必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): SoftBank

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
111.190.150.41 proxy
Tf
2025-04-07 06:20:14
111.190.150.41 proxy
Tf
2025-04-07 06:20:11
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 111.190.150.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34669
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;111.190.150.132.		IN	A

;; AUTHORITY SECTION:
.			343	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024071800 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 19 00:20:16 CST 2024
;; MSG SIZE  rcvd: 108
HOST信息:
132.150.190.111.in-addr.arpa domain name pointer softbank111190150132.bbtec.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
132.150.190.111.in-addr.arpa	name = softbank111190150132.bbtec.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
138.197.164.222 attackspam
Aug 13 07:50:06 rancher-0 sshd[1036529]: Invalid user sa12345! from 138.197.164.222 port 40368
...
2020-08-13 19:09:25
114.79.19.223 attackbots
[Thu Aug 13 10:47:47.880065 2020] [:error] [pid 6782:tid 140397710505728] [client 114.79.19.223:45013] [client 114.79.19.223] ModSecurity: Access denied with code 403 (phase 4). Pattern match "^5\\\\d{2}$" at RESPONSE_STATUS. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/RESPONSE-950-DATA-LEAKAGES.conf"] [line "118"] [id "950100"] [msg "The Application Returned a 500-Level Status Code"] [data "Matched Data: 500 found within RESPONSE_STATUS: 500"] [severity "ERROR"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-disclosure"] [tag "WASCTC/WASC-13"] [tag "OWASP_TOP_10/A6"] [tag "PCI/6.5.6"] [tag "paranoia-level/2"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/index.php"] [unique_id "XzS34702rmmayZvC0xQrTgABaAM"], referer: https://www.google.com/
...
2020-08-13 18:55:48
2a01:4f8:161:7181::2 attack
Web bot scraping website [bot:mj12bot]
2020-08-13 19:08:03
218.92.0.185 attackspam
Aug 13 12:50:36 db sshd[11564]: User root from 218.92.0.185 not allowed because none of user's groups are listed in AllowGroups
...
2020-08-13 18:58:57
199.76.38.123 attackbotsspam
Aug 13 09:54:13 ns3033917 sshd[16870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.76.38.123
Aug 13 09:54:13 ns3033917 sshd[16870]: Invalid user pi from 199.76.38.123 port 53782
Aug 13 09:54:16 ns3033917 sshd[16870]: Failed password for invalid user pi from 199.76.38.123 port 53782 ssh2
...
2020-08-13 19:23:20
180.76.116.98 attack
Aug 13 10:03:46 home sshd[2894154]: Failed password for root from 180.76.116.98 port 48058 ssh2
Aug 13 10:05:59 home sshd[2895012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.116.98  user=root
Aug 13 10:06:02 home sshd[2895012]: Failed password for root from 180.76.116.98 port 43928 ssh2
Aug 13 10:08:12 home sshd[2895729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.116.98  user=root
Aug 13 10:08:14 home sshd[2895729]: Failed password for root from 180.76.116.98 port 39794 ssh2
...
2020-08-13 18:56:42
113.23.3.4 attackspam
2323/tcp 23/tcp
[2020-08-11/12]2pkt
2020-08-13 18:57:31
222.186.175.154 attackbots
Hit honeypot r.
2020-08-13 18:41:18
36.77.27.77 attackspam
1597290484 - 08/13/2020 05:48:04 Host: 36.77.27.77/36.77.27.77 Port: 445 TCP Blocked
2020-08-13 18:46:45
51.79.160.138 attackbots
Aug 11 03:07:50 pl3server sshd[30754]: Invalid user admin from 51.79.160.138 port 45715
Aug 11 03:07:51 pl3server sshd[30754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.160.138
Aug 11 03:07:53 pl3server sshd[30754]: Failed password for invalid user admin from 51.79.160.138 port 45715 ssh2
Aug 11 03:07:54 pl3server sshd[30754]: Connection closed by 51.79.160.138 port 45715 [preauth]
Aug 11 03:07:57 pl3server sshd[30800]: Invalid user admin from 51.79.160.138 port 42111
Aug 11 03:07:58 pl3server sshd[30800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.160.138


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=51.79.160.138
2020-08-13 19:20:30
52.191.23.78 attackspam
 TCP (SYN) 52.191.23.78:30882 -> port 23, len 44
2020-08-13 19:15:58
51.38.118.26 attackbots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-13T10:02:54Z and 2020-08-13T10:10:49Z
2020-08-13 18:46:00
117.157.104.1 attackspambots
(ftpd) Failed FTP login from 117.157.104.1 (CN/China/-): 10 in the last 3600 secs
2020-08-13 18:59:52
106.52.197.21 attackspam
Aug 13 12:22:00 abendstille sshd\[12257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.197.21  user=root
Aug 13 12:22:02 abendstille sshd\[12257\]: Failed password for root from 106.52.197.21 port 40272 ssh2
Aug 13 12:24:58 abendstille sshd\[15246\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.197.21  user=root
Aug 13 12:25:00 abendstille sshd\[15246\]: Failed password for root from 106.52.197.21 port 43380 ssh2
Aug 13 12:28:01 abendstille sshd\[18109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.197.21  user=root
...
2020-08-13 18:42:08
23.129.64.203 attack
sshd
2020-08-13 19:16:27

最近上报的IP列表

23.225.223.55 23.225.223.250 29.213.39.24 193.142.200.72
193.142.200.145 193.142.200.25 121.153.210.144 79.127.222.203
180.188.21.82 111.190.150.122 111.190.150.74 37.114.108.51
23.225.223.244 120.245.60.40 148.251.119.151 218.201.36.41
42.226.162.112 125.142.7.100 64.227.120.228 60.10.185.99