必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.215.114.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25589
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.215.114.94.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030300 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 03 22:26:14 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 94.114.215.214.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 214.215.114.94.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
117.62.22.55 attackspam
Jun  1 04:32:51 srv05 sshd[9629]: reveeclipse mapping checking getaddrinfo for 55.22.62.117.broad.tz.js.dynamic.163data.com.cn [117.62.22.55] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun  1 04:32:51 srv05 sshd[9629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.62.22.55  user=r.r
Jun  1 04:32:52 srv05 sshd[9629]: Failed password for r.r from 117.62.22.55 port 55414 ssh2
Jun  1 04:32:53 srv05 sshd[9629]: Received disconnect from 117.62.22.55: 11: Bye Bye [preauth]
Jun  1 04:42:04 srv05 sshd[10054]: reveeclipse mapping checking getaddrinfo for 55.22.62.117.broad.tz.js.dynamic.163data.com.cn [117.62.22.55] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun  1 04:42:04 srv05 sshd[10054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.62.22.55  user=r.r
Jun  1 04:42:06 srv05 sshd[10054]: Failed password for r.r from 117.62.22.55 port 39016 ssh2
Jun  1 04:42:08 srv05 sshd[10054]: Received disconnect f........
-------------------------------
2020-06-02 06:25:50
87.251.74.50 attackbots
Jun  2 00:26:45 vps639187 sshd\[25390\]: Invalid user admin from 87.251.74.50 port 1658
Jun  2 00:26:46 vps639187 sshd\[25389\]: Invalid user  from 87.251.74.50 port 1160
Jun  2 00:26:46 vps639187 sshd\[25390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.251.74.50
...
2020-06-02 06:34:40
115.192.186.90 attackspam
2020-06-01T23:22[Censored Hostname] sshd[1923195]: Failed password for root from 115.192.186.90 port 59114 ssh2
2020-06-01T23:23[Censored Hostname] sshd[1923212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.192.186.90  user=root
2020-06-01T23:23[Censored Hostname] sshd[1923212]: Failed password for root from 115.192.186.90 port 52998 ssh2[...]
2020-06-02 06:17:22
190.119.190.122 attackspambots
55. On Jun 1 2020 experienced a Brute Force SSH login attempt -> 40 unique times by 190.119.190.122.
2020-06-02 06:50:44
129.211.70.33 attack
Invalid user ruben from 129.211.70.33 port 41222
2020-06-02 06:35:20
49.232.145.201 attackspam
Jun  1 22:40:20 inter-technics sshd[1233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.145.201  user=root
Jun  1 22:40:22 inter-technics sshd[1233]: Failed password for root from 49.232.145.201 port 54224 ssh2
Jun  1 22:44:49 inter-technics sshd[1536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.145.201  user=root
Jun  1 22:44:51 inter-technics sshd[1536]: Failed password for root from 49.232.145.201 port 46780 ssh2
Jun  1 22:49:21 inter-technics sshd[1910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.145.201  user=root
Jun  1 22:49:22 inter-technics sshd[1910]: Failed password for root from 49.232.145.201 port 39330 ssh2
...
2020-06-02 06:45:23
192.140.29.140 attack
Automatic report - Port Scan Attack
2020-06-02 06:24:54
177.159.23.102 attackbotsspam
1591042672 - 06/01/2020 22:17:52 Host: 177.159.23.102/177.159.23.102 Port: 445 TCP Blocked
2020-06-02 06:42:04
202.77.105.110 attack
Jun  2 00:16:01 ns381471 sshd[1292]: Failed password for root from 202.77.105.110 port 59298 ssh2
2020-06-02 06:36:08
125.74.28.28 attack
2020-06-01T20:06:35.568808randservbullet-proofcloud-66.localdomain sshd[16304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.28.28  user=root
2020-06-01T20:06:37.494189randservbullet-proofcloud-66.localdomain sshd[16304]: Failed password for root from 125.74.28.28 port 59584 ssh2
2020-06-01T20:17:35.559439randservbullet-proofcloud-66.localdomain sshd[16402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.28.28  user=root
2020-06-01T20:17:37.424583randservbullet-proofcloud-66.localdomain sshd[16402]: Failed password for root from 125.74.28.28 port 51324 ssh2
...
2020-06-02 06:51:21
167.99.202.143 attack
Jun  1 23:24:54 server sshd[21802]: Failed password for root from 167.99.202.143 port 57994 ssh2
Jun  1 23:32:23 server sshd[29422]: Failed password for root from 167.99.202.143 port 54550 ssh2
Jun  1 23:39:58 server sshd[4741]: Failed password for root from 167.99.202.143 port 51104 ssh2
2020-06-02 06:38:47
211.169.234.55 attackbotsspam
20 attempts against mh-ssh on cloud
2020-06-02 06:44:34
112.85.42.176 attackspambots
Jun  1 22:18:41 ip-172-31-61-156 sshd[28719]: Failed password for root from 112.85.42.176 port 34853 ssh2
Jun  1 22:18:44 ip-172-31-61-156 sshd[28719]: Failed password for root from 112.85.42.176 port 34853 ssh2
Jun  1 22:18:47 ip-172-31-61-156 sshd[28719]: Failed password for root from 112.85.42.176 port 34853 ssh2
Jun  1 22:18:47 ip-172-31-61-156 sshd[28719]: error: maximum authentication attempts exceeded for root from 112.85.42.176 port 34853 ssh2 [preauth]
Jun  1 22:18:47 ip-172-31-61-156 sshd[28719]: Disconnecting: Too many authentication failures [preauth]
...
2020-06-02 06:20:54
140.246.35.11 attackbots
Invalid user torg from 140.246.35.11 port 48950
2020-06-02 06:52:12
35.208.67.232 attackspam
2020-06-01T22:17:37.564540shield sshd\[5743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=232.67.208.35.bc.googleusercontent.com  user=root
2020-06-01T22:17:39.153346shield sshd\[5743\]: Failed password for root from 35.208.67.232 port 43272 ssh2
2020-06-01T22:21:16.900452shield sshd\[6227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=232.67.208.35.bc.googleusercontent.com  user=root
2020-06-01T22:21:18.545187shield sshd\[6227\]: Failed password for root from 35.208.67.232 port 48896 ssh2
2020-06-01T22:24:52.561078shield sshd\[6681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=232.67.208.35.bc.googleusercontent.com  user=root
2020-06-02 06:34:11

最近上报的IP列表

30.132.248.122 22.88.87.28 26.195.47.11 30.160.4.67
131.250.204.102 94.77.55.75 247.23.242.164 29.144.129.235
82.170.107.106 64.130.223.111 80.87.245.171 88.182.236.101
30.147.209.10 254.40.137.19 242.209.204.110 235.225.222.78
251.202.231.202 150.163.237.179 54.139.252.176 203.180.192.203