必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.52.207.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47711
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.52.207.106.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 23:21:54 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 106.207.52.214.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 214.52.207.106.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
67.207.95.12 attackbots
Aug 14 05:14:50 SilenceServices sshd[21579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.95.12
Aug 14 05:14:53 SilenceServices sshd[21579]: Failed password for invalid user std_p2 from 67.207.95.12 port 34538 ssh2
Aug 14 05:15:55 SilenceServices sshd[22848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.95.12
2019-08-14 15:35:20
49.70.117.131 attack
Port Scan: TCP/21
2019-08-14 15:53:33
51.83.40.213 attackbots
Aug 14 08:52:57 www sshd\[31112\]: Invalid user tfc from 51.83.40.213 port 34112
...
2019-08-14 15:34:17
95.211.140.230 attack
NAME : LEASEWEB CIDR :  SYN Flood DDoS Attack Netherlands "" - block certain countries :) IP: 95.211.140.230  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-08-14 15:38:51
212.237.33.52 attackbotsspam
"GET /CFIDE/administrator/ HTTP/1.1" 301 178 "-" "-"
2019-08-14 15:44:14
150.107.149.11 attackbotsspam
Aug 14 08:46:55 XXX sshd[51902]: Invalid user kevin from 150.107.149.11 port 45788
2019-08-14 15:51:39
200.23.234.215 attackbots
Brute force attempt
2019-08-14 15:45:45
185.220.101.27 attackspambots
Aug 14 09:23:29 km20725 sshd\[562\]: Failed password for root from 185.220.101.27 port 39895 ssh2Aug 14 09:23:32 km20725 sshd\[562\]: Failed password for root from 185.220.101.27 port 39895 ssh2Aug 14 09:23:35 km20725 sshd\[562\]: Failed password for root from 185.220.101.27 port 39895 ssh2Aug 14 09:23:37 km20725 sshd\[562\]: Failed password for root from 185.220.101.27 port 39895 ssh2
...
2019-08-14 15:41:58
80.82.64.127 attackspam
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-08-14 15:20:10
223.165.0.155 attack
firewall-block, port(s): 139/tcp
2019-08-14 15:09:59
218.92.0.193 attackbotsspam
Aug 14 08:42:11 debian64 sshd\[30227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.193  user=root
Aug 14 08:42:13 debian64 sshd\[30227\]: Failed password for root from 218.92.0.193 port 32292 ssh2
Aug 14 08:42:16 debian64 sshd\[30227\]: Failed password for root from 218.92.0.193 port 32292 ssh2
...
2019-08-14 15:34:43
58.209.212.29 attackbots
$f2bV_matches
2019-08-14 15:37:29
185.22.142.103 attackbots
Aug 14 04:01:48 XXX sshd[39835]: Invalid user tigger from 185.22.142.103 port 56060
2019-08-14 15:15:11
5.62.41.113 attackbotsspam
\[2019-08-14 03:36:53\] NOTICE\[2288\] chan_sip.c: Registration from '\' failed for '5.62.41.113:11661' - Wrong password
\[2019-08-14 03:36:53\] SECURITY\[2326\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-08-14T03:36:53.823-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="6356",SessionID="0x7ff4d0404308",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/5.62.41.113/50628",Challenge="1d0609a8",ReceivedChallenge="1d0609a8",ReceivedHash="76556985f02b629ed433f78d2b9c6a02"
\[2019-08-14 03:41:37\] NOTICE\[2288\] chan_sip.c: Registration from '\' failed for '5.62.41.113:11708' - Wrong password
\[2019-08-14 03:41:37\] SECURITY\[2326\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-08-14T03:41:37.809-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="5031",SessionID="0x7ff4d0404308",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/5.62.41.113/585
2019-08-14 15:43:28
59.49.99.124 attackspam
Aug 14 08:06:59 icinga sshd[28364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.49.99.124
Aug 14 08:07:01 icinga sshd[28364]: Failed password for invalid user admin from 59.49.99.124 port 51335 ssh2
...
2019-08-14 15:21:42

最近上报的IP列表

189.210.5.225 89.245.176.181 173.63.180.15 242.145.139.213
6.26.96.64 55.152.176.34 184.90.104.8 12.213.243.170
14.19.239.152 18.59.138.221 141.169.134.93 126.3.7.85
229.127.148.19 232.66.243.56 25.56.42.116 186.210.117.178
46.97.195.201 151.191.251.34 250.219.101.86 162.237.47.211