必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.52.42.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48893
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.52.42.194.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030101 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 02 06:41:53 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 194.42.52.214.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 214.52.42.194.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
131.108.245.53 attackbots
Brute force attempt
2019-08-18 02:21:53
80.248.6.153 attack
Aug 17 20:35:11 nextcloud sshd\[24710\]: Invalid user renee from 80.248.6.153
Aug 17 20:35:11 nextcloud sshd\[24710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.248.6.153
Aug 17 20:35:13 nextcloud sshd\[24710\]: Failed password for invalid user renee from 80.248.6.153 port 59466 ssh2
...
2019-08-18 02:59:49
129.204.3.37 attackspambots
Aug 17 18:59:23 mail sshd\[17685\]: Failed password for invalid user sam from 129.204.3.37 port 35660 ssh2
Aug 17 19:18:53 mail sshd\[18307\]: Invalid user user2 from 129.204.3.37 port 42598
Aug 17 19:18:53 mail sshd\[18307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.3.37
...
2019-08-18 02:23:14
150.109.106.224 attackbots
$f2bV_matches
2019-08-18 02:36:39
201.87.235.169 attackspam
WordPress XMLRPC scan :: 201.87.235.169 0.128 BYPASS [18/Aug/2019:04:35:27  1000] [censored_1] "GET /xmlrpc.php HTTP/1.1" 405 53 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1"
2019-08-18 02:46:16
157.230.94.168 attackspam
Aug 17 14:08:19 lcl-usvr-02 sshd[30600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.94.168  user=root
Aug 17 14:08:21 lcl-usvr-02 sshd[30600]: Failed password for root from 157.230.94.168 port 34358 ssh2
Aug 17 14:13:07 lcl-usvr-02 sshd[31662]: Invalid user conan from 157.230.94.168 port 53432
Aug 17 14:13:07 lcl-usvr-02 sshd[31662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.94.168
Aug 17 14:13:07 lcl-usvr-02 sshd[31662]: Invalid user conan from 157.230.94.168 port 53432
Aug 17 14:13:08 lcl-usvr-02 sshd[31662]: Failed password for invalid user conan from 157.230.94.168 port 53432 ssh2
...
2019-08-18 02:36:10
97.87.244.154 attackspam
DATE:2019-08-17 20:29:42,IP:97.87.244.154,MATCHES:10,PORT:ssh
2019-08-18 02:32:01
78.186.156.212 attack
Automatic report - Port Scan Attack
2019-08-18 02:34:33
177.44.17.113 attack
$f2bV_matches
2019-08-18 02:19:37
62.234.219.27 attack
Aug 17 08:45:33 aiointranet sshd\[3139\]: Invalid user kooroon from 62.234.219.27
Aug 17 08:45:33 aiointranet sshd\[3139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.219.27
Aug 17 08:45:35 aiointranet sshd\[3139\]: Failed password for invalid user kooroon from 62.234.219.27 port 37341 ssh2
Aug 17 08:50:46 aiointranet sshd\[3627\]: Invalid user ashok from 62.234.219.27
Aug 17 08:50:46 aiointranet sshd\[3627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.219.27
2019-08-18 02:58:19
167.99.202.143 attackspam
Aug 17 08:29:50 hiderm sshd\[1700\]: Invalid user er from 167.99.202.143
Aug 17 08:29:50 hiderm sshd\[1700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.202.143
Aug 17 08:29:53 hiderm sshd\[1700\]: Failed password for invalid user er from 167.99.202.143 port 35652 ssh2
Aug 17 08:35:27 hiderm sshd\[2349\]: Invalid user alfons from 167.99.202.143
Aug 17 08:35:27 hiderm sshd\[2349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.202.143
2019-08-18 02:45:13
111.67.205.230 attackbots
Aug 17 20:35:19 dedicated sshd[11395]: Invalid user ecastro from 111.67.205.230 port 50678
2019-08-18 02:52:22
201.241.8.243 attack
Aug 17 20:29:39 vps691689 sshd[30463]: Failed password for root from 201.241.8.243 port 46352 ssh2
Aug 17 20:35:35 vps691689 sshd[30711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.241.8.243
...
2019-08-18 02:39:55
171.25.193.77 attack
Aug 17 20:35:17 dedicated sshd[11393]: Invalid user cron from 171.25.193.77 port 14521
2019-08-18 02:56:41
49.69.244.199 attackspam
$f2bV_matches
2019-08-18 03:04:53

最近上报的IP列表

92.89.240.102 22.199.144.143 126.191.38.55 227.36.20.147
130.32.142.140 4.80.228.27 82.149.227.116 130.170.240.135
187.183.195.107 120.246.180.70 245.104.45.108 208.114.210.82
238.84.210.130 199.231.200.78 162.24.132.176 95.253.11.92
243.205.74.244 29.41.165.11 93.210.146.47 201.184.141.132