必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.252.42.90
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56571
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.252.42.90.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 07:57:33 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 90.42.252.214.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 214.252.42.90.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
85.244.47.238 attackspam
Dec  9 08:34:24 tux-35-217 sshd\[19944\]: Invalid user smackdown from 85.244.47.238 port 52151
Dec  9 08:34:24 tux-35-217 sshd\[19944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.244.47.238
Dec  9 08:34:27 tux-35-217 sshd\[19944\]: Failed password for invalid user smackdown from 85.244.47.238 port 52151 ssh2
Dec  9 08:44:07 tux-35-217 sshd\[20086\]: Invalid user test from 85.244.47.238 port 65025
Dec  9 08:44:07 tux-35-217 sshd\[20086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.244.47.238
...
2019-12-09 20:04:13
51.255.173.245 attackbots
Dec  9 12:44:49 fr01 sshd[24604]: Invalid user com from 51.255.173.245
Dec  9 12:44:49 fr01 sshd[24604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.173.245
Dec  9 12:44:49 fr01 sshd[24604]: Invalid user com from 51.255.173.245
Dec  9 12:44:51 fr01 sshd[24604]: Failed password for invalid user com from 51.255.173.245 port 58404 ssh2
...
2019-12-09 20:09:06
114.32.153.15 attack
Dec  9 01:08:42 tdfoods sshd\[7800\]: Invalid user eagon from 114.32.153.15
Dec  9 01:08:42 tdfoods sshd\[7800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114-32-153-15.hinet-ip.hinet.net
Dec  9 01:08:44 tdfoods sshd\[7800\]: Failed password for invalid user eagon from 114.32.153.15 port 41436 ssh2
Dec  9 01:15:38 tdfoods sshd\[8571\]: Invalid user shahroodi from 114.32.153.15
Dec  9 01:15:38 tdfoods sshd\[8571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114-32-153-15.hinet-ip.hinet.net
2019-12-09 20:02:40
91.121.11.44 attack
Dec  9 09:16:38 server sshd\[4502\]: Invalid user gdm from 91.121.11.44
Dec  9 09:16:38 server sshd\[4502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns23639.ip-91-121-11.eu 
Dec  9 09:16:40 server sshd\[4502\]: Failed password for invalid user gdm from 91.121.11.44 port 33207 ssh2
Dec  9 09:27:33 server sshd\[7658\]: Invalid user giertych from 91.121.11.44
Dec  9 09:27:33 server sshd\[7658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns23639.ip-91-121-11.eu 
...
2019-12-09 19:47:01
107.170.242.185 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.242.185  user=root
Failed password for root from 107.170.242.185 port 43554 ssh2
Invalid user named from 107.170.242.185 port 53280
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.242.185
Failed password for invalid user named from 107.170.242.185 port 53280 ssh2
2019-12-09 20:17:06
219.93.20.155 attackspambots
2019-12-09T11:13:50.582910abusebot-2.cloudsearch.cf sshd\[7183\]: Invalid user brodey from 219.93.20.155 port 60982
2019-12-09 19:35:31
54.39.104.30 attackbots
Dec  9 13:42:50 server sshd\[18704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns558643.ip-54-39-104.net  user=root
Dec  9 13:42:52 server sshd\[18704\]: Failed password for root from 54.39.104.30 port 52682 ssh2
Dec  9 13:51:45 server sshd\[21390\]: Invalid user alphabet from 54.39.104.30
Dec  9 13:51:45 server sshd\[21390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns558643.ip-54-39-104.net 
Dec  9 13:51:47 server sshd\[21390\]: Failed password for invalid user alphabet from 54.39.104.30 port 51538 ssh2
...
2019-12-09 19:55:38
112.85.42.178 attackspam
Dec  9 14:09:05 sauna sshd[72391]: Failed password for root from 112.85.42.178 port 16046 ssh2
Dec  9 14:09:09 sauna sshd[72391]: Failed password for root from 112.85.42.178 port 16046 ssh2
...
2019-12-09 20:15:23
185.200.118.50 attackbotsspam
firewall-block, port(s): 1080/tcp
2019-12-09 19:41:50
39.53.176.110 attack
Automatic report - Port Scan
2019-12-09 19:58:58
106.58.210.27 attackbotsspam
Dec  9 01:27:35 web1 postfix/smtpd[21776]: warning: unknown[106.58.210.27]: SASL LOGIN authentication failed: authentication failure
...
2019-12-09 19:40:06
103.57.185.54 attack
Dec  9 13:38:12 our-server-hostname postfix/smtpd[12889]: connect from unknown[103.57.185.54]
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec  9 13:38:17 our-server-hostname postfix/smtpd[12889]: lost connection after RCPT from unknown[103.57.185.54]
Dec  9 13:38:17 our-server-hostname postfix/smtpd[12889]: disconnect from unknown[103.57.185.54]
Dec  9 16:37:42 our-server-hostname postfix/smtpd[27052]: connect from unknown[103.57.185.54]
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.57.185.54
2019-12-09 20:15:47
119.254.155.187 attackspam
SSH brute-force: detected 6 distinct usernames within a 24-hour window.
2019-12-09 20:16:54
222.197.165.213 attack
Host Scan
2019-12-09 20:05:03
159.89.115.126 attackbotsspam
Dec  9 11:41:45 sshgateway sshd\[5230\]: Invalid user storelli from 159.89.115.126
Dec  9 11:41:45 sshgateway sshd\[5230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.115.126
Dec  9 11:41:47 sshgateway sshd\[5230\]: Failed password for invalid user storelli from 159.89.115.126 port 35172 ssh2
2019-12-09 19:46:25

最近上报的IP列表

142.199.159.148 55.254.13.209 195.123.227.16 165.81.185.185
247.97.50.198 7.214.140.183 177.88.186.175 113.78.127.128
85.32.204.36 150.159.233.220 120.123.115.206 253.252.190.84
97.134.204.181 157.207.39.37 225.90.179.107 203.233.133.94
141.195.151.9 115.210.12.71 168.226.78.111 94.102.214.167