必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Romania

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.214.200.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40541
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;46.214.200.146.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030601 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 07 06:52:26 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
146.200.214.46.in-addr.arpa domain name pointer 46-214-200-146.next-gen.ro.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
146.200.214.46.in-addr.arpa	name = 46-214-200-146.next-gen.ro.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
155.4.108.78 attack
Triggered by Fail2Ban at Ares web server
2019-09-14 17:40:43
92.118.37.74 attack
Sep 14 11:01:17 mc1 kernel: \[1002233.859721\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.74 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=8246 PROTO=TCP SPT=46525 DPT=38755 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 14 11:04:05 mc1 kernel: \[1002401.513413\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.74 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=10226 PROTO=TCP SPT=46525 DPT=42766 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 14 11:09:12 mc1 kernel: \[1002708.560417\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.74 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=19517 PROTO=TCP SPT=46525 DPT=39155 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-09-14 17:29:34
196.221.197.46 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-14 05:18:48,469 INFO [amun_request_handler] PortScan Detected on Port: 445 (196.221.197.46)
2019-09-14 18:04:47
95.167.190.227 attackspam
[portscan] Port scan
2019-09-14 18:14:36
67.182.89.30 attackspambots
Sep 14 11:06:35 icinga sshd[15709]: Failed password for root from 67.182.89.30 port 60760 ssh2
Sep 14 11:06:46 icinga sshd[15709]: error: maximum authentication attempts exceeded for root from 67.182.89.30 port 60760 ssh2 [preauth]
...
2019-09-14 17:08:18
182.150.42.165 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-14 05:23:35,253 INFO [amun_request_handler] PortScan Detected on Port: 445 (182.150.42.165)
2019-09-14 17:27:49
51.15.51.2 attack
Sep 14 10:29:45 mail sshd\[31572\]: Failed password for invalid user warehouse from 51.15.51.2 port 53150 ssh2
Sep 14 10:34:09 mail sshd\[32001\]: Invalid user tempuser from 51.15.51.2 port 45222
Sep 14 10:34:09 mail sshd\[32001\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.51.2
Sep 14 10:34:10 mail sshd\[32001\]: Failed password for invalid user tempuser from 51.15.51.2 port 45222 ssh2
Sep 14 10:38:29 mail sshd\[32452\]: Invalid user simona from 51.15.51.2 port 37858
Sep 14 10:38:29 mail sshd\[32452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.51.2
2019-09-14 17:46:50
203.48.246.66 attack
Sep 14 11:26:57 mail sshd\[6217\]: Invalid user webmaster from 203.48.246.66 port 48164
Sep 14 11:26:57 mail sshd\[6217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.48.246.66
Sep 14 11:26:58 mail sshd\[6217\]: Failed password for invalid user webmaster from 203.48.246.66 port 48164 ssh2
Sep 14 11:32:13 mail sshd\[6918\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.48.246.66  user=zabbix
Sep 14 11:32:14 mail sshd\[6918\]: Failed password for zabbix from 203.48.246.66 port 34166 ssh2
2019-09-14 17:44:32
104.211.216.173 attackspam
Sep 13 21:40:50 sachi sshd\[22967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.216.173  user=root
Sep 13 21:40:52 sachi sshd\[22967\]: Failed password for root from 104.211.216.173 port 44404 ssh2
Sep 13 21:45:13 sachi sshd\[23494\]: Invalid user ubuntu from 104.211.216.173
Sep 13 21:45:13 sachi sshd\[23494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.216.173
Sep 13 21:45:15 sachi sshd\[23494\]: Failed password for invalid user ubuntu from 104.211.216.173 port 57738 ssh2
2019-09-14 18:25:49
119.205.220.98 attack
F2B jail: sshd. Time: 2019-09-14 11:58:59, Reported by: VKReport
2019-09-14 18:20:37
169.1.10.180 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-14 05:22:39,718 INFO [amun_request_handler] PortScan Detected on Port: 445 (169.1.10.180)
2019-09-14 17:34:58
223.99.126.67 attack
Sep 14 07:51:08 ms-srv sshd[52103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.99.126.67
Sep 14 07:51:10 ms-srv sshd[52103]: Failed password for invalid user thunder from 223.99.126.67 port 33146 ssh2
2019-09-14 17:27:32
125.129.92.96 attackspam
Sep 14 10:44:37 markkoudstaal sshd[7618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.129.92.96
Sep 14 10:44:39 markkoudstaal sshd[7618]: Failed password for invalid user 123 from 125.129.92.96 port 41398 ssh2
Sep 14 10:50:10 markkoudstaal sshd[12089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.129.92.96
2019-09-14 17:05:22
51.68.82.218 attackbots
Sep 14 03:22:22 xtremcommunity sshd\[65454\]: Invalid user bret from 51.68.82.218 port 50708
Sep 14 03:22:22 xtremcommunity sshd\[65454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.82.218
Sep 14 03:22:24 xtremcommunity sshd\[65454\]: Failed password for invalid user bret from 51.68.82.218 port 50708 ssh2
Sep 14 03:26:47 xtremcommunity sshd\[65614\]: Invalid user administrator from 51.68.82.218 port 41242
Sep 14 03:26:47 xtremcommunity sshd\[65614\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.82.218
...
2019-09-14 17:23:41
81.145.158.178 attackspam
Sep 14 03:57:39 Tower sshd[4825]: Connection from 81.145.158.178 port 47673 on 192.168.10.220 port 22
Sep 14 03:57:42 Tower sshd[4825]: Invalid user ark from 81.145.158.178 port 47673
Sep 14 03:57:42 Tower sshd[4825]: error: Could not get shadow information for NOUSER
Sep 14 03:57:42 Tower sshd[4825]: Failed password for invalid user ark from 81.145.158.178 port 47673 ssh2
Sep 14 03:57:42 Tower sshd[4825]: Received disconnect from 81.145.158.178 port 47673:11: Bye Bye [preauth]
Sep 14 03:57:42 Tower sshd[4825]: Disconnected from invalid user ark 81.145.158.178 port 47673 [preauth]
2019-09-14 17:07:18

最近上报的IP列表

164.205.252.63 68.198.177.97 73.180.26.251 235.6.232.38
159.201.69.173 42.178.168.76 12.45.146.189 104.122.31.38
207.171.230.24 205.208.202.224 42.168.110.164 45.18.226.116
158.12.136.78 108.75.131.203 176.231.72.195 243.162.63.87
103.165.84.116 65.112.142.203 156.6.132.41 5.167.44.151