必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Serbia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.92.136.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13267
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.92.136.158.			IN	A

;; AUTHORITY SECTION:
.			472	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 18:58:32 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
158.136.92.109.in-addr.arpa domain name pointer 109-92-136-158.static.isp.telekom.rs.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
158.136.92.109.in-addr.arpa	name = 109-92-136-158.static.isp.telekom.rs.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.12.82.245 attackspambots
Unauthorized connection attempt detected from IP address 106.12.82.245 to port 2220 [J]
2020-01-08 17:39:08
180.113.203.109 attack
2020-01-07 22:18:49 dovecot_login authenticator failed for (ywnfm) [180.113.203.109]:62031 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=yangjianhua@lerctr.org)
2020-01-07 22:48:26 dovecot_login authenticator failed for (aobvm) [180.113.203.109]:50443 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=yangtingting@lerctr.org)
2020-01-07 22:48:34 dovecot_login authenticator failed for (deerw) [180.113.203.109]:50443 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=yangtingting@lerctr.org)
...
2020-01-08 17:58:46
106.124.131.194 attackbotsspam
$f2bV_matches
2020-01-08 17:36:55
180.153.194.40 attackspambots
Unauthorized connection attempt from IP address 180.153.194.40 on Port 445(SMB)
2020-01-08 18:04:21
45.40.166.141 attackspambots
45.40.166.141 - - [08/Jan/2020:09:46:05 +0100] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
45.40.166.141 - - [08/Jan/2020:09:46:05 +0100] "POST /wp-login.php HTTP/1.1" 200 2273 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
45.40.166.141 - - [08/Jan/2020:09:46:06 +0100] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
45.40.166.141 - - [08/Jan/2020:09:46:06 +0100] "POST /wp-login.php HTTP/1.1" 200 2279 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
45.40.166.141 - - [08/Jan/2020:09:46:06 +0100] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
45.40.166.141 - - [08/Jan/2020:09:46:07 +0100] "POST /wp-login.php HTTP/1.1" 200 2273 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-01-08 17:36:04
125.83.105.137 attackspam
2020-01-07 22:48:50 dovecot_login authenticator failed for (zcubf) [125.83.105.137]:52465 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=zhaoxin@lerctr.org)
2020-01-07 22:49:01 dovecot_login authenticator failed for (jufmc) [125.83.105.137]:52465 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=zhaoxin@lerctr.org)
2020-01-07 22:49:12 dovecot_login authenticator failed for (heeir) [125.83.105.137]:52465 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=zhaoxin@lerctr.org)
...
2020-01-08 17:40:00
106.12.100.73 attack
Jan  8 13:03:54 webhost01 sshd[18557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.100.73
Jan  8 13:03:57 webhost01 sshd[18557]: Failed password for invalid user lkl from 106.12.100.73 port 40966 ssh2
...
2020-01-08 17:33:07
88.25.221.164 attackspam
Jan  8 06:40:20 server sshd\[8045\]: Invalid user web from 88.25.221.164
Jan  8 06:40:20 server sshd\[8045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.red-88-25-221.staticip.rima-tde.net 
Jan  8 06:40:22 server sshd\[8045\]: Failed password for invalid user web from 88.25.221.164 port 55768 ssh2
Jan  8 07:49:42 server sshd\[23789\]: Invalid user en from 88.25.221.164
Jan  8 07:49:42 server sshd\[23789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.red-88-25-221.staticip.rima-tde.net 
...
2020-01-08 17:30:28
103.9.227.174 attack
unauthorized connection attempt
2020-01-08 17:29:41
41.207.184.182 attackspam
Jan  8 08:02:45 legacy sshd[2096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.207.184.182
Jan  8 08:02:48 legacy sshd[2096]: Failed password for invalid user omq from 41.207.184.182 port 58334 ssh2
Jan  8 08:06:48 legacy sshd[2380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.207.184.182
...
2020-01-08 17:57:41
106.12.7.100 attackspam
Jan  8 05:49:32 MK-Soft-VM8 sshd[4313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.7.100 
Jan  8 05:49:34 MK-Soft-VM8 sshd[4313]: Failed password for invalid user margarita from 106.12.7.100 port 52010 ssh2
...
2020-01-08 17:32:17
125.160.112.244 attackbots
Unauthorized connection attempt from IP address 125.160.112.244 on Port 445(SMB)
2020-01-08 18:00:48
1.173.42.162 attackspambots
Unauthorized connection attempt from IP address 1.173.42.162 on Port 445(SMB)
2020-01-08 18:08:26
197.58.78.67 attackspambots
Jan  8 04:49:17 unicornsoft sshd\[4667\]: Invalid user admin from 197.58.78.67
Jan  8 04:49:17 unicornsoft sshd\[4667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.58.78.67
Jan  8 04:49:18 unicornsoft sshd\[4667\]: Failed password for invalid user admin from 197.58.78.67 port 50601 ssh2
2020-01-08 17:36:27
104.148.64.185 attackbotsspam
Jan  7 20:47:46 mxgate1 postfix/postscreen[8982]: CONNECT from [104.148.64.185]:51528 to [176.31.12.44]:25
Jan  7 20:47:46 mxgate1 postfix/dnsblog[9025]: addr 104.148.64.185 listed by domain zen.spamhaus.org as 127.0.0.3
Jan  7 20:47:47 mxgate1 postfix/dnsblog[9026]: addr 104.148.64.185 listed by domain b.barracudacentral.org as 127.0.0.2
Jan  7 20:47:52 mxgate1 postfix/postscreen[8982]: DNSBL rank 3 for [104.148.64.185]:51528
Jan x@x
Jan  7 20:47:53 mxgate1 postfix/postscreen[8982]: DISCONNECT [104.148.64.185]:51528


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=104.148.64.185
2020-01-08 17:53:27

最近上报的IP列表

109.92.136.194 109.92.131.242 109.92.138.186 109.92.139.110
109.92.133.82 109.92.139.126 109.92.138.250 109.92.138.230
109.92.131.90 109.92.136.46 109.92.139.138 109.92.139.194
109.92.139.218 109.92.139.214 109.92.139.230 109.92.139.46
109.92.14.112 109.92.14.185 109.92.140.58 109.92.140.30