必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 222.14.107.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29081
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;222.14.107.214.			IN	A

;; AUTHORITY SECTION:
.			496	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019103000 1800 900 604800 86400

;; Query time: 723 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 31 00:50:01 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
214.107.14.222.in-addr.arpa domain name pointer ZR107214.ppp.dion.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.107.14.222.in-addr.arpa	name = ZR107214.ppp.dion.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
198.245.61.79 attack
WordPress
2020-09-01 12:30:18
23.106.159.187 attackspam
Sep  1 06:23:02 abendstille sshd\[21598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.106.159.187  user=root
Sep  1 06:23:04 abendstille sshd\[21598\]: Failed password for root from 23.106.159.187 port 43419 ssh2
Sep  1 06:25:34 abendstille sshd\[23872\]: Invalid user soap from 23.106.159.187
Sep  1 06:25:34 abendstille sshd\[23872\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.106.159.187
Sep  1 06:25:37 abendstille sshd\[23872\]: Failed password for invalid user soap from 23.106.159.187 port 58258 ssh2
...
2020-09-01 12:35:39
193.36.119.15 attackspambots
Sep  1 03:55:52 *** sshd[11702]: Invalid user usuario from 193.36.119.15
2020-09-01 12:36:55
50.63.196.83 attackbots
xmlrpc attack
2020-09-01 12:42:40
81.68.77.53 attackbots
Sep  1 06:55:54 hosting sshd[11234]: Invalid user gangadhar from 81.68.77.53 port 35080
...
2020-09-01 12:40:56
103.102.148.34 attackbotsspam
xmlrpc attack
2020-09-01 12:38:56
193.32.126.162 attack
Sep  1 05:55:46 ovpn sshd\[2638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.32.126.162  user=root
Sep  1 05:55:48 ovpn sshd\[2638\]: Failed password for root from 193.32.126.162 port 22735 ssh2
Sep  1 05:55:50 ovpn sshd\[2638\]: Failed password for root from 193.32.126.162 port 22735 ssh2
Sep  1 05:55:57 ovpn sshd\[2638\]: Failed password for root from 193.32.126.162 port 22735 ssh2
Sep  1 05:55:58 ovpn sshd\[2638\]: Failed password for root from 193.32.126.162 port 22735 ssh2
2020-09-01 12:33:41
190.201.120.47 attack
Port Scan
...
2020-09-01 12:54:39
117.93.94.83 attackspambots
(ftpd) Failed FTP login from 117.93.94.83 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Sep  1 08:25:56 ir1 pure-ftpd: (?@117.93.94.83) [WARNING] Authentication failed for user [anonymous]
2020-09-01 12:37:46
42.118.129.58 attack
Automatic report - Port Scan Attack
2020-09-01 12:35:23
212.70.149.52 attack
Sep  1 06:57:00 srv01 postfix/smtpd\[24404\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  1 06:57:02 srv01 postfix/smtpd\[24425\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  1 06:57:07 srv01 postfix/smtpd\[24412\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  1 06:57:07 srv01 postfix/smtpd\[28058\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  1 06:57:27 srv01 postfix/smtpd\[24404\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-01 12:57:51
222.186.42.213 attackspambots
[SID1] Fail2ban detected 5 failed SSH login attempts within 30 minutes. This report was submitted automatically.
2020-09-01 13:03:34
61.146.72.252 attack
Invalid user cecilia from 61.146.72.252 port 54673
2020-09-01 13:06:32
111.93.58.18 attackbotsspam
Sep  1 04:08:28 vps-51d81928 sshd[142842]: Invalid user elastic from 111.93.58.18 port 48186
Sep  1 04:08:28 vps-51d81928 sshd[142842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.58.18 
Sep  1 04:08:28 vps-51d81928 sshd[142842]: Invalid user elastic from 111.93.58.18 port 48186
Sep  1 04:08:29 vps-51d81928 sshd[142842]: Failed password for invalid user elastic from 111.93.58.18 port 48186 ssh2
Sep  1 04:11:04 vps-51d81928 sshd[142872]: Invalid user ajay from 111.93.58.18 port 55930
...
2020-09-01 12:41:28
97.74.24.196 attackbots
xmlrpc attack
2020-09-01 13:05:38

最近上报的IP列表

34.149.20.118 169.70.237.121 85.144.19.136 255.206.133.163
74.83.4.215 106.126.38.156 202.238.73.18 160.106.72.97
239.55.103.188 244.196.115.228 109.48.188.213 187.8.179.229
165.152.24.161 252.31.121.101 31.162.205.146 57.44.189.96
5.40.149.24 235.225.179.24 10.41.109.24 213.189.55.85