必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.240.150.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42987
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.240.150.136.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 11:27:33 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
b'Host 136.150.240.214.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 214.240.150.136.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.82.153.136 attackbots
2019-11-26 21:04:24,130 fail2ban.actions        \[2020\]: NOTICE  \[Postifx_Ban\] Ban 45.82.153.136
2019-11-26 21:42:04,441 fail2ban.actions        \[2020\]: NOTICE  \[Postifx_Ban\] Ban 45.82.153.136
2019-11-26 23:41:39,843 fail2ban.actions        \[2020\]: NOTICE  \[Postifx_Ban\] Ban 45.82.153.136
2019-11-27 00:05:10,949 fail2ban.actions        \[2020\]: NOTICE  \[Postifx_Ban\] Ban 45.82.153.136
2019-11-27 00:47:39,032 fail2ban.actions        \[2020\]: NOTICE  \[Postifx_Ban\] Ban 45.82.153.136
...
2019-11-27 07:48:36
178.128.18.231 attack
Nov 26 23:56:58 www sshd\[29193\]: Invalid user muh from 178.128.18.231 port 41488
...
2019-11-27 07:20:42
49.88.112.75 attackbots
Nov 27 00:22:32 vps666546 sshd\[7823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.75  user=root
Nov 27 00:22:33 vps666546 sshd\[7823\]: Failed password for root from 49.88.112.75 port 22603 ssh2
Nov 27 00:22:36 vps666546 sshd\[7823\]: Failed password for root from 49.88.112.75 port 22603 ssh2
Nov 27 00:22:38 vps666546 sshd\[7823\]: Failed password for root from 49.88.112.75 port 22603 ssh2
Nov 27 00:23:29 vps666546 sshd\[7872\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.75  user=root
...
2019-11-27 07:27:23
222.186.175.202 attackspambots
Nov 26 13:37:52 eddieflores sshd\[23165\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202  user=root
Nov 26 13:37:55 eddieflores sshd\[23165\]: Failed password for root from 222.186.175.202 port 36772 ssh2
Nov 26 13:38:04 eddieflores sshd\[23165\]: Failed password for root from 222.186.175.202 port 36772 ssh2
Nov 26 13:38:07 eddieflores sshd\[23165\]: Failed password for root from 222.186.175.202 port 36772 ssh2
Nov 26 13:38:10 eddieflores sshd\[23196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202  user=root
2019-11-27 07:43:37
187.144.190.140 attackbotsspam
port scan and connect, tcp 23 (telnet)
2019-11-27 07:27:54
197.50.199.96 attack
Automatic report - Port Scan Attack
2019-11-27 07:28:38
190.182.8.98 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/190.182.8.98/ 
 
 CO - 1H : (34)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CO 
 NAME ASN : ASN8163 
 
 IP : 190.182.8.98 
 
 CIDR : 190.182.8.0/24 
 
 PREFIX COUNT : 302 
 
 UNIQUE IP COUNT : 131072 
 
 
 ATTACKS DETECTED ASN8163 :  
  1H - 2 
  3H - 3 
  6H - 5 
 12H - 6 
 24H - 10 
 
 DateTime : 2019-11-26 23:56:52 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-27 07:24:50
59.112.252.241 attackspam
Nov 26 23:57:10 nextcloud sshd\[3040\]: Invalid user admin from 59.112.252.241
Nov 26 23:57:10 nextcloud sshd\[3040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.112.252.241
Nov 26 23:57:12 nextcloud sshd\[3040\]: Failed password for invalid user admin from 59.112.252.241 port 33791 ssh2
...
2019-11-27 07:12:07
222.186.173.226 attack
Triggered by Fail2Ban at Ares web server
2019-11-27 07:20:27
120.77.223.23 attackspam
fail2ban honeypot
2019-11-27 07:35:57
218.92.0.171 attackspambots
2019-11-26T23:35:25.892034shield sshd\[19119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.171  user=root
2019-11-26T23:35:28.511784shield sshd\[19119\]: Failed password for root from 218.92.0.171 port 16659 ssh2
2019-11-26T23:35:31.600795shield sshd\[19119\]: Failed password for root from 218.92.0.171 port 16659 ssh2
2019-11-26T23:35:34.433458shield sshd\[19119\]: Failed password for root from 218.92.0.171 port 16659 ssh2
2019-11-26T23:35:37.011508shield sshd\[19119\]: Failed password for root from 218.92.0.171 port 16659 ssh2
2019-11-27 07:37:08
185.30.13.217 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/185.30.13.217/ 
 
 RU - 1H : (66)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RU 
 NAME ASN : ASN24811 
 
 IP : 185.30.13.217 
 
 CIDR : 185.30.12.0/22 
 
 PREFIX COUNT : 5 
 
 UNIQUE IP COUNT : 6144 
 
 
 ATTACKS DETECTED ASN24811 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-26 23:56:52 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-27 07:25:33
150.249.114.20 attack
Nov 26 19:52:11 firewall sshd[30865]: Failed password for bin from 150.249.114.20 port 42522 ssh2
Nov 26 19:56:59 firewall sshd[30945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.249.114.20  user=root
Nov 26 19:57:01 firewall sshd[30945]: Failed password for root from 150.249.114.20 port 49148 ssh2
...
2019-11-27 07:18:56
46.101.17.215 attackspambots
Nov 27 00:24:44 legacy sshd[29163]: Failed password for root from 46.101.17.215 port 54170 ssh2
Nov 27 00:30:30 legacy sshd[29269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.17.215
Nov 27 00:30:32 legacy sshd[29269]: Failed password for invalid user wwwadmin from 46.101.17.215 port 33314 ssh2
...
2019-11-27 07:43:09
203.129.226.99 attackbotsspam
Nov 26 14:57:10 mockhub sshd[19536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.129.226.99
Nov 26 14:57:13 mockhub sshd[19536]: Failed password for invalid user alexa from 203.129.226.99 port 36231 ssh2
...
2019-11-27 07:12:38

最近上报的IP列表

142.89.17.147 4.110.55.207 199.80.102.169 5.5.40.178
26.120.43.83 71.126.146.198 239.198.248.144 249.25.31.0
139.86.163.49 153.93.144.125 178.108.167.156 221.39.117.146
141.68.10.155 224.244.193.97 177.213.20.10 221.12.33.70
140.232.93.158 245.112.37.58 177.199.94.165 239.236.87.96