必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.41.120.171
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9220
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.41.120.171.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 19:41:34 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
b'Host 171.120.41.214.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 214.41.120.171.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.85.42.238 attack
F2B jail: sshd. Time: 2019-12-06 07:30:14, Reported by: VKReport
2019-12-06 14:56:52
181.197.13.218 attackspam
Invalid user gdm from 181.197.13.218 port 32943
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.197.13.218
Failed password for invalid user gdm from 181.197.13.218 port 32943 ssh2
Invalid user yahya from 181.197.13.218 port 51390
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.197.13.218
2019-12-06 14:49:50
191.6.82.244 attackspambots
" "
2019-12-06 14:48:56
49.48.52.20 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-12-06 15:07:50
112.85.42.227 attackbots
2019-12-06T06:26:59.515083hub.schaetter.us sshd\[29684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227  user=root
2019-12-06T06:27:01.459994hub.schaetter.us sshd\[29684\]: Failed password for root from 112.85.42.227 port 20386 ssh2
2019-12-06T06:27:03.588745hub.schaetter.us sshd\[29684\]: Failed password for root from 112.85.42.227 port 20386 ssh2
2019-12-06T06:27:06.615523hub.schaetter.us sshd\[29684\]: Failed password for root from 112.85.42.227 port 20386 ssh2
2019-12-06T06:29:57.571807hub.schaetter.us sshd\[29718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227  user=root
...
2019-12-06 15:19:04
188.165.130.148 attackbotsspam
Automatic report - XMLRPC Attack
2019-12-06 15:18:45
34.80.243.207 attack
Dec  6 06:52:22 venus sshd\[19048\]: Invalid user school from 34.80.243.207 port 49228
Dec  6 06:52:22 venus sshd\[19048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.80.243.207
Dec  6 06:52:24 venus sshd\[19048\]: Failed password for invalid user school from 34.80.243.207 port 49228 ssh2
...
2019-12-06 15:20:23
159.203.36.18 attackbots
Automatic report - Banned IP Access
2019-12-06 15:27:50
140.143.200.251 attack
Dec  6 07:23:46 vps666546 sshd\[22598\]: Invalid user f060 from 140.143.200.251 port 50624
Dec  6 07:23:46 vps666546 sshd\[22598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.200.251
Dec  6 07:23:49 vps666546 sshd\[22598\]: Failed password for invalid user f060 from 140.143.200.251 port 50624 ssh2
Dec  6 07:30:29 vps666546 sshd\[22766\]: Invalid user tacpro from 140.143.200.251 port 59962
Dec  6 07:30:29 vps666546 sshd\[22766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.200.251
...
2019-12-06 14:53:24
118.24.201.132 attackspambots
Dec  6 07:22:00 sd-53420 sshd\[15291\]: Invalid user kalene from 118.24.201.132
Dec  6 07:22:00 sd-53420 sshd\[15291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.201.132
Dec  6 07:22:01 sd-53420 sshd\[15291\]: Failed password for invalid user kalene from 118.24.201.132 port 38314 ssh2
Dec  6 07:30:06 sd-53420 sshd\[16763\]: Invalid user guest from 118.24.201.132
Dec  6 07:30:06 sd-53420 sshd\[16763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.201.132
...
2019-12-06 14:56:07
191.243.143.170 attackbots
$f2bV_matches
2019-12-06 15:12:53
78.128.113.124 attack
Postfix DNSBL listed. Trying to send SPAM.
2019-12-06 15:27:09
183.134.199.68 attack
$f2bV_matches
2019-12-06 15:19:26
77.232.128.87 attackbots
Dec  6 07:58:40 vps647732 sshd[16407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.232.128.87
Dec  6 07:58:41 vps647732 sshd[16407]: Failed password for invalid user guest from 77.232.128.87 port 46076 ssh2
...
2019-12-06 15:04:13
122.51.178.89 attackspam
Dec  6 07:49:06 jane sshd[11520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.178.89 
Dec  6 07:49:08 jane sshd[11520]: Failed password for invalid user server from 122.51.178.89 port 52860 ssh2
...
2019-12-06 14:55:24

最近上报的IP列表

132.53.127.185 98.132.148.30 234.87.183.89 194.193.163.82
42.214.15.249 29.72.145.168 126.199.113.98 57.20.194.141
180.58.74.41 22.190.0.212 53.241.108.6 187.216.153.96
155.237.159.197 25.25.140.245 79.172.163.6 114.91.248.85
175.229.248.229 224.169.43.71 191.149.112.132 205.132.153.200