必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.86.147.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34858
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.86.147.157.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 08:52:51 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 157.147.86.214.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 214.86.147.157.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
208.58.129.131 attackspam
Aug 15 22:17:22 SilenceServices sshd[30371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.58.129.131
Aug 15 22:17:23 SilenceServices sshd[30371]: Failed password for invalid user ftpuser from 208.58.129.131 port 56158 ssh2
Aug 15 22:21:25 SilenceServices sshd[1828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.58.129.131
2019-08-16 04:35:10
181.124.155.252 attackspam
Aug 15 16:51:53 xtremcommunity sshd\[4341\]: Invalid user jonas from 181.124.155.252 port 32903
Aug 15 16:51:53 xtremcommunity sshd\[4341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.124.155.252
Aug 15 16:51:55 xtremcommunity sshd\[4341\]: Failed password for invalid user jonas from 181.124.155.252 port 32903 ssh2
Aug 15 16:58:12 xtremcommunity sshd\[4634\]: Invalid user silvano from 181.124.155.252 port 18237
Aug 15 16:58:12 xtremcommunity sshd\[4634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.124.155.252
...
2019-08-16 05:03:34
138.68.242.220 attackbotsspam
Aug 15 23:16:07 yabzik sshd[25894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.242.220
Aug 15 23:16:09 yabzik sshd[25894]: Failed password for invalid user mcguitaruser from 138.68.242.220 port 56416 ssh2
Aug 15 23:21:22 yabzik sshd[28029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.242.220
2019-08-16 04:36:06
85.136.108.102 attack
B: /wp-login.php attack
2019-08-16 04:41:48
85.144.226.170 attackbotsspam
Aug 15 10:35:36 sachi sshd\[11593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170-226-144-85.ftth.glasoperator.nl  user=root
Aug 15 10:35:39 sachi sshd\[11593\]: Failed password for root from 85.144.226.170 port 33960 ssh2
Aug 15 10:40:22 sachi sshd\[12087\]: Invalid user taivi from 85.144.226.170
Aug 15 10:40:22 sachi sshd\[12087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170-226-144-85.ftth.glasoperator.nl
Aug 15 10:40:24 sachi sshd\[12087\]: Failed password for invalid user taivi from 85.144.226.170 port 33896 ssh2
2019-08-16 04:58:41
109.251.68.112 attack
Aug 15 10:55:36 wbs sshd\[4676\]: Invalid user cpanel from 109.251.68.112
Aug 15 10:55:36 wbs sshd\[4676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.251.68.112
Aug 15 10:55:37 wbs sshd\[4676\]: Failed password for invalid user cpanel from 109.251.68.112 port 58578 ssh2
Aug 15 11:01:16 wbs sshd\[5130\]: Invalid user alex from 109.251.68.112
Aug 15 11:01:16 wbs sshd\[5130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.251.68.112
2019-08-16 05:17:36
37.189.160.249 attack
2019-08-15T20:56:54.416729abusebot-5.cloudsearch.cf sshd\[11622\]: Invalid user elena from 37.189.160.249 port 39246
2019-08-16 05:13:02
92.37.143.64 attack
Attempted attack on Synology NAS
2019-08-16 04:59:49
149.56.96.78 attackbotsspam
Aug 15 22:50:22 SilenceServices sshd[30800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.96.78
Aug 15 22:50:24 SilenceServices sshd[30800]: Failed password for invalid user test from 149.56.96.78 port 13704 ssh2
Aug 15 22:54:32 SilenceServices sshd[2421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.96.78
2019-08-16 05:15:01
195.110.35.103 attackbots
Aug 15 23:34:45 yabzik sshd[3448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.110.35.103
Aug 15 23:34:46 yabzik sshd[3448]: Failed password for invalid user admin from 195.110.35.103 port 40056 ssh2
Aug 15 23:39:20 yabzik sshd[5490]: Failed password for root from 195.110.35.103 port 34572 ssh2
2019-08-16 04:46:10
173.161.242.217 attackspam
Aug 15 22:21:02 MK-Soft-Root1 sshd\[31285\]: Invalid user ruth from 173.161.242.217 port 5642
Aug 15 22:21:02 MK-Soft-Root1 sshd\[31285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.161.242.217
Aug 15 22:21:05 MK-Soft-Root1 sshd\[31285\]: Failed password for invalid user ruth from 173.161.242.217 port 5642 ssh2
...
2019-08-16 04:54:19
202.162.208.202 attack
Aug 15 11:02:40 hiderm sshd\[5457\]: Invalid user emplazamiento from 202.162.208.202
Aug 15 11:02:40 hiderm sshd\[5457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.162.208.202
Aug 15 11:02:42 hiderm sshd\[5457\]: Failed password for invalid user emplazamiento from 202.162.208.202 port 43066 ssh2
Aug 15 11:07:53 hiderm sshd\[5922\]: Invalid user ejabberd from 202.162.208.202
Aug 15 11:07:53 hiderm sshd\[5922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.162.208.202
2019-08-16 05:15:36
59.25.197.154 attack
Aug 15 21:23:05 Ubuntu-1404-trusty-64-minimal sshd\[16682\]: Invalid user brenda from 59.25.197.154
Aug 15 21:23:05 Ubuntu-1404-trusty-64-minimal sshd\[16682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.25.197.154
Aug 15 21:23:07 Ubuntu-1404-trusty-64-minimal sshd\[16682\]: Failed password for invalid user brenda from 59.25.197.154 port 44752 ssh2
Aug 15 22:20:57 Ubuntu-1404-trusty-64-minimal sshd\[16289\]: Invalid user user9 from 59.25.197.154
Aug 15 22:20:57 Ubuntu-1404-trusty-64-minimal sshd\[16289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.25.197.154
2019-08-16 05:05:01
111.21.99.227 attackspam
Aug 15 21:37:15 debian sshd\[29952\]: Invalid user rizky from 111.21.99.227 port 47192
Aug 15 21:37:15 debian sshd\[29952\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.21.99.227
...
2019-08-16 04:51:31
49.88.112.90 attackbots
Aug 15 16:56:46 TORMINT sshd\[15744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.90  user=root
Aug 15 16:56:47 TORMINT sshd\[15744\]: Failed password for root from 49.88.112.90 port 42395 ssh2
Aug 15 16:56:54 TORMINT sshd\[15748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.90  user=root
...
2019-08-16 04:57:53

最近上报的IP列表

244.241.197.71 190.123.98.22 214.134.176.250 157.77.250.220
119.77.224.235 15.31.150.35 40.253.179.114 135.132.27.224
232.148.20.59 129.221.93.145 204.219.148.83 248.76.231.93
4.99.126.225 211.189.88.106 248.27.25.193 43.134.111.168
96.115.128.1 81.83.23.238 49.52.223.152 133.250.71.119