必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Portugal

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.51.137.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31101
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.51.137.18.			IN	A

;; AUTHORITY SECTION:
.			172	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 90 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 15:17:08 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
18.137.51.109.in-addr.arpa domain name pointer a109-51-137-18.cpe.netcabo.pt.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
18.137.51.109.in-addr.arpa	name = a109-51-137-18.cpe.netcabo.pt.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.20.191.242 attack
postfix (unknown user, SPF fail or relay access denied)
2020-02-08 02:56:08
103.113.213.246 attackspam
Lines containing failures of 103.113.213.246
Feb  7 09:38:02 ariston sshd[31877]: Did not receive identification string from 103.113.213.246 port 64476
Feb  7 09:38:04 ariston sshd[31878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.113.213.246  user=r.r
Feb  7 09:38:05 ariston sshd[31878]: Failed password for r.r from 103.113.213.246 port 64549 ssh2
Feb  7 09:38:06 ariston sshd[31878]: Connection closed by authenticating user r.r 103.113.213.246 port 64549 [preauth]
Feb  7 09:38:08 ariston sshd[31888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.113.213.246  user=r.r
Feb  7 09:38:10 ariston sshd[31888]: Failed password for r.r from 103.113.213.246 port 65190 ssh2
Feb  7 09:38:13 ariston sshd[31888]: Connection closed by authenticating user r.r 103.113.213.246 port 65190 [preauth]
Feb  7 09:38:14 ariston sshd[31903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ........
------------------------------
2020-02-08 02:56:36
185.186.191.115 attackbots
Automatic report - Port Scan Attack
2020-02-08 02:48:00
193.228.161.2 attackspam
Unauthorised access (Feb  7) SRC=193.228.161.2 LEN=40 TTL=248 ID=25279 DF TCP DPT=8080 WINDOW=14600 SYN
2020-02-08 02:47:31
87.244.197.253 attackbotsspam
Feb  7 16:40:03 srv01 sshd[23258]: Invalid user ubnt from 87.244.197.253 port 65304
Feb  7 16:40:03 srv01 sshd[23258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.244.197.253
Feb  7 16:40:03 srv01 sshd[23258]: Invalid user ubnt from 87.244.197.253 port 65304
Feb  7 16:40:05 srv01 sshd[23258]: Failed password for invalid user ubnt from 87.244.197.253 port 65304 ssh2
Feb  7 16:40:03 srv01 sshd[23258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.244.197.253
Feb  7 16:40:03 srv01 sshd[23258]: Invalid user ubnt from 87.244.197.253 port 65304
Feb  7 16:40:05 srv01 sshd[23258]: Failed password for invalid user ubnt from 87.244.197.253 port 65304 ssh2
...
2020-02-08 02:40:42
27.79.128.35 attackbots
2020-02-0715:04:531j04FY-0004Uk-8Q\<=verena@rs-solution.chH=\(localhost\)[123.21.161.76]:44898P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2174id=818432616ABE9023FFFAB30BFF0E7302@rs-solution.chT="Iwantsomethingbeautiful"formartinlopez0511@yahoo.com2020-02-0715:03:481j04EV-0004Qj-Qm\<=verena@rs-solution.chH=\(localhost\)[27.255.231.132]:44943P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2206id=8D883E6D66B29C2FF3F6BF07F3E2A828@rs-solution.chT="Ihopeyouareadecentperson"forsingh.amandeep37@yahoo.com2020-02-0715:04:251j04F6-0004TE-PW\<=verena@rs-solution.chH=\(localhost\)[27.79.128.35]:53799P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2155id=ECE95F0C07D3FD4E9297DE6692CEC5AB@rs-solution.chT="apleasantsurprise"forsahilbhuradia5190@gmail.com2020-02-0715:03:131j04Dx-0004QF-6V\<=verena@rs-solution.chH=\(localhost\)[41.42.189.53]:58200P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-
2020-02-08 02:34:50
162.14.2.214 attackspambots
ICMP MH Probe, Scan /Distributed -
2020-02-08 03:15:46
139.99.105.138 attack
Feb  7 07:44:51 auw2 sshd\[22905\]: Invalid user pdf from 139.99.105.138
Feb  7 07:44:51 auw2 sshd\[22905\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.105.138
Feb  7 07:44:53 auw2 sshd\[22905\]: Failed password for invalid user pdf from 139.99.105.138 port 36938 ssh2
