必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Australia

运营商(isp): Telstra

主机名(hostname): unknown

机构(organization): Telstra Corporation Ltd

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.146.195.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46100
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;1.146.195.119.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019073001 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jul 31 01:27:08 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
Host 119.195.146.1.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 119.195.146.1.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.33.229.242 attackbotsspam
Attempted connection to port 23.
2020-08-14 05:59:38
185.216.140.31 attackbots
Multiport scan : 4 ports scanned 19222 20001 21379 21820
2020-08-14 05:52:54
91.201.247.94 attackspambots
Unauthorized connection attempt from IP address 91.201.247.94 on Port 445(SMB)
2020-08-14 06:12:10
187.32.194.217 attackspam
Attempted connection to port 445.
2020-08-14 05:52:25
104.143.83.242 attackbots
Multiport scan : 6 ports scanned 79 80 81 88 106 443(x6)
2020-08-14 05:54:35
222.186.175.150 attackbots
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-08-14 06:06:20
113.31.105.250 attack
Aug 13 23:12:22 abendstille sshd\[553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.31.105.250  user=root
Aug 13 23:12:24 abendstille sshd\[553\]: Failed password for root from 113.31.105.250 port 37154 ssh2
Aug 13 23:15:06 abendstille sshd\[3462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.31.105.250  user=root
Aug 13 23:15:07 abendstille sshd\[3462\]: Failed password for root from 113.31.105.250 port 37342 ssh2
Aug 13 23:17:49 abendstille sshd\[5750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.31.105.250  user=root
...
2020-08-14 06:15:10
45.185.164.208 attackspam
Attempted connection to port 23.
2020-08-14 05:49:04
222.186.42.213 attackspam
Aug 13 23:53:38 * sshd[27705]: Failed password for root from 222.186.42.213 port 24705 ssh2
Aug 13 23:53:40 * sshd[27705]: Failed password for root from 222.186.42.213 port 24705 ssh2
2020-08-14 06:14:41
94.31.85.173 attackspam
Aug 13 23:35:22 relay dovecot: imap-login: Disconnected: Inactivity \(auth failed, 1 attempts in 180 secs\): user=\, method=PLAIN, rip=94.31.85.173, lip=5.9.254.190, session=\
Aug 13 23:35:24 relay dovecot: imap-login: Disconnected: Inactivity \(auth failed, 1 attempts in 180 secs\): user=\, method=PLAIN, rip=94.31.85.173, lip=5.9.254.190, session=\
Aug 13 23:35:46 relay dovecot: imap-login: Disconnected: Inactivity \(auth failed, 1 attempts in 180 secs\): user=\, method=PLAIN, rip=94.31.85.173, lip=5.9.254.190, session=\
Aug 13 23:40:57 relay dovecot: imap-login: Disconnected: Inactivity \(auth failed, 1 attempts in 180 secs\): user=\, method=PLAIN, rip=94.31.85.173, lip=5.9.254.190, session=\<1UIfHsmsY8VeH1Wt\>
Aug 13 23:40:59 relay dovecot: imap-login: Disconnected: Inactivity \(auth failed, 1 attempts in 180 secs\): user=\<
...
2020-08-14 06:13:29
195.54.160.30 attackbots
Aug 13 21:52:24 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=195.54.160.30 DST=79.143.186.54 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=25140 PROTO=TCP SPT=62000 DPT=63529 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 13 21:52:24 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=195.54.160.30 DST=79.143.186.54 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=25140 PROTO=TCP SPT=62000 DPT=63529 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 13 22:45:19 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=195.54.160.30 DST=79.143.186.54 LEN=40 TOS=0x00 PREC=0x20 TTL=248 ID=55220 PROTO=TCP SPT=62000 DPT=25177 WINDOW=1024 RES=0x00 SYN URGP=0
2020-08-14 06:07:06
14.248.78.146 attackspambots
Unauthorized connection attempt from IP address 14.248.78.146 on Port 445(SMB)
2020-08-14 05:38:39
160.16.147.188 attackspambots
160.16.147.188 - - [13/Aug/2020:22:11:31 +0100] "POST /wp-login.php HTTP/1.1" 200 1931 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
160.16.147.188 - - [13/Aug/2020:22:11:33 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
160.16.147.188 - - [13/Aug/2020:22:30:26 +0100] "POST /wp-login.php HTTP/1.1" 200 2459 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-14 05:40:53
192.241.209.46 attackbots
[Fri Aug 14 03:45:33.477852 2020] [:error] [pid 24835:tid 140221286971136] [client 192.241.209.46:57410] [client 192.241.209.46] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "zgrab" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-913-SCANNER-DETECTION.conf"] [line "55"] [id "913100"] [msg "Found User-Agent associated with security scanner"] [data "Matched Data: zgrab found within REQUEST_HEADERS:User-Agent: mozilla/5.0 zgrab/0.x"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-reputation-scanner"] [tag "OWASP_CRS"] [tag "OWASP_CRS/AUTOMATION/SECURITY_SCANNER"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/login"] [unique_id "XzWmbUmgveT79JsiB3g97AAAAks"]
...
2020-08-14 05:44:25
36.227.11.149 attack
Attempted connection to port 445.
2020-08-14 05:49:38

最近上报的IP列表

102.122.151.77 202.142.172.42 92.63.65.130 139.84.166.33
70.247.198.247 2600:1015:b159:d9:11cf:ed52:3d5b:e23 197.185.79.8 49.69.152.54
118.96.233.218 5.137.43.27 5.79.16.40 70.46.214.189
53.144.126.192 189.210.165.1 41.226.248.106 197.124.156.7
202.40.177.6 89.14.13.158 184.193.107.205 92.87.16.249