必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.31.140.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13105
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;74.31.140.214.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 17:20:44 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 214.140.31.74.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.140.31.74.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
123.207.140.248 attackspam
Sep  1 01:55:37 * sshd[7347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.140.248
Sep  1 01:55:39 * sshd[7347]: Failed password for invalid user jmail from 123.207.140.248 port 36779 ssh2
2019-09-01 10:40:38
113.200.156.180 attackspam
Sep  1 00:35:46 raspberrypi sshd\[3452\]: Invalid user pmd from 113.200.156.180Sep  1 00:35:47 raspberrypi sshd\[3452\]: Failed password for invalid user pmd from 113.200.156.180 port 43912 ssh2Sep  1 00:40:12 raspberrypi sshd\[3614\]: Invalid user drive from 113.200.156.180
...
2019-09-01 11:05:57
158.69.112.95 attack
Aug 31 22:37:50 xtremcommunity sshd\[7219\]: Invalid user jbava from 158.69.112.95 port 58568
Aug 31 22:37:50 xtremcommunity sshd\[7219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.112.95
Aug 31 22:37:52 xtremcommunity sshd\[7219\]: Failed password for invalid user jbava from 158.69.112.95 port 58568 ssh2
Aug 31 22:41:46 xtremcommunity sshd\[7394\]: Invalid user coin from 158.69.112.95 port 46496
Aug 31 22:41:46 xtremcommunity sshd\[7394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.112.95
...
2019-09-01 10:42:50
192.227.210.138 attackspambots
Aug 31 19:12:49 vps200512 sshd\[4965\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.210.138  user=root
Aug 31 19:12:51 vps200512 sshd\[4965\]: Failed password for root from 192.227.210.138 port 50578 ssh2
Aug 31 19:16:32 vps200512 sshd\[5027\]: Invalid user rachel from 192.227.210.138
Aug 31 19:16:32 vps200512 sshd\[5027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.210.138
Aug 31 19:16:34 vps200512 sshd\[5027\]: Failed password for invalid user rachel from 192.227.210.138 port 36850 ssh2
2019-09-01 11:16:01
138.94.189.168 attackbots
Sep  1 02:58:21 MK-Soft-VM6 sshd\[11685\]: Invalid user alfreda from 138.94.189.168 port 59585
Sep  1 02:58:21 MK-Soft-VM6 sshd\[11685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.94.189.168
Sep  1 02:58:23 MK-Soft-VM6 sshd\[11685\]: Failed password for invalid user alfreda from 138.94.189.168 port 59585 ssh2
...
2019-09-01 11:06:45
117.93.16.121 attackbots
(sshd) Failed SSH login from 117.93.16.121 (CN/China/121.16.93.117.broad.yc.js.dynamic.163data.com.cn): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug 31 17:47:39 testbed sshd[11023]: Invalid user admin from 117.93.16.121 port 32615
Aug 31 17:47:41 testbed sshd[11023]: Failed password for invalid user admin from 117.93.16.121 port 32615 ssh2
Aug 31 17:47:45 testbed sshd[11023]: Failed password for invalid user admin from 117.93.16.121 port 32615 ssh2
Aug 31 17:47:48 testbed sshd[11023]: Failed password for invalid user admin from 117.93.16.121 port 32615 ssh2
Aug 31 17:47:53 testbed sshd[11023]: Failed password for invalid user admin from 117.93.16.121 port 32615 ssh2
2019-09-01 10:47:31
79.132.246.58 attackbotsspam
Brute forcing RDP port 3389
2019-09-01 11:03:19
185.35.139.72 attack
Aug 31 23:00:01 TORMINT sshd\[11635\]: Invalid user ali from 185.35.139.72
Aug 31 23:00:01 TORMINT sshd\[11635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.35.139.72
Aug 31 23:00:03 TORMINT sshd\[11635\]: Failed password for invalid user ali from 185.35.139.72 port 54634 ssh2
...
2019-09-01 11:05:36
142.93.58.123 attackbots
Sep  1 02:52:11 ns341937 sshd[3151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.58.123
Sep  1 02:52:13 ns341937 sshd[3151]: Failed password for invalid user tommie from 142.93.58.123 port 52846 ssh2
Sep  1 03:03:08 ns341937 sshd[5185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.58.123
...
