必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Turkey

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.214.74.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17136
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.214.74.219.			IN	A

;; AUTHORITY SECTION:
.			357	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 17:47:04 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
219.74.214.81.in-addr.arpa domain name pointer 81.214.74.219.dynamic.ttnet.com.tr.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
219.74.214.81.in-addr.arpa	name = 81.214.74.219.dynamic.ttnet.com.tr.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
200.169.6.202 attackspam
Apr  8 17:10:00 ns392434 sshd[5276]: Invalid user das from 200.169.6.202 port 55961
Apr  8 17:10:00 ns392434 sshd[5276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.169.6.202
Apr  8 17:10:00 ns392434 sshd[5276]: Invalid user das from 200.169.6.202 port 55961
Apr  8 17:10:03 ns392434 sshd[5276]: Failed password for invalid user das from 200.169.6.202 port 55961 ssh2
Apr  8 17:18:38 ns392434 sshd[5464]: Invalid user admin from 200.169.6.202 port 50612
Apr  8 17:18:38 ns392434 sshd[5464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.169.6.202
Apr  8 17:18:38 ns392434 sshd[5464]: Invalid user admin from 200.169.6.202 port 50612
Apr  8 17:18:40 ns392434 sshd[5464]: Failed password for invalid user admin from 200.169.6.202 port 50612 ssh2
Apr  8 17:22:34 ns392434 sshd[5548]: Invalid user tester from 200.169.6.202 port 50105
2020-04-09 03:46:05
106.12.179.191 attack
Apr  8 22:19:48 lukav-desktop sshd\[14183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.179.191  user=root
Apr  8 22:19:50 lukav-desktop sshd\[14183\]: Failed password for root from 106.12.179.191 port 40220 ssh2
Apr  8 22:22:57 lukav-desktop sshd\[14295\]: Invalid user degle from 106.12.179.191
Apr  8 22:22:57 lukav-desktop sshd\[14295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.179.191
Apr  8 22:22:59 lukav-desktop sshd\[14295\]: Failed password for invalid user degle from 106.12.179.191 port 57408 ssh2
2020-04-09 03:32:20
85.132.122.245 attack
1433/tcp 445/tcp
[2020-02-18/04-08]2pkt
2020-04-09 03:39:01
66.231.92.212 attack
TCP Port: 25      invalid blocked  spam-sorbs also NoSolicitado           (166)
2020-04-09 03:49:48
94.138.208.158 attackspambots
2020-04-08T15:32:08.655265abusebot-6.cloudsearch.cf sshd[3812]: Invalid user appman from 94.138.208.158 port 46884
2020-04-08T15:32:08.662934abusebot-6.cloudsearch.cf sshd[3812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.138.208.158
2020-04-08T15:32:08.655265abusebot-6.cloudsearch.cf sshd[3812]: Invalid user appman from 94.138.208.158 port 46884
2020-04-08T15:32:10.334298abusebot-6.cloudsearch.cf sshd[3812]: Failed password for invalid user appman from 94.138.208.158 port 46884 ssh2
2020-04-08T15:38:26.407051abusebot-6.cloudsearch.cf sshd[4223]: Invalid user sinusbot1 from 94.138.208.158 port 55418
2020-04-08T15:38:26.423514abusebot-6.cloudsearch.cf sshd[4223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.138.208.158
2020-04-08T15:38:26.407051abusebot-6.cloudsearch.cf sshd[4223]: Invalid user sinusbot1 from 94.138.208.158 port 55418
2020-04-08T15:38:28.656534abusebot-6.cloudsearch.cf sshd[422
...
2020-04-09 03:43:15
102.65.56.211 attack
Ip adress logged into one of my accounts
2020-04-09 03:44:22
54.152.47.167 attackspambots
IDS admin
2020-04-09 04:00:41
212.96.80.80 attack
Automatic report - Port Scan Attack
2020-04-09 03:52:54
138.68.226.234 attack
Apr  8 21:02:27  sshd[22465]: Failed password for invalid user oracle from 138.68.226.234 port 50182 ssh2
2020-04-09 03:37:46
106.13.63.117 attack
Apr  8 14:36:28 prox sshd[4724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.63.117 
Apr  8 14:36:30 prox sshd[4724]: Failed password for invalid user glassfish3 from 106.13.63.117 port 33098 ssh2
2020-04-09 03:59:53
117.3.209.190 attack
9530/tcp
[2020-04-08]1pkt
2020-04-09 03:59:20
129.211.63.79 attackbots
Apr  8 18:48:59 vpn01 sshd[21654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.63.79
Apr  8 18:49:01 vpn01 sshd[21654]: Failed password for invalid user deploy from 129.211.63.79 port 38280 ssh2
...
2020-04-09 03:46:55
130.193.120.88 attack
9530/tcp 9530/tcp 9530/tcp...
[2020-03-05/04-08]5pkt,1pt.(tcp)
2020-04-09 03:30:11
113.161.70.172 attackspambots
113.161.70.172 - - [08/Apr/2020:16:55:42 +0300] "POST /wp-login.php HTTP/1.1" 200 2514 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-09 03:37:11
103.146.203.12 attackspam
Apr  8 21:28:57 eventyay sshd[22654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.203.12
Apr  8 21:28:59 eventyay sshd[22654]: Failed password for invalid user teamspeak3 from 103.146.203.12 port 42430 ssh2
Apr  8 21:33:13 eventyay sshd[22805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.203.12
...
2020-04-09 03:45:39

最近上报的IP列表

112.227.230.78 95.137.240.202 187.115.192.227 81.162.72.236
49.231.140.125 27.254.149.139 154.201.38.49 172.117.47.226
219.131.243.149 187.178.230.13 95.91.15.103 92.124.150.167
139.59.250.206 80.210.76.43 120.57.221.55 207.244.91.167
162.62.8.146 190.60.76.120 8.45.42.59 103.210.140.5