attackbots
E-Mail Spam (RBL) [REJECTED]
2020-07-29 21:37:29
178.128.144.227 attackspam
2020-07-29T07:14:24.550086linuxbox-skyline sshd[85369]: Invalid user xiaoyan from 178.128.144.227 port 45766
...
2020-07-29 21:23:05
160.202.162.67 attack
Jul 29 14:13:14 melroy-server sshd[10456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.202.162.67 
Jul 29 14:13:16 melroy-server sshd[10456]: Failed password for invalid user ekp from 160.202.162.67 port 32861 ssh2
...
2020-07-29 21:27:04
43.225.181.48 attackspam
Jul 29 19:16:56 webhost01 sshd[15686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.225.181.48
Jul 29 19:16:57 webhost01 sshd[15686]: Failed password for invalid user mikami from 43.225.181.48 port 54612 ssh2
...
2020-07-29 21:16:35
88.202.239.29 attack
E-Mail Spam (RBL) [REJECTED]
2020-07-29 21:40:14
222.186.173.154 attackbots
Jul 29 15:03:37 santamaria sshd\[4036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
Jul 29 15:03:40 santamaria sshd\[4036\]: Failed password for root from 222.186.173.154 port 14290 ssh2
Jul 29 15:03:43 santamaria sshd\[4036\]: Failed password for root from 222.186.173.154 port 14290 ssh2
...
2020-07-29 21:27:56
45.6.100.234 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-07-29 21:30:07
157.230.61.132 attackbots
Jul 29 13:14:48 ip-172-31-61-156 sshd[26167]: Invalid user zhaoguo from 157.230.61.132
Jul 29 13:14:50 ip-172-31-61-156 sshd[26167]: Failed password for invalid user zhaoguo from 157.230.61.132 port 59296 ssh2
Jul 29 13:14:48 ip-172-31-61-156 sshd[26167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.61.132
Jul 29 13:14:48 ip-172-31-61-156 sshd[26167]: Invalid user zhaoguo from 157.230.61.132
Jul 29 13:14:50 ip-172-31-61-156 sshd[26167]: Failed password for invalid user zhaoguo from 157.230.61.132 port 59296 ssh2
...
2020-07-29 21:19:26
51.91.247.125 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 39 - port: 2087 proto: tcp cat: Misc Attackbytes: 60
2020-07-29 21:16:07
112.85.42.176 attackspambots
Jul 29 15:03:55 pve1 sshd[18875]: Failed password for root from 112.85.42.176 port 24774 ssh2
Jul 29 15:03:59 pve1 sshd[18875]: Failed password for root from 112.85.42.176 port 24774 ssh2
...
2020-07-29 21:05:57
218.75.210.46 attackspam
Jul 29 15:00:15 home sshd[347463]: Invalid user ptao from 218.75.210.46 port 51812
Jul 29 15:00:15 home sshd[347463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.75.210.46 
Jul 29 15:00:15 home sshd[347463]: Invalid user ptao from 218.75.210.46 port 51812
Jul 29 15:00:17 home sshd[347463]: Failed password for invalid user ptao from 218.75.210.46 port 51812 ssh2
Jul 29 15:05:02 home sshd[350297]: Invalid user pcpqa from 218.75.210.46 port 32440
...
2020-07-29 21:16:49
106.13.82.231 attackspambots
Jul 29 14:38:57 inter-technics sshd[29595]: Invalid user pranava from 106.13.82.231 port 44096
Jul 29 14:38:57 inter-technics sshd[29595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.82.231
Jul 29 14:38:57 inter-technics sshd[29595]: Invalid user pranava from 106.13.82.231 port 44096
Jul 29 14:38:59 inter-technics sshd[29595]: Failed password for invalid user pranava from 106.13.82.231 port 44096 ssh2
Jul 29 14:41:30 inter-technics sshd[29861]: Invalid user liudingbo from 106.13.82.231 port 43642
...
2020-07-29 21:13:45

最近上报的IP列表

216.209.94.162 35.1.220.212 198.68.27.111 208.217.113.73
245.24.118.115 41.220.159.100 232.200.135.101 26.168.12.190
49.248.65.104 33.242.118.229 103.21.182.175 19.7.123.63
214.190.240.1 59.222.111.3 244.174.246.65 177.207.23.105
149.0.150.117 77.44.207.121 212.121.63.7 248.66.91.34