必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.32.198.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64545
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.32.198.150.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022600 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 18:23:17 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 150.198.32.214.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 214.32.198.150.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
148.72.153.211 attackspam
Scanning for exploits - /.env
2020-05-01 05:56:47
162.243.140.199 attack
trying to access non-authorized port
2020-05-01 06:10:29
122.114.157.7 attackbots
Invalid user peihongtao from 122.114.157.7 port 33262
2020-05-01 06:08:53
185.173.35.49 attackspambots
3000/tcp 5901/tcp 110/tcp...
[2020-03-03/04-29]49pkt,33pt.(tcp),4pt.(udp)
2020-05-01 06:09:30
94.191.90.85 attack
Invalid user donna from 94.191.90.85 port 38430
2020-05-01 06:05:26
94.200.86.70 attackbots
Honeypot attack, port: 81, PTR: PTR record not found
2020-05-01 06:15:21
212.92.108.64 attackspam
(From dhofmann@dblackagency.com) Thе best wоmеn for sеx in your tоwn UK: https://v.ht/8D0rA
2020-05-01 05:57:55
49.88.112.75 attackbotsspam
May  1 02:57:23 gw1 sshd[31811]: Failed password for root from 49.88.112.75 port 52423 ssh2
...
2020-05-01 06:11:14
222.186.30.218 attackspambots
Apr 30 23:40:50 * sshd[23364]: Failed password for root from 222.186.30.218 port 22665 ssh2
2020-05-01 05:44:37
222.186.31.83 attackbotsspam
30.04.2020 22:16:21 SSH access blocked by firewall
2020-05-01 06:18:45
170.130.187.54 attack
2563/tcp 8008/tcp 2232/tcp...
[2020-02-29/04-30]61pkt,23pt.(tcp),1pt.(udp)
2020-05-01 06:03:51
190.15.59.5 attack
Apr 30 23:49:52 eventyay sshd[7349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.15.59.5
Apr 30 23:49:54 eventyay sshd[7349]: Failed password for invalid user matt from 190.15.59.5 port 59010 ssh2
Apr 30 23:52:09 eventyay sshd[7457]: Failed password for root from 190.15.59.5 port 45125 ssh2
...
2020-05-01 05:53:59
157.245.91.72 attackspambots
Invalid user git from 157.245.91.72 port 52410
2020-05-01 06:13:44
45.67.235.29 attack
From adminreturn@semreajuste.live Thu Apr 30 17:54:11 2020
Received: from release-mx9.semreajuste.live ([45.67.235.29]:45809)
2020-05-01 06:00:52
162.243.130.173 attackbotsspam
21/tcp 3351/tcp 2095/tcp...
[2020-03-14/04-28]40pkt,33pt.(tcp),2pt.(udp)
2020-05-01 06:07:19

最近上报的IP列表

36.106.154.209 34.189.170.67 164.76.134.216 131.189.243.82
86.39.115.153 142.206.36.181 80.139.185.209 169.79.156.110
29.54.118.72 129.38.16.22 157.96.53.255 21.195.163.164
207.87.165.16 80.151.5.134 40.188.30.220 163.39.20.167
151.195.76.155 110.41.42.155 87.112.172.48 41.144.13.145