必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 9.103.214.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38336
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;9.103.214.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121600 1800 900 604800 86400

;; Query time: 97 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 16 14:24:41 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 54.214.103.9.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.214.103.9.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
129.28.143.237 attackbots
HTTP/80/443 Probe, Hack -
2019-10-08 23:55:22
34.76.207.254 attackbots
3389BruteforceFW23
2019-10-09 00:00:30
183.82.121.34 attackspambots
Oct  8 16:14:21 MainVPS sshd[2425]: Invalid user Restaurant@2017 from 183.82.121.34 port 61078
Oct  8 16:14:21 MainVPS sshd[2425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.121.34
Oct  8 16:14:21 MainVPS sshd[2425]: Invalid user Restaurant@2017 from 183.82.121.34 port 61078
Oct  8 16:14:23 MainVPS sshd[2425]: Failed password for invalid user Restaurant@2017 from 183.82.121.34 port 61078 ssh2
Oct  8 16:18:59 MainVPS sshd[2769]: Invalid user Gerard@2017 from 183.82.121.34 port 24891
...
2019-10-08 23:51:48
147.135.209.139 attackspam
Oct  8 11:36:55 xtremcommunity sshd\[315753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.209.139  user=root
Oct  8 11:36:58 xtremcommunity sshd\[315753\]: Failed password for root from 147.135.209.139 port 50952 ssh2
Oct  8 11:41:12 xtremcommunity sshd\[315842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.209.139  user=root
Oct  8 11:41:14 xtremcommunity sshd\[315842\]: Failed password for root from 147.135.209.139 port 33598 ssh2
Oct  8 11:45:26 xtremcommunity sshd\[315894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.209.139  user=root
...
2019-10-08 23:45:42
182.61.161.122 attackbots
Lines containing failures of 182.61.161.122
Oct  6 16:33:54 shared02 sshd[14458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.161.122  user=r.r
Oct  6 16:33:56 shared02 sshd[14458]: Failed password for r.r from 182.61.161.122 port 33468 ssh2
Oct  6 16:33:56 shared02 sshd[14458]: Received disconnect from 182.61.161.122 port 33468:11: Bye Bye [preauth]
Oct  6 16:33:56 shared02 sshd[14458]: Disconnected from authenticating user r.r 182.61.161.122 port 33468 [preauth]
Oct  6 16:53:38 shared02 sshd[21620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.161.122  user=r.r
Oct  6 16:53:40 shared02 sshd[21620]: Failed password for r.r from 182.61.161.122 port 52634 ssh2
Oct  6 16:53:40 shared02 sshd[21620]: Received disconnect from 182.61.161.122 port 52634:11: Bye Bye [preauth]
Oct  6 16:53:40 shared02 sshd[21620]: Disconnected from authenticating user r.r 182.61.161.122 port 52634........
------------------------------
2019-10-08 23:51:03
103.52.52.23 attackbotsspam
2019-10-08T15:37:54.212098abusebot-5.cloudsearch.cf sshd\[5660\]: Invalid user cen from 103.52.52.23 port 57018
2019-10-09 00:06:18
220.130.221.140 attackbots
Jul  6 16:33:17 dallas01 sshd[25391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.221.140
Jul  6 16:33:19 dallas01 sshd[25391]: Failed password for invalid user backup1 from 220.130.221.140 port 35282 ssh2
Jul  6 16:35:45 dallas01 sshd[25715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.221.140
Jul  6 16:35:47 dallas01 sshd[25715]: Failed password for invalid user cron from 220.130.221.140 port 52750 ssh2
2019-10-09 00:09:07
82.202.249.153 attackbotsspam
RDP Bruteforce
2019-10-09 00:06:36
146.185.181.37 attackspam
Oct  8 16:09:45 root sshd[21902]: Failed password for root from 146.185.181.37 port 59694 ssh2
Oct  8 16:15:41 root sshd[21970]: Failed password for root from 146.185.181.37 port 44202 ssh2
...
2019-10-08 23:49:58
203.172.161.11 attack
2019-10-08T18:29:35.467693tmaserv sshd\[17983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.172.161.11  user=root
2019-10-08T18:29:37.755979tmaserv sshd\[17983\]: Failed password for root from 203.172.161.11 port 48228 ssh2
2019-10-08T18:33:44.343998tmaserv sshd\[18246\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.172.161.11  user=root
2019-10-08T18:33:46.146430tmaserv sshd\[18246\]: Failed password for root from 203.172.161.11 port 57570 ssh2
2019-10-08T18:37:56.203401tmaserv sshd\[18452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.172.161.11  user=root
2019-10-08T18:37:57.934986tmaserv sshd\[18452\]: Failed password for root from 203.172.161.11 port 38678 ssh2
...
2019-10-08 23:51:21
61.90.55.134 attackbots
Automatic report - Port Scan Attack
2019-10-08 23:48:34
49.88.112.76 attackspambots
2019-10-08T23:03:07.529139enmeeting.mahidol.ac.th sshd\[29068\]: User root from 49.88.112.76 not allowed because not listed in AllowUsers
2019-10-08T23:03:07.927093enmeeting.mahidol.ac.th sshd\[29068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.76  user=root
2019-10-08T23:03:09.424293enmeeting.mahidol.ac.th sshd\[29068\]: Failed password for invalid user root from 49.88.112.76 port 42906 ssh2
...
2019-10-09 00:19:32
220.132.36.160 attackbots
Jun  4 18:43:39 ubuntu sshd[21047]: Failed password for irc from 220.132.36.160 port 39200 ssh2
Jun  4 18:46:15 ubuntu sshd[21098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.36.160
Jun  4 18:46:17 ubuntu sshd[21098]: Failed password for invalid user dpowers from 220.132.36.160 port 33850 ssh2
2019-10-08 23:57:48
194.156.67.57 attack
Wordpress Admin Login attack
2019-10-08 23:58:44
159.65.182.7 attack
Oct  8 04:08:50 kapalua sshd\[13246\]: Invalid user P@55W0RD2017 from 159.65.182.7
Oct  8 04:08:50 kapalua sshd\[13246\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=servidor.cashservices.cl
Oct  8 04:08:51 kapalua sshd\[13246\]: Failed password for invalid user P@55W0RD2017 from 159.65.182.7 port 58364 ssh2
Oct  8 04:12:20 kapalua sshd\[13993\]: Invalid user P@55W0RD2017 from 159.65.182.7
Oct  8 04:12:20 kapalua sshd\[13993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=servidor.cashservices.cl
2019-10-08 23:42:14

最近上报的IP列表

44.99.186.171 53.214.63.69 96.4.127.231 243.231.41.225
75.114.182.111 191.140.121.12 97.101.154.77 187.226.216.86
170.90.116.206 133.214.101.69 58.89.79.148 92.170.202.188
158.175.193.80 37.165.221.191 202.152.168.213 132.149.219.149
215.246.170.25 137.29.113.228 21.253.146.150 198.94.192.14