必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.246.32.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26259
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.246.32.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 21:52:36 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 142.32.246.214.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.32.246.214.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
64.225.99.7 attackbots
Apr  2 07:49:58 lukav-desktop sshd\[29832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.99.7  user=root
Apr  2 07:50:01 lukav-desktop sshd\[29832\]: Failed password for root from 64.225.99.7 port 34908 ssh2
Apr  2 07:53:40 lukav-desktop sshd\[30042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.99.7  user=root
Apr  2 07:53:43 lukav-desktop sshd\[30042\]: Failed password for root from 64.225.99.7 port 45814 ssh2
Apr  2 07:57:16 lukav-desktop sshd\[30261\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.99.7  user=root
2020-04-02 17:11:50
144.217.214.100 attackbotsspam
SSH login attempts.
2020-04-02 17:13:09
157.230.190.90 attack
2020-04-02T06:07:55.874990shield sshd\[14876\]: Invalid user user from 157.230.190.90 port 36792
2020-04-02T06:07:55.878816shield sshd\[14876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.190.90
2020-04-02T06:07:58.500675shield sshd\[14876\]: Failed password for invalid user user from 157.230.190.90 port 36792 ssh2
2020-04-02T06:13:10.366714shield sshd\[16720\]: Invalid user ts from 157.230.190.90 port 52270
2020-04-02T06:13:10.369959shield sshd\[16720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.190.90
2020-04-02 17:06:56
189.203.72.138 attack
Invalid user admin from 189.203.72.138 port 55298
2020-04-02 17:43:23
104.168.48.107 attackbotsspam
[2020-04-02 05:20:17] NOTICE[12114][C-000000c2] chan_sip.c: Call from '' (104.168.48.107:64931) to extension '011972592698190' rejected because extension not found in context 'public'.
[2020-04-02 05:20:17] SECURITY[12128] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-02T05:20:17.936-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011972592698190",SessionID="0x7f020c05ea88",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/104.168.48.107/64931",ACLName="no_extension_match"
[2020-04-02 05:20:17] NOTICE[12114][C-000000c3] chan_sip.c: Call from '' (104.168.48.107:64933) to extension '011970592698190' rejected because extension not found in context 'public'.
[2020-04-02 05:20:17] SECURITY[12128] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-02T05:20:17.936-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011970592698190",SessionID="0x7f020c0220b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IP
...
2020-04-02 17:22:28
184.13.240.142 attackspambots
Apr  2 02:04:53 vps46666688 sshd[24828]: Failed password for root from 184.13.240.142 port 40230 ssh2
...
2020-04-02 17:18:05
114.67.78.79 attackspambots
Invalid user wra from 114.67.78.79 port 57708
2020-04-02 17:41:50
182.31.182.124 attackspam
Port probing on unauthorized port 23
2020-04-02 17:46:34
148.70.178.70 attackspam
Apr  2 05:46:33 meumeu sshd[20472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.178.70 
Apr  2 05:46:35 meumeu sshd[20472]: Failed password for invalid user va from 148.70.178.70 port 59240 ssh2
Apr  2 05:52:46 meumeu sshd[21339]: Failed password for root from 148.70.178.70 port 41784 ssh2
...
2020-04-02 17:45:24
208.187.167.81 attackspambots
Apr  2 05:32:28 mail.srvfarm.net postfix/smtpd[1752159]: NOQUEUE: reject: RCPT from own.onvacationnow.com[208.187.167.81]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Apr  2 05:32:55 mail.srvfarm.net postfix/smtpd[1753889]: NOQUEUE: reject: RCPT from own.onvacationnow.com[208.187.167.81]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Apr  2 05:36:27 mail.srvfarm.net postfix/smtpd[1753858]: NOQUEUE: reject: RCPT from own.onvacationnow.com[208.187.167.81]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Apr  2 05:36:27 mail.srvfarm.net postfix/smtpd[1755246]: NOQUEUE: reject: RCPT from own.onvacationnow.
2020-04-02 17:20:27
45.14.150.130 attackspam
Apr  2 07:54:34 vpn01 sshd[12707]: Failed password for root from 45.14.150.130 port 53394 ssh2
...
2020-04-02 17:35:46
46.38.145.5 attackspambots
Apr  2 11:11:23 srv01 postfix/smtpd\[23451\]: warning: unknown\[46.38.145.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  2 11:11:53 srv01 postfix/smtpd\[11748\]: warning: unknown\[46.38.145.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  2 11:12:24 srv01 postfix/smtpd\[23451\]: warning: unknown\[46.38.145.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  2 11:12:54 srv01 postfix/smtpd\[4371\]: warning: unknown\[46.38.145.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  2 11:13:25 srv01 postfix/smtpd\[4371\]: warning: unknown\[46.38.145.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-04-02 17:25:40
117.102.66.149 attack
20/4/1@23:54:39: FAIL: Alarm-Network address from=117.102.66.149
...
2020-04-02 17:34:11
14.124.112.135 attackspambots
port scan and connect, tcp 23 (telnet)
2020-04-02 17:38:03
3.91.48.141 attack
failed_logins
2020-04-02 17:14:48

最近上报的IP列表

83.194.206.82 177.176.49.125 23.213.130.210 89.83.192.24
187.27.131.232 210.93.239.142 184.208.94.138 29.146.56.15
7.115.11.56 240.36.111.53 67.154.18.181 73.85.119.102
249.76.42.179 51.132.128.223 177.86.88.25 148.85.12.209
24.195.88.53 135.220.183.94 236.46.111.165 234.192.178.185