Feb  7 07:48:19 auw2 sshd\[23257\]: Invalid user peo from 139.99.105.138
Feb  7 07:48:19 auw2 sshd\[23257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.105.138
2020-02-08 02:58:17
201.211.151.168 attackbots
Automatic report - Banned IP Access
2020-02-08 02:57:42
49.88.112.55 attackspam
2020-02-07T13:33:21.059389xentho-1 sshd[40076]: Failed password for root from 49.88.112.55 port 11880 ssh2
2020-02-07T13:33:15.321728xentho-1 sshd[40076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.55  user=root
2020-02-07T13:33:17.051465xentho-1 sshd[40076]: Failed password for root from 49.88.112.55 port 11880 ssh2
2020-02-07T13:33:21.059389xentho-1 sshd[40076]: Failed password for root from 49.88.112.55 port 11880 ssh2
2020-02-07T13:33:24.353359xentho-1 sshd[40076]: Failed password for root from 49.88.112.55 port 11880 ssh2
2020-02-07T13:33:15.321728xentho-1 sshd[40076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.55  user=root
2020-02-07T13:33:17.051465xentho-1 sshd[40076]: Failed password for root from 49.88.112.55 port 11880 ssh2
2020-02-07T13:33:21.059389xentho-1 sshd[40076]: Failed password for root from 49.88.112.55 port 11880 ssh2
2020-02-07T13:33:24.353359xentho-1 ssh
...
2020-02-08 02:37:12
1.1.119.114 attack
Honeypot attack, port: 5555, PTR: PTR record not found
2020-02-08 03:10:24
106.75.67.48 attackspambots
Feb  7 15:05:09 MK-Soft-Root1 sshd[7751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.67.48 
Feb  7 15:05:11 MK-Soft-Root1 sshd[7751]: Failed password for invalid user urj from 106.75.67.48 port 53729 ssh2
...
2020-02-08 02:35:07
66.108.165.215 attackspambots
Feb  6 23:12:42 server sshd\[3876\]: Invalid user ncz from 66.108.165.215
Feb  6 23:12:42 server sshd\[3876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpe-66-108-165-215.nyc.res.rr.com 
Feb  6 23:12:45 server sshd\[3876\]: Failed password for invalid user ncz from 66.108.165.215 port 36568 ssh2
Feb  7 17:28:18 server sshd\[25600\]: Invalid user vxg from 66.108.165.215
Feb  7 17:28:18 server sshd\[25600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpe-66-108-165-215.nyc.res.rr.com 
...
2020-02-08 02:41:56
190.215.138.245 attackbotsspam
Feb  7 14:04:00 system,error,critical: login failure for user admin from 190.215.138.245 via telnet
Feb  7 14:04:02 system,error,critical: login failure for user root from 190.215.138.245 via telnet
Feb  7 14:04:03 system,error,critical: login failure for user root from 190.215.138.245 via telnet
Feb  7 14:04:08 system,error,critical: login failure for user root from 190.215.138.245 via telnet
Feb  7 14:04:10 system,error,critical: login failure for user Administrator from 190.215.138.245 via telnet
Feb  7 14:04:12 system,error,critical: login failure for user admin from 190.215.138.245 via telnet
Feb  7 14:04:17 system,error,critical: login failure for user root from 190.215.138.245 via telnet
Feb  7 14:04:19 system,error,critical: login failure for user root from 190.215.138.245 via telnet
Feb  7 14:04:21 system,error,critical: login failure for user root from 190.215.138.245 via telnet
Feb  7 14:04:25 system,error,critical: login failure for user root from 190.215.138.245 via telnet
2020-02-08 03:06:58
200.233.240.48 attackbots
Feb  7 14:59:39 ns382633 sshd\[19269\]: Invalid user dko from 200.233.240.48 port 41146
Feb  7 14:59:39 ns382633 sshd\[19269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.233.240.48
Feb  7 14:59:41 ns382633 sshd\[19269\]: Failed password for invalid user dko from 200.233.240.48 port 41146 ssh2
Feb  7 15:04:55 ns382633 sshd\[20176\]: Invalid user gwv from 200.233.240.48 port 58323
Feb  7 15:04:55 ns382633 sshd\[20176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.233.240.48
2020-02-08 02:44:55

最近上报的IP列表

159.133.161.90 2403:6200:88a0:81a7:7e:3b54:f526:db24 134.86.152.32 0.186.100.81
109.43.168.220 221.14.114.35 171.235.87.40 114.156.149.62
11.90.150.209 20.32.75.89 194.217.121.200 146.179.172.91
131.84.241.185 120.208.191.77 37.99.49.234 227.186.157.130
152.198.108.180 160.242.39.233 121.76.213.54 172.32.71.56