必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.148.68.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31273
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.148.68.143.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 05:33:49 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 143.68.148.214.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 214.148.68.143.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
172.108.154.2 attackspambots
Jul 23 23:17:11 srv-4 sshd\[12619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.108.154.2  user=root
Jul 23 23:17:13 srv-4 sshd\[12619\]: Failed password for root from 172.108.154.2 port 60650 ssh2
Jul 23 23:21:25 srv-4 sshd\[13010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.108.154.2  user=root
...
2019-07-24 05:27:05
67.205.178.183 attackspambots
fail2ban honeypot
2019-07-24 06:04:47
23.225.177.245 attack
HTTP/S authentication failure x 8 reported by Fail2Ban
...
2019-07-24 06:13:10
206.189.94.158 attackbots
Jul 24 03:53:28 itv-usvr-01 sshd[28962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.94.158  user=root
Jul 24 03:53:30 itv-usvr-01 sshd[28962]: Failed password for root from 206.189.94.158 port 38172 ssh2
2019-07-24 05:53:19
36.231.226.49 attackspambots
Jul 23 03:32:00 localhost kernel: [15111313.541341] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=36.231.226.49 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=52 ID=63185 PROTO=TCP SPT=45880 DPT=37215 WINDOW=43811 RES=0x00 SYN URGP=0 
Jul 23 03:32:00 localhost kernel: [15111313.541368] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=36.231.226.49 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=52 ID=63185 PROTO=TCP SPT=45880 DPT=37215 SEQ=758669438 ACK=0 WINDOW=43811 RES=0x00 SYN URGP=0 
Jul 23 16:21:25 localhost kernel: [15157478.760926] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=36.231.226.49 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=52 ID=33280 PROTO=TCP SPT=45880 DPT=37215 WINDOW=43811 RES=0x00 SYN URGP=0 
Jul 23 16:21:25 localhost kernel: [15157478.760955] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=36.231.226.49 DST=[mungedIP2] LEN=40 TOS=0x0
2019-07-24 05:29:12
112.78.177.15 attackbotsspam
Jul 23 23:57:51 mail sshd\[12643\]: Invalid user build from 112.78.177.15 port 57562
Jul 23 23:57:51 mail sshd\[12643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.78.177.15
Jul 23 23:57:52 mail sshd\[12643\]: Failed password for invalid user build from 112.78.177.15 port 57562 ssh2
Jul 24 00:03:03 mail sshd\[4803\]: Invalid user sistemas from 112.78.177.15 port 52496
Jul 24 00:03:03 mail sshd\[4803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.78.177.15
2019-07-24 06:11:26
46.101.27.6 attack
Invalid user postgres from 46.101.27.6 port 60384
2019-07-24 05:54:13
187.237.130.98 attackbots
Jul 23 21:23:14 ip-172-31-62-245 sshd\[2489\]: Invalid user angelica from 187.237.130.98\
Jul 23 21:23:15 ip-172-31-62-245 sshd\[2489\]: Failed password for invalid user angelica from 187.237.130.98 port 34072 ssh2\
Jul 23 21:28:00 ip-172-31-62-245 sshd\[2528\]: Invalid user dpn from 187.237.130.98\
Jul 23 21:28:02 ip-172-31-62-245 sshd\[2528\]: Failed password for invalid user dpn from 187.237.130.98 port 56834 ssh2\
Jul 23 21:32:53 ip-172-31-62-245 sshd\[2558\]: Invalid user apagar from 187.237.130.98\
2019-07-24 05:44:59
114.251.73.201 attackspambots
Jul 22 13:32:53 iberia postfix/smtpd[55013]: connect from unknown[114.251.73.201]
Jul 22 13:32:54 iberia postfix/smtpd[55013]: warning: unknown[114.251.73.201]: SASL LOGIN authentication failed: authentication failure
Jul 22 13:32:54 iberia postfix/smtpd[55013]: disconnect from unknown[114.251.73.201] helo=1 auth=0/1 quhostname=1 commands=2/3
Jul 22 13:32:54 iberia postfix/smtpd[55013]: connect from unknown[114.251.73.201]
Jul 22 13:32:56 iberia postfix/smtpd[55013]: warning: unknown[114.251.73.201]: SASL LOGIN authentication failed: authentication failure
Jul 22 13:32:56 iberia postfix/smtpd[55013]: disconnect from unknown[114.251.73.201] helo=1 auth=0/1 quhostname=1 commands=2/3
Jul 22 13:32:58 iberia postfix/smtpd[55013]: connect from unknown[114.251.73.201]
Jul 22 13:32:59 iberia postfix/smtpd[55013]: warning: unknown[114.251.73.201]: SASL LOGIN authentication failed: authentication failure
Jul 22 13:32:59 iberia postfix/smtpd[55013]: disconnect from unknown[114.251........
-------------------------------
2019-07-24 05:50:26
35.200.95.158 attackbots
Jul 23 22:57:09 mail sshd\[5064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.200.95.158  user=root
Jul 23 22:57:11 mail sshd\[5064\]: Failed password for root from 35.200.95.158 port 41130 ssh2
...
2019-07-24 06:07:16
89.171.20.210 attackbots
Jul 23 23:51:24 OPSO sshd\[30164\]: Invalid user el from 89.171.20.210 port 44700
Jul 23 23:51:24 OPSO sshd\[30164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.171.20.210
Jul 23 23:51:25 OPSO sshd\[30164\]: Failed password for invalid user el from 89.171.20.210 port 44700 ssh2
Jul 23 23:56:22 OPSO sshd\[31028\]: Invalid user verdaccio from 89.171.20.210 port 40700
Jul 23 23:56:22 OPSO sshd\[31028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.171.20.210
2019-07-24 06:14:42
132.255.254.140 attackbotsspam
Jul 23 21:37:17 localhost sshd\[24105\]: Invalid user sn from 132.255.254.140 port 36836
Jul 23 21:37:17 localhost sshd\[24105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.254.140
Jul 23 21:37:19 localhost sshd\[24105\]: Failed password for invalid user sn from 132.255.254.140 port 36836 ssh2
Jul 23 21:52:47 localhost sshd\[24586\]: Invalid user teamspeak from 132.255.254.140 port 35151
Jul 23 21:52:47 localhost sshd\[24586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.254.140
...
2019-07-24 06:05:47
35.154.209.14 attackspambots
fail2ban honeypot
2019-07-24 05:27:37
185.127.27.222 attackbots
Splunk® : port scan detected:
Jul 23 16:20:24 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:c0:42:d0:39:2c:30:08:00 SRC=185.127.27.222 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=18356 PROTO=TCP SPT=48932 DPT=3390 WINDOW=1024 RES=0x00 SYN URGP=0
2019-07-24 06:03:19
203.162.13.182 attack
" "
2019-07-24 05:58:12

最近上报的IP列表

28.20.207.242 191.169.114.83 93.68.15.140 72.114.177.141
141.142.226.232 110.35.61.229 26.26.200.220 253.114.62.91
137.90.65.233 219.240.139.123 162.251.62.97 57.248.253.231
17.64.170.13 140.128.188.254 210.255.47.20 152.79.98.230
38.15.158.135 114.252.169.175 225.90.61.61 200.201.8.42