必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.30.228.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 185
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.30.228.34.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 09:18:49 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 34.228.30.214.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 214.30.228.34.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.31.144 attackbots
Oct 12 08:27:45 jane sshd[27315]: Failed password for root from 222.186.31.144 port 46991 ssh2
Oct 12 08:27:48 jane sshd[27315]: Failed password for root from 222.186.31.144 port 46991 ssh2
...
2019-10-12 14:30:25
2a02:2f08:8802:2900:5ec:2087:55a3:7ce2 attackspam
C2,WP GET /wp-login.php
2019-10-12 14:39:59
149.202.95.126 attackbotsspam
WordPress XMLRPC scan :: 149.202.95.126 0.128 BYPASS [12/Oct/2019:17:03:30  1100] [censored_1] "POST /xmlrpc.php HTTP/1.1" 200 413 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-12 15:06:53
185.89.239.148 attack
10/12/2019-02:42:05.003812 185.89.239.148 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-12 14:43:27
198.199.84.154 attack
Oct 11 20:31:39 kapalua sshd\[27847\]: Invalid user Server\#1 from 198.199.84.154
Oct 11 20:31:39 kapalua sshd\[27847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.84.154
Oct 11 20:31:41 kapalua sshd\[27847\]: Failed password for invalid user Server\#1 from 198.199.84.154 port 34141 ssh2
Oct 11 20:35:43 kapalua sshd\[28156\]: Invalid user Personal@2017 from 198.199.84.154
Oct 11 20:35:43 kapalua sshd\[28156\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.84.154
2019-10-12 14:51:24
5.55.116.137 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/5.55.116.137/ 
 GR - 1H : (114)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : GR 
 NAME ASN : ASN3329 
 
 IP : 5.55.116.137 
 
 CIDR : 5.55.96.0/19 
 
 PREFIX COUNT : 167 
 
 UNIQUE IP COUNT : 788480 
 
 
 WYKRYTE ATAKI Z ASN3329 :  
  1H - 3 
  3H - 4 
  6H - 7 
 12H - 20 
 24H - 60 
 
 DateTime : 2019-10-12 08:04:20 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-12 14:33:02
106.12.49.244 attackbotsspam
Unauthorized SSH login attempts
2019-10-12 15:09:28
223.75.51.13 attack
Oct 12 08:17:11 eventyay sshd[24672]: Failed password for root from 223.75.51.13 port 56508 ssh2
Oct 12 08:20:32 eventyay sshd[24729]: Failed password for root from 223.75.51.13 port 14677 ssh2
...
2019-10-12 14:40:27
210.12.202.212 attack
[Aegis] @ 2019-10-12 07:03:17  0100 -> SSH insecure connection attempt (scan).
2019-10-12 15:11:36
222.186.31.145 attackbotsspam
2019-10-12T08:57:26.7875711240 sshd\[18436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.145  user=root
2019-10-12T08:57:28.3795981240 sshd\[18436\]: Failed password for root from 222.186.31.145 port 29597 ssh2
2019-10-12T08:57:30.8063871240 sshd\[18436\]: Failed password for root from 222.186.31.145 port 29597 ssh2
...
2019-10-12 14:59:12
159.65.157.194 attackbotsspam
Oct 12 09:22:11 sauna sshd[127228]: Failed password for root from 159.65.157.194 port 41606 ssh2
...
2019-10-12 14:27:30
93.125.99.128 attackspambots
Automatic report - Web App Attack
2019-10-12 14:26:34
59.173.19.66 attackbotsspam
$f2bV_matches_ltvn
2019-10-12 14:32:33
222.186.42.163 attack
Oct 12 08:30:08 localhost sshd\[3986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.163  user=root
Oct 12 08:30:10 localhost sshd\[3986\]: Failed password for root from 222.186.42.163 port 29207 ssh2
Oct 12 08:30:13 localhost sshd\[3986\]: Failed password for root from 222.186.42.163 port 29207 ssh2
2019-10-12 14:34:06
185.89.239.149 attack
10/12/2019-03:00:28.692355 185.89.239.149 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-12 15:00:41

最近上报的IP列表

37.122.24.96 110.44.149.116 81.248.131.251 244.148.193.148
219.173.207.109 162.56.149.108 224.103.196.18 56.108.35.105
45.225.123.8 193.148.160.152 99.58.185.210 173.16.16.71
51.129.175.128 67.201.109.232 202.42.197.40 94.101.205.80
166.107.216.48 164.210.89.99 218.106.13.66 140.215.249.222