必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.214.139.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16544
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.214.139.131.		IN	A

;; AUTHORITY SECTION:
.			448	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 19:56:35 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
b';; connection timed out; no servers could be reached
'
NSLOOKUP信息:
server can't find 214.214.139.131.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
191.92.124.82 attackspam
2020-08-10T15:06:43.044520+02:00  sshd[15414]: Failed password for root from 191.92.124.82 port 54832 ssh2
2020-08-10 22:55:32
89.248.172.16 attack
 TCP (SYN) 89.248.172.16:24858 -> port 2067, len 44
2020-08-10 23:39:23
141.98.81.209 attack
Tried sshing with brute force.
2020-08-10 23:42:54
194.15.36.19 attackspam
Aug 10 14:41:11 ip-172-31-61-156 sshd[27770]: Invalid user oracle from 194.15.36.19
Aug 10 14:41:13 ip-172-31-61-156 sshd[27770]: Failed password for invalid user oracle from 194.15.36.19 port 59082 ssh2
Aug 10 14:41:25 ip-172-31-61-156 sshd[27778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.15.36.19  user=root
Aug 10 14:41:27 ip-172-31-61-156 sshd[27778]: Failed password for root from 194.15.36.19 port 41020 ssh2
Aug 10 14:41:39 ip-172-31-61-156 sshd[27787]: Invalid user postgres from 194.15.36.19
...
2020-08-10 23:26:21
103.210.72.49 attack
$f2bV_matches
2020-08-10 22:56:41
167.172.38.238 attackbotsspam
Aug 10 16:37:07 ns382633 sshd\[4273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.38.238  user=root
Aug 10 16:37:10 ns382633 sshd\[4273\]: Failed password for root from 167.172.38.238 port 42876 ssh2
Aug 10 16:51:19 ns382633 sshd\[6735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.38.238  user=root
Aug 10 16:51:22 ns382633 sshd\[6735\]: Failed password for root from 167.172.38.238 port 33204 ssh2
Aug 10 16:55:08 ns382633 sshd\[7354\]: Invalid user \~\#\$%\^\&\*\(\),.\; from 167.172.38.238 port 44428
Aug 10 16:55:08 ns382633 sshd\[7354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.38.238
2020-08-10 23:30:58
212.83.139.196 attackspambots
212.83.139.196 - - [10/Aug/2020:07:57:32 +1000] "POST /wp-login.php HTTP/1.0" 200 6261 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.83.139.196 - - [10/Aug/2020:13:12:46 +1000] "POST /wp-login.php HTTP/1.0" 200 6261 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.83.139.196 - - [10/Aug/2020:14:42:00 +1000] "POST /wp-login.php HTTP/1.0" 200 6261 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.83.139.196 - - [10/Aug/2020:16:11:11 +1000] "POST /wp-login.php HTTP/1.0" 200 6261 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.83.139.196 - - [10/Aug/2020:22:06:46 +1000] "POST /wp-login.php HTTP/1.0" 200 6261 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-10 22:53:58
106.12.59.23 attack
Aug 10 14:03:43 vm0 sshd[8830]: Failed password for root from 106.12.59.23 port 41320 ssh2
...
2020-08-10 23:22:12
14.170.20.11 attackspambots
1597061172 - 08/10/2020 14:06:12 Host: 14.170.20.11/14.170.20.11 Port: 445 TCP Blocked
2020-08-10 23:31:26
139.198.122.76 attackbotsspam
Aug 10 08:05:09 vm0 sshd[18596]: Failed password for root from 139.198.122.76 port 45824 ssh2
...
2020-08-10 23:02:17
106.13.234.36 attackbots
Aug 10 05:06:24 propaganda sshd[22157]: Connection from 106.13.234.36 port 43460 on 10.0.0.160 port 22 rdomain ""
Aug 10 05:06:25 propaganda sshd[22157]: Connection closed by 106.13.234.36 port 43460 [preauth]
2020-08-10 23:19:09
51.15.179.65 attack
2020-08-10T17:14:18.215811+02:00  sshd[17708]: Failed password for root from 51.15.179.65 port 34370 ssh2
2020-08-10 23:34:44
218.77.62.20 attack
Lines containing failures of 218.77.62.20
Aug 10 00:35:29 shared10 sshd[12840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.77.62.20  user=r.r
Aug 10 00:35:31 shared10 sshd[12840]: Failed password for r.r from 218.77.62.20 port 41664 ssh2
Aug 10 00:35:32 shared10 sshd[12840]: Received disconnect from 218.77.62.20 port 41664:11: Bye Bye [preauth]
Aug 10 00:35:32 shared10 sshd[12840]: Disconnected from authenticating user r.r 218.77.62.20 port 41664 [preauth]
Aug 10 00:51:18 shared10 sshd[20158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.77.62.20  user=r.r
Aug 10 00:51:20 shared10 sshd[20158]: Failed password for r.r from 218.77.62.20 port 41706 ssh2
Aug 10 00:51:20 shared10 sshd[20158]: Received disconnect from 218.77.62.20 port 41706:11: Bye Bye [preauth]
Aug 10 00:51:20 shared10 sshd[20158]: Disconnected from authenticating user r.r 218.77.62.20 port 41706 [preauth]
Aug 10 ........
------------------------------
2020-08-10 22:53:35
62.228.11.0 attack
Automatic report - Port Scan Attack
2020-08-10 22:54:15
185.213.155.169 attack
contact form abuse
2020-08-10 22:56:06

最近上报的IP列表

17.246.6.114 191.162.35.233 174.176.109.34 2.27.52.178
105.86.234.70 176.133.238.85 108.139.86.52 111.102.213.83
134.18.139.148 130.141.80.248 234.241.77.224 156.235.60.228
185.70.210.194 14.127.134.64 138.76.25.127 19.103.163.78
164.221.135.149 206.15.140.93 220.228.136.217 186.73.40.193