必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Valea Seacă

省份(region): Bacau

国家(country): Romania

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.214.203.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64477
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;46.214.203.121.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 11:56:01 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
121.203.214.46.in-addr.arpa domain name pointer groupmetal.ro.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
121.203.214.46.in-addr.arpa	name = groupmetal.ro.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
111.106.152.122 attack
May 01 07:45:17 tcp        0      0 r.ca:22            111.106.152.122:57773       SYN_RECV
2020-05-02 03:07:48
196.204.23.209 attackspambots
445/tcp 445/tcp
[2020-05-01]2pkt
2020-05-02 03:26:47
170.81.238.143 attackbotsspam
88/tcp
[2020-05-01]1pkt
2020-05-02 03:36:13
128.199.36.177 attackspambots
May  1 19:41:18 server sshd[52105]: Failed password for invalid user aj from 128.199.36.177 port 58666 ssh2
May  1 19:51:46 server sshd[61219]: Failed password for invalid user linux from 128.199.36.177 port 59574 ssh2
May  1 19:56:15 server sshd[64993]: Failed password for invalid user admin from 128.199.36.177 port 41674 ssh2
2020-05-02 03:03:47
152.136.186.34 attackspambots
Apr 30 00:38:05 new sshd[25079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.186.34  user=r.r
Apr 30 00:38:07 new sshd[25079]: Failed password for r.r from 152.136.186.34 port 56566 ssh2
Apr 30 00:38:08 new sshd[25079]: Received disconnect from 152.136.186.34: 11: Bye Bye [preauth]
Apr 30 00:46:35 new sshd[27611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.186.34  user=r.r
Apr 30 00:46:37 new sshd[27611]: Failed password for r.r from 152.136.186.34 port 60252 ssh2
Apr 30 00:46:37 new sshd[27611]: Received disconnect from 152.136.186.34: 11: Bye Bye [preauth]
Apr 30 00:51:05 new sshd[28805]: Failed password for invalid user xxxxxx from 152.136.186.34 port 51236 ssh2
Apr 30 00:51:05 new sshd[28805]: Received disconnect from 152.136.186.34: 11: Bye Bye [preauth]
Apr 30 00:55:25 new sshd[30185]: Failed password for invalid user adminixxxr from 152.136.186.34 port 42228 s........
-------------------------------
2020-05-02 02:58:31
185.50.149.32 attack
May  1 20:47:14 mail.srvfarm.net postfix/smtpd[1397725]: warning: unknown[185.50.149.32]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  1 20:47:14 mail.srvfarm.net postfix/smtpd[1397725]: lost connection after AUTH from unknown[185.50.149.32]
May  1 20:47:22 mail.srvfarm.net postfix/smtpd[1401774]: lost connection after AUTH from unknown[185.50.149.32]
May  1 20:47:28 mail.srvfarm.net postfix/smtpd[1397730]: lost connection after AUTH from unknown[185.50.149.32]
May  1 20:47:37 mail.srvfarm.net postfix/smtpd[1381698]: warning: unknown[185.50.149.32]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-05-02 03:07:04
108.214.61.197 attackbotsspam
May 01 07:45:17 tcp        0      0 r.ca:22            108.214.61.197:54655        SYN_RECV
2020-05-02 03:16:07
1.174.132.114 attackbotsspam
Port probing on unauthorized port 445
2020-05-02 02:59:49
81.130.227.83 attack
8080/tcp
[2020-05-01]1pkt
2020-05-02 03:24:10
106.54.242.239 attackspam
May  1 13:42:38 DAAP sshd[28385]: Invalid user sysadmin from 106.54.242.239 port 37842
May  1 13:42:38 DAAP sshd[28385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.242.239
May  1 13:42:38 DAAP sshd[28385]: Invalid user sysadmin from 106.54.242.239 port 37842
May  1 13:42:40 DAAP sshd[28385]: Failed password for invalid user sysadmin from 106.54.242.239 port 37842 ssh2
May  1 13:46:10 DAAP sshd[28399]: Invalid user tfs from 106.54.242.239 port 47564
...
2020-05-02 03:32:10
173.53.23.48 attackspam
2020-05-01 00:35:20 server sshd[32516]: Failed password for invalid user danko from 173.53.23.48 port 43058 ssh2
2020-05-02 03:03:22
1.61.116.80 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-02 03:37:12
1.29.39.129 attack
May 01 07:30:17 tcp        0      0 r.ca:22            1.29.39.129:1697            SYN_RECV
2020-05-02 03:25:30
190.145.65.66 attack
Unauthorized connection attempt from IP address 190.145.65.66 on Port 445(SMB)
2020-05-02 03:23:29
123.152.211.211 attackbots
23/tcp 23/tcp
[2020-05-01]2pkt
2020-05-02 03:25:48

最近上报的IP列表

176.76.161.167 104.53.159.134 115.53.29.146 200.157.27.216
74.190.36.120 9.21.67.65 73.44.172.78 116.40.104.24
13.171.40.160 118.134.224.197 152.230.191.211 242.165.151.55
35.232.92.70 196.158.127.76 242.206.97.191 117.235.14.74
68.58.59.102 200.183.201.251 151.174.42.124 59.54.234.98