2019-09-01 10:41:46
220.130.190.13 attackspambots
Sep  1 05:44:03 pkdns2 sshd\[29831\]: Invalid user bip from 220.130.190.13Sep  1 05:44:04 pkdns2 sshd\[29831\]: Failed password for invalid user bip from 220.130.190.13 port 37043 ssh2Sep  1 05:48:31 pkdns2 sshd\[30009\]: Invalid user andre from 220.130.190.13Sep  1 05:48:33 pkdns2 sshd\[30009\]: Failed password for invalid user andre from 220.130.190.13 port 26366 ssh2Sep  1 05:52:50 pkdns2 sshd\[30222\]: Invalid user telnet from 220.130.190.13Sep  1 05:52:53 pkdns2 sshd\[30222\]: Failed password for invalid user telnet from 220.130.190.13 port 15633 ssh2
...
2019-09-01 10:54:18
157.230.33.207 attack
Sep  1 04:33:31 minden010 sshd[18438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.33.207
Sep  1 04:33:32 minden010 sshd[18438]: Failed password for invalid user support from 157.230.33.207 port 55708 ssh2
Sep  1 04:37:56 minden010 sshd[20535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.33.207
...
2019-09-01 11:10:29
170.150.155.102 attack
Sep  1 05:40:57 server sshd\[28208\]: Invalid user decker from 170.150.155.102 port 38114
Sep  1 05:40:57 server sshd\[28208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.150.155.102
Sep  1 05:40:59 server sshd\[28208\]: Failed password for invalid user decker from 170.150.155.102 port 38114 ssh2
Sep  1 05:46:01 server sshd\[17306\]: Invalid user olga from 170.150.155.102 port 55222
Sep  1 05:46:01 server sshd\[17306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.150.155.102
2019-09-01 10:59:46
167.71.2.71 attack
Reported by AbuseIPDB proxy server.
2019-09-01 11:06:28
187.113.225.208 attackbotsspam
Aug 31 22:30:37 dax sshd[9140]: warning: /etc/hosts.deny, line 15136: can't verify hostname: getaddrinfo(187.113.225.208.static.host.gvt.net.br, AF_INET) failed
Aug 31 22:30:38 dax sshd[9140]: reveeclipse mapping checking getaddrinfo for 187.113.225.208.static.host.gvt.net.br [187.113.225.208] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug 31 22:30:38 dax sshd[9140]: Invalid user ryana from 187.113.225.208
Aug 31 22:30:38 dax sshd[9140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.113.225.208 
Aug 31 22:30:41 dax sshd[9140]: Failed password for invalid user ryana from 187.113.225.208 port 60921 ssh2
Aug 31 22:30:41 dax sshd[9140]: Received disconnect from 187.113.225.208: 11: Bye Bye [preauth]
Aug 31 22:38:14 dax sshd[10077]: warning: /etc/hosts.deny, line 15136: can't verify hostname: getaddrinfo(187.113.225.208.static.host.gvt.net.br, AF_INET) failed
Aug 31 22:38:16 dax sshd[10077]: reveeclipse mapping checking getaddrinfo for ........
-------------------------------
2019-09-01 11:03:51
51.38.238.205 attackspambots
Aug 31 16:22:49 eddieflores sshd\[16082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.ip-51-38-238.eu  user=root
Aug 31 16:22:51 eddieflores sshd\[16082\]: Failed password for root from 51.38.238.205 port 59293 ssh2
Aug 31 16:27:10 eddieflores sshd\[16477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.ip-51-38-238.eu  user=root
Aug 31 16:27:12 eddieflores sshd\[16477\]: Failed password for root from 51.38.238.205 port 53294 ssh2
Aug 31 16:31:27 eddieflores sshd\[16927\]: Invalid user chase from 51.38.238.205
Aug 31 16:31:27 eddieflores sshd\[16927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.ip-51-38-238.eu
2019-09-01 10:34:10

最近上报的IP列表

221.227.4.167 224.241.93.89 146.75.32.199 90.78.146.65
230.120.119.121 36.217.199.127 68.157.88.239 170.42.4.167
68.40.175.153 187.210.50.224 137.93.179.191 225.111.139.217
205.130.231.8 206.92.17.169 64.181.220.91 39.133.238.4
172.37.31.158 148.75.208.134 90.137.168.118 231.114.212.87