必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 56.21.161.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35498
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;56.21.161.14.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 01:45:37 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
b'Host 14.161.21.56.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 56.21.161.14.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
111.231.54.212 attackbots
SSH Brute-Force reported by Fail2Ban
2020-07-15 06:27:55
35.186.145.141 attackbots
724. On Jul 14 2020 experienced a Brute Force SSH login attempt -> 50 unique times by 35.186.145.141.
2020-07-15 06:24:15
139.199.99.77 attackspambots
Invalid user pbl from 139.199.99.77 port 41639
2020-07-15 06:44:06
139.198.17.144 attackbotsspam
(sshd) Failed SSH login from 139.198.17.144 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 15 00:07:14 srv sshd[8394]: Invalid user wxl from 139.198.17.144 port 52656
Jul 15 00:07:16 srv sshd[8394]: Failed password for invalid user wxl from 139.198.17.144 port 52656 ssh2
Jul 15 00:20:38 srv sshd[17489]: Invalid user uyt from 139.198.17.144 port 35912
Jul 15 00:20:40 srv sshd[17489]: Failed password for invalid user uyt from 139.198.17.144 port 35912 ssh2
Jul 15 00:23:17 srv sshd[17524]: Invalid user ftpusr from 139.198.17.144 port 40292
2020-07-15 06:29:39
114.234.157.181 attackspambots
Honeypot attack, port: 5555, PTR: PTR record not found
2020-07-15 06:28:17
106.13.98.226 attack
Jul 14 23:03:10 v22019038103785759 sshd\[1591\]: Invalid user tony from 106.13.98.226 port 59724
Jul 14 23:03:10 v22019038103785759 sshd\[1591\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.98.226
Jul 14 23:03:12 v22019038103785759 sshd\[1591\]: Failed password for invalid user tony from 106.13.98.226 port 59724 ssh2
Jul 14 23:06:52 v22019038103785759 sshd\[1695\]: Invalid user giovannetti from 106.13.98.226 port 48766
Jul 14 23:06:52 v22019038103785759 sshd\[1695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.98.226
...
2020-07-15 06:30:49
87.251.231.101 attackspambots
Automatic report - Banned IP Access
2020-07-15 07:03:21
119.82.135.53 attackspambots
SSH Invalid Login
2020-07-15 07:04:23
212.224.228.54 attackspam
Fail2Ban Ban Triggered
SMTP Abuse Attempt
2020-07-15 06:42:43
192.35.169.48 attackspam
Brute force attack stopped by firewall
2020-07-15 06:50:04
108.12.225.85 attackspambots
Jul 14 10:00:52 web9 sshd\[25149\]: Invalid user tang from 108.12.225.85
Jul 14 10:00:52 web9 sshd\[25149\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.12.225.85
Jul 14 10:00:53 web9 sshd\[25149\]: Failed password for invalid user tang from 108.12.225.85 port 60262 ssh2
Jul 14 10:04:11 web9 sshd\[25646\]: Invalid user ywj from 108.12.225.85
Jul 14 10:04:11 web9 sshd\[25646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.12.225.85
2020-07-15 07:04:52
194.26.29.168 attackspambots
Multiport scan : 449 ports scanned 15023 15075 15087 15119 15145 15172 15184 15218 15233 15242 15248 15254 15262 15266 15278 15284 15287 15290 15292 15294 15302 15306 15308 15320 15357 15359 15373 15385 15391 15397 15403 15409 15415 15418 15433 15436 15439 15445 15457 15461 15463 15469 15472 15481 15493 15496 15503 15522 15552 15564 15570 15582 15588 15600 15603 15606 15609 15628 15630 15633 15634 15639 15646 15648 15654 15657 15658 .....
2020-07-15 06:59:49
198.20.70.114 attackbots
Automatic report - Banned IP Access
2020-07-15 06:59:31
2.32.82.50 attack
SSH Invalid Login
2020-07-15 06:25:42
113.190.248.146 attackbots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-15 06:56:48

最近上报的IP列表

145.57.115.38 140.152.225.36 18.190.61.93 185.174.208.206
23.211.190.201 177.174.243.136 133.184.42.20 227.190.242.24
240.76.221.109 126.32.26.44 71.52.18.150 211.96.52.110
9.196.14.77 89.60.120.136 5.199.126.15 101.202.152.253
234.197.117.124 208.121.227.211 22.168.16.113 204.27.242.16