必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.214.203.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5888
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;216.214.203.148.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Aug 12 13:53:23 CST 2019
;; MSG SIZE  rcvd: 119
HOST信息:
148.203.214.216.in-addr.arpa domain name pointer static-216-214-203-148.isp.broadviewnet.net.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
148.203.214.216.in-addr.arpa	name = static-216-214-203-148.isp.broadviewnet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
62.102.148.68 attackspam
$f2bV_matches
2020-09-04 14:15:40
41.232.149.241 attackspam
Port Scan detected!
...
2020-09-04 13:59:02
106.13.18.86 attackspam
Sep  4 03:41:33 roki-contabo sshd\[2722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.18.86  user=root
Sep  4 03:41:35 roki-contabo sshd\[2722\]: Failed password for root from 106.13.18.86 port 39604 ssh2
Sep  4 03:53:25 roki-contabo sshd\[2837\]: Invalid user www from 106.13.18.86
Sep  4 03:53:25 roki-contabo sshd\[2837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.18.86
Sep  4 03:53:27 roki-contabo sshd\[2837\]: Failed password for invalid user www from 106.13.18.86 port 42920 ssh2
...
2020-09-04 14:16:08
51.158.107.168 attack
Sep  4 03:18:22 prod4 sshd\[7331\]: Failed password for root from 51.158.107.168 port 39212 ssh2
Sep  4 03:21:40 prod4 sshd\[8234\]: Invalid user starbound from 51.158.107.168
Sep  4 03:21:42 prod4 sshd\[8234\]: Failed password for invalid user starbound from 51.158.107.168 port 47076 ssh2
...
2020-09-04 14:09:02
69.251.82.109 attackbotsspam
Sep 4 06:17:07 *hidden* sshd[11106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.251.82.109 Sep 4 06:17:09 *hidden* sshd[11106]: Failed password for invalid user sandbox from 69.251.82.109 port 46458 ssh2 Sep 4 06:24:15 *hidden* sshd[12238]: Invalid user cacti from 69.251.82.109 port 32944
2020-09-04 14:02:40
85.62.1.30 attackspambots
20/9/3@15:33:24: FAIL: Alarm-Network address from=85.62.1.30
20/9/3@15:33:24: FAIL: Alarm-Network address from=85.62.1.30
...
2020-09-04 14:17:11
201.132.110.82 attackspambots
1599151726 - 09/03/2020 18:48:46 Host: 201.132.110.82/201.132.110.82 Port: 445 TCP Blocked
2020-09-04 14:10:48
106.51.113.15 attackbotsspam
Sep  4 07:51:50 home sshd[630440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.113.15 
Sep  4 07:51:50 home sshd[630440]: Invalid user lijing from 106.51.113.15 port 58917
Sep  4 07:51:51 home sshd[630440]: Failed password for invalid user lijing from 106.51.113.15 port 58917 ssh2
Sep  4 07:53:59 home sshd[630675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.113.15  user=root
Sep  4 07:54:01 home sshd[630675]: Failed password for root from 106.51.113.15 port 45764 ssh2
...
2020-09-04 14:01:49
62.193.151.59 attack
Brute force attempt
2020-09-04 14:04:26
168.90.229.209 attackspam
DATE:2020-09-03 18:48:11, IP:168.90.229.209, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-09-04 13:50:08
222.186.169.194 attackbotsspam
Sep  4 08:08:04 nextcloud sshd\[6878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194  user=root
Sep  4 08:08:06 nextcloud sshd\[6878\]: Failed password for root from 222.186.169.194 port 54856 ssh2
Sep  4 08:08:25 nextcloud sshd\[7244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194  user=root
2020-09-04 14:12:34
200.119.138.42 attackspambots
failed_logins
2020-09-04 13:42:21
118.107.130.93 attack
Sep  3 18:48:56 mellenthin postfix/smtpd[20979]: NOQUEUE: reject: RCPT from unknown[118.107.130.93]: 554 5.7.1 Service unavailable; Client host [118.107.130.93] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/118.107.130.93 / https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=<118-107-130-91.snet.net.pk>
2020-09-04 14:01:31
85.70.201.97 attackbots
Sep  3 18:49:21 mellenthin postfix/smtpd[21052]: NOQUEUE: reject: RCPT from 97.201.broadband3.iol.cz[85.70.201.97]: 554 5.7.1 Service unavailable; Client host [85.70.201.97] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/85.70.201.97; from= to= proto=ESMTP helo=<97.201.broadband3.iol.cz>
2020-09-04 13:38:05
201.48.115.236 attackspam
Invalid user wxd from 201.48.115.236 port 33940
2020-09-04 13:56:16

最近上报的IP列表

115.203.128.254 45.76.222.255 45.70.167.219 69.128.33.154
37.114.162.222 45.65.212.212 43.248.24.171 211.75.194.216
36.89.30.58 185.233.187.216 51.15.178.114 89.25.24.252
68.183.199.163 185.147.83.156 47.52.221.4 190.217.181.189
119.86.183.75 192.56.123.1 201.17.26.180 15.12.202.60