必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
112.80.139.186 attackbotsspam
Unauthorized connection attempt detected from IP address 112.80.139.186 to port 8118 [J]
2020-03-02 16:46:43
112.80.139.72 attackspam
The IP has triggered Cloudflare WAF. CF-Ray: 5430ed179f239666 | WAF_Rule_ID: 53b8357af6d244d3a132bcf913c3a388 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: ip.skk.moe | User-Agent: Mozilla/4.054101423 Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1) | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 00:47:55
112.80.139.237 attackspam
The IP has triggered Cloudflare WAF. CF-Ray: 5415a92e09326bf6 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: d.skk.moe | User-Agent: Mozilla/5.0 (Linux; U; Android 4.3; en-us; SM-N900T Build/JSS15J) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 06:55:56
112.80.139.252 attackspambots
The IP has triggered Cloudflare WAF. CF-Ray: 5413c84ba8846d04 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: ip.skk.moe | User-Agent: Mozilla/5.066704189 Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.81 Safari/537.36 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 02:00:28
112.80.139.3 attack
The IP has triggered Cloudflare WAF. CF-Ray: 5410ce0509096bc6 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: img.skk.moe | User-Agent: Mozilla/5.084743666 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36 Edge/17.17134 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 00:41:24
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.80.139.208
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34305
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.80.139.208.			IN	A

