必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.7.117.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17379
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.7.117.136.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 08:44:51 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 136.117.7.214.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 214.7.117.136.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
88.233.55.23 attack
Automatic report - Port Scan Attack
2019-11-06 17:44:11
106.13.187.202 attackspambots
Nov  4 06:40:21 cumulus sshd[9411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.187.202  user=r.r
Nov  4 06:40:23 cumulus sshd[9411]: Failed password for r.r from 106.13.187.202 port 54496 ssh2
Nov  4 06:40:24 cumulus sshd[9411]: Received disconnect from 106.13.187.202 port 54496:11: Bye Bye [preauth]
Nov  4 06:40:24 cumulus sshd[9411]: Disconnected from 106.13.187.202 port 54496 [preauth]
Nov  4 07:07:00 cumulus sshd[10057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.187.202  user=r.r
Nov  4 07:07:02 cumulus sshd[10057]: Failed password for r.r from 106.13.187.202 port 35086 ssh2
Nov  4 07:07:03 cumulus sshd[10057]: Received disconnect from 106.13.187.202 port 35086:11: Bye Bye [preauth]
Nov  4 07:07:03 cumulus sshd[10057]: Disconnected from 106.13.187.202 port 35086 [preauth]
Nov  4 07:12:21 cumulus sshd[10308]: Invalid user student4 from 106.13.187.202 port 44192
No........
-------------------------------
2019-11-06 17:49:55
172.105.11.111 attack
172.105.11.111 was recorded 5 times by 5 hosts attempting to connect to the following ports: 3306. Incident counter (4h, 24h, all-time): 5, 5, 14
2019-11-06 17:49:22
118.26.22.50 attackspambots
Nov  5 19:51:47 srv3 sshd\[7053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.26.22.50  user=root
Nov  5 19:51:49 srv3 sshd\[7053\]: Failed password for root from 118.26.22.50 port 19791 ssh2
Nov  5 19:59:24 srv3 sshd\[7176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.26.22.50  user=root
Nov  5 20:12:12 srv3 sshd\[7422\]: Invalid user owncloud from 118.26.22.50
Nov  5 20:12:12 srv3 sshd\[7422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.26.22.50
Nov  5 20:12:14 srv3 sshd\[7422\]: Failed password for invalid user owncloud from 118.26.22.50 port 43440 ssh2
Nov  5 20:24:19 srv3 sshd\[7664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.26.22.50  user=root
Nov  5 20:24:21 srv3 sshd\[7664\]: Failed password for root from 118.26.22.50 port 30793 ssh2
Nov  5 20:28:18 srv3 sshd\[7701\]: In
...
2019-11-06 17:37:01
185.176.27.254 attackbotsspam
11/06/2019-04:48:34.837558 185.176.27.254 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-06 17:55:21
103.196.234.106 spambotsattackproxynormal
Blacklist IP. Full of not...
2019-11-06 17:37:51
119.196.83.14 attackspambots
2019-11-06T09:06:42.491324abusebot-7.cloudsearch.cf sshd\[19851\]: Invalid user cp from 119.196.83.14 port 44066
2019-11-06 17:50:59
110.139.2.19 attackbots
Automatic report - Port Scan Attack
2019-11-06 18:06:27
51.38.238.87 attackbots
Nov  6 08:22:05 work-partkepr sshd\[2162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.238.87  user=root
Nov  6 08:22:06 work-partkepr sshd\[2162\]: Failed password for root from 51.38.238.87 port 55306 ssh2
...
2019-11-06 17:55:56
159.89.154.19 attack
Nov  6 04:29:15 ny01 sshd[22765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.154.19
Nov  6 04:29:17 ny01 sshd[22765]: Failed password for invalid user openelec from 159.89.154.19 port 47304 ssh2
Nov  6 04:33:14 ny01 sshd[23104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.154.19
2019-11-06 17:34:57
112.140.185.64 attackbots
2019-11-06T10:29:06.235484scmdmz1 sshd\[11282\]: Invalid user pos from 112.140.185.64 port 42630
2019-11-06T10:29:06.238495scmdmz1 sshd\[11282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.140.185.64
2019-11-06T10:29:08.479312scmdmz1 sshd\[11282\]: Failed password for invalid user pos from 112.140.185.64 port 42630 ssh2
...
2019-11-06 17:39:21
89.107.68.192 attackbots
pixelfritteuse.de 89.107.68.192 \[06/Nov/2019:07:26:55 +0100\] "POST /wp-login.php HTTP/1.1" 200 5630 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
pixelfritteuse.de 89.107.68.192 \[06/Nov/2019:07:26:55 +0100\] "POST /xmlrpc.php HTTP/1.1" 301 464 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-06 17:31:00
91.121.101.159 attackspambots
ssh brute force
2019-11-06 17:37:56
113.125.23.185 attack
Nov  6 11:39:44 microserver sshd[28340]: Invalid user lsfadmin from 113.125.23.185 port 59106
Nov  6 11:39:44 microserver sshd[28340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.23.185
Nov  6 11:39:46 microserver sshd[28340]: Failed password for invalid user lsfadmin from 113.125.23.185 port 59106 ssh2
Nov  6 11:44:37 microserver sshd[28992]: Invalid user modserver from 113.125.23.185 port 38390
Nov  6 11:44:37 microserver sshd[28992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.23.185
Nov  6 11:59:55 microserver sshd[31038]: Invalid user db2fenc1 from 113.125.23.185 port 32818
Nov  6 11:59:55 microserver sshd[31038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.23.185
Nov  6 11:59:57 microserver sshd[31038]: Failed password for invalid user db2fenc1 from 113.125.23.185 port 32818 ssh2
Nov  6 12:04:47 microserver sshd[31716]: pam_unix(sshd:auth): authentic
2019-11-06 17:58:10
103.44.61.242 attackspam
Nov  5 19:35:31 srv3 sshd\[6763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.44.61.242  user=root
Nov  5 19:35:34 srv3 sshd\[6763\]: Failed password for root from 103.44.61.242 port 50644 ssh2
Nov  5 19:42:10 srv3 sshd\[6899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.44.61.242  user=root
Nov  5 19:55:58 srv3 sshd\[7124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.44.61.242  user=root
Nov  5 19:56:00 srv3 sshd\[7124\]: Failed password for root from 103.44.61.242 port 52218 ssh2
Nov  5 20:02:48 srv3 sshd\[7232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.44.61.242  user=root
...
2019-11-06 17:45:49

最近上报的IP列表

198.136.158.192 50.180.163.120 200.113.129.13 251.80.142.119
63.201.119.86 65.48.57.245 168.154.24.249 48.254.208.141
147.166.106.47 178.57.186.72 229.60.1.148 161.243.236.8
196.97.66.151 41.19.150.82 82.86.44.117 233.216.167.195
133.234.69.30 123.116.164.21 49.9.211.133 222.237.229.17