必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.14.58.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33746
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;221.14.58.13.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 11:05:05 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
13.58.14.221.in-addr.arpa domain name pointer hn.163.ppp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
13.58.14.221.in-addr.arpa	name = hn.163.ppp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.94.6.69 attackbotsspam
Apr 21 13:48:30 gw1 sshd[11324]: Failed password for root from 103.94.6.69 port 56045 ssh2
...
2020-04-21 17:17:52
65.182.2.241 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-04-21 17:16:46
91.216.164.252 attack
Unauthorized connection attempt detected, IP banned.
2020-04-21 17:29:44
106.13.35.176 attackbotsspam
sshd jail - ssh hack attempt
2020-04-21 17:37:27
162.243.128.32 attackspam
GPL DNS named version attempt - port: 53 proto: UDP cat: Attempted Information Leak
2020-04-21 17:32:24
206.189.66.165 attackspambots
206.189.66.165:50426 - - [21/Apr/2020:07:26:13 +0200] "GET /phpMyAdmin/ HTTP/1.1" 404 295
2020-04-21 17:18:58
35.194.64.202 attack
Apr 21 10:24:01 h1745522 sshd[27460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.194.64.202  user=root
Apr 21 10:24:03 h1745522 sshd[27460]: Failed password for root from 35.194.64.202 port 60964 ssh2
Apr 21 10:25:27 h1745522 sshd[27499]: Invalid user az from 35.194.64.202 port 53706
Apr 21 10:25:27 h1745522 sshd[27499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.194.64.202
Apr 21 10:25:27 h1745522 sshd[27499]: Invalid user az from 35.194.64.202 port 53706
Apr 21 10:25:29 h1745522 sshd[27499]: Failed password for invalid user az from 35.194.64.202 port 53706 ssh2
Apr 21 10:26:28 h1745522 sshd[27558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.194.64.202  user=root
Apr 21 10:26:34 h1745522 sshd[27558]: Failed password for root from 35.194.64.202 port 41756 ssh2
Apr 21 10:27:30 h1745522 sshd[27585]: pam_unix(sshd:auth): authentication failure; lo
...
2020-04-21 17:05:36
149.202.13.50 attackbots
2020-04-21T07:44:25.210156dmca.cloudsearch.cf sshd[22027]: Invalid user az from 149.202.13.50 port 44508
2020-04-21T07:44:25.215686dmca.cloudsearch.cf sshd[22027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.13.50
2020-04-21T07:44:25.210156dmca.cloudsearch.cf sshd[22027]: Invalid user az from 149.202.13.50 port 44508
2020-04-21T07:44:27.124074dmca.cloudsearch.cf sshd[22027]: Failed password for invalid user az from 149.202.13.50 port 44508 ssh2
2020-04-21T07:48:35.368728dmca.cloudsearch.cf sshd[22290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.13.50  user=root
2020-04-21T07:48:36.930864dmca.cloudsearch.cf sshd[22290]: Failed password for root from 149.202.13.50 port 60332 ssh2
2020-04-21T07:52:26.936927dmca.cloudsearch.cf sshd[22564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.13.50  user=root
2020-04-21T07:52:28.880152dmca.cloud
...
2020-04-21 17:02:22
213.176.34.28 attackbotsspam
srv03 Mass scanning activity detected Target: 6934  ..
2020-04-21 17:08:24
40.121.46.5 attackbotsspam
IDS multiserver
2020-04-21 17:10:03
180.76.133.216 attackbots
Apr 21 10:08:21 icinga sshd[29869]: Failed password for root from 180.76.133.216 port 41482 ssh2
Apr 21 11:03:24 icinga sshd[55084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.133.216 
Apr 21 11:03:27 icinga sshd[55084]: Failed password for invalid user ubuntu from 180.76.133.216 port 22380 ssh2
...
2020-04-21 17:13:26
202.152.0.14 attack
Apr 21 09:19:20 jane sshd[11532]: Failed password for root from 202.152.0.14 port 45528 ssh2
...
2020-04-21 17:14:22
96.2.166.182 attackspam
*Port Scan* detected from 96.2.166.182 (US/United States/South Dakota/Sioux Falls/96-2-166-182-dynamic.midco.net). 4 hits in the last 200 seconds
2020-04-21 17:12:53
123.207.153.52 attackbotsspam
20 attempts against mh-ssh on echoip
2020-04-21 17:13:05
111.230.166.245 attackbotsspam
SSH Brute-Force attacks
2020-04-21 17:06:55

最近上报的IP列表

55.39.49.228 221.82.11.217 228.106.64.216 148.170.73.45
26.195.164.189 229.73.201.203 227.245.125.172 125.14.232.20
153.25.122.34 89.100.116.131 202.8.56.62 220.204.83.68
97.144.49.233 30.197.240.5 245.165.1.20 156.218.56.31
130.13.37.25 43.214.76.171 114.47.38.64 79.101.173.188