;; AUTHORITY SECTION:
.			55	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030102 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 02 12:26:07 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 208.139.80.112.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 208.139.80.112.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
80.211.67.90 attackspam
Jan 28 22:36:36 eddieflores sshd\[16637\]: Invalid user kshitij from 80.211.67.90
Jan 28 22:36:36 eddieflores sshd\[16637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.67.90
Jan 28 22:36:39 eddieflores sshd\[16637\]: Failed password for invalid user kshitij from 80.211.67.90 port 35540 ssh2
Jan 28 22:39:51 eddieflores sshd\[17111\]: Invalid user talank from 80.211.67.90
Jan 28 22:39:51 eddieflores sshd\[17111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.67.90
2020-01-29 16:52:23
106.12.4.109 attackspam
Unauthorized connection attempt detected from IP address 106.12.4.109 to port 2220 [J]
2020-01-29 16:54:43
222.186.175.220 attack
2020-01-29T08:32:58.979819abusebot-3.cloudsearch.cf sshd[8301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.220  user=root
2020-01-29T08:33:00.933368abusebot-3.cloudsearch.cf sshd[8301]: Failed password for root from 222.186.175.220 port 40348 ssh2
2020-01-29T08:33:04.797389abusebot-3.cloudsearch.cf sshd[8301]: Failed password for root from 222.186.175.220 port 40348 ssh2
2020-01-29T08:32:58.979819abusebot-3.cloudsearch.cf sshd[8301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.220  user=root
2020-01-29T08:33:00.933368abusebot-3.cloudsearch.cf sshd[8301]: Failed password for root from 222.186.175.220 port 40348 ssh2
2020-01-29T08:33:04.797389abusebot-3.cloudsearch.cf sshd[8301]: Failed password for root from 222.186.175.220 port 40348 ssh2
2020-01-29T08:32:58.979819abusebot-3.cloudsearch.cf sshd[8301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
...
2020-01-29 16:46:40
220.191.208.136 attackbotsspam
unauthorized connection attempt
2020-01-29 16:56:24
167.86.125.13 attack
[portscan] Port scan
2020-01-29 16:15:00
196.203.31.154 attack
Invalid user support from 196.203.31.154 port 44687
2020-01-29 16:15:23
27.79.147.179 attackspam
[Wed Jan 29 04:51:23.332425 2020] [authz_core:error] [pid 14835] [client 27.79.147.179:7471] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/, referer: http://wwww.rncbc.org
[Wed Jan 29 04:51:23.888067 2020] [authz_core:error] [pid 15125] [client 27.79.147.179:7497] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/, referer: http://wwww.rncbc.org
[Wed Jan 29 04:51:24.432470 2020] [authz_core:error] [pid 15181] [client 27.79.147.179:7523] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/, referer: http://wwww.rncbc.org
...
2020-01-29 16:27:10
182.74.69.251 attackspam
Unauthorized connection attempt detected from IP address 182.74.69.251 to port 23 [J]
2020-01-29 16:21:24
62.210.205.155 attackspam
Invalid user cyril from 62.210.205.155 port 60184
2020-01-29 16:28:25
222.186.180.130 attackspam
Jan 29 10:37:04 ncomp sshd[20733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
Jan 29 10:37:06 ncomp sshd[20733]: Failed password for root from 222.186.180.130 port 50591 ssh2
Jan 29 10:40:19 ncomp sshd[20868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
Jan 29 10:40:21 ncomp sshd[20868]: Failed password for root from 222.186.180.130 port 62223 ssh2
2020-01-29 16:42:49
191.54.66.253 attackbotsspam
Unauthorized connection attempt detected from IP address 191.54.66.253 to port 23 [J]
2020-01-29 16:37:31
165.22.247.254 attack
Jan 29 09:15:14 OPSO sshd\[16316\]: Invalid user rabhasa from 165.22.247.254 port 54266
Jan 29 09:15:14 OPSO sshd\[16316\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.247.254
Jan 29 09:15:17 OPSO sshd\[16316\]: Failed password for invalid user rabhasa from 165.22.247.254 port 54266 ssh2
Jan 29 09:18:32 OPSO sshd\[16642\]: Invalid user holika from 165.22.247.254 port 53980
Jan 29 09:18:32 OPSO sshd\[16642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.247.254
2020-01-29 16:22:53
134.209.153.250 attack
SSH/22 MH Probe, BF, Hack -
2020-01-29 16:51:49
201.144.206.244 attackbotsspam
[munged]::80 201.144.206.244 - - [29/Jan/2020:07:16:39 +0100] "POST /[munged]: HTTP/1.1" 200 2019 "-" "-"
[munged]::80 201.144.206.244 - - [29/Jan/2020:07:16:56 +0100] "POST /[munged]: HTTP/1.1" 200 2019 "-" "-"
[munged]::80 201.144.206.244 - - [29/Jan/2020:07:17:12 +0100] "POST /[munged]: HTTP/1.1" 200 2019 "-" "-"
[munged]::80 201.144.206.244 - - [29/Jan/2020:07:17:28 +0100] "POST /[munged]: HTTP/1.1" 200 2019 "-" "-"
[munged]::80 201.144.206.244 - - [29/Jan/2020:07:17:43 +0100] "POST /[munged]: HTTP/1.1" 200 2019 "-" "-"
[munged]::80 201.144.206.244 - - [29/Jan/2020:07:17:59 +0100] "POST /[munged]: HTTP/1.1" 200 2019 "-" "-"
[munged]::80 201.144.206.244 - - [29/Jan/2020:07:18:15 +0100] "POST /[munged]: HTTP/1.1" 200 2019 "-" "-"
[munged]::80 201.144.206.244 - - [29/Jan/2020:07:18:31 +0100] "POST /[munged]: HTTP/1.1" 200 2019 "-" "-"
[munged]::80 201.144.206.244 - - [29/Jan/2020:07:18:47 +0100] "POST /[munged]: HTTP/1.1" 200 2019 "-" "-"
[munged]::80 201.144.206.244 - - [29/Jan/2020:07:19:03 +0100] "POST /[
2020-01-29 16:24:20
36.68.53.80 attackspam
20/1/28@23:51:26: FAIL: Alarm-Network address from=36.68.53.80
...
2020-01-29 16:25:52

最近上报的IP列表

112.80.139.204 112.80.139.22 112.80.139.231 112.80.139.246
112.80.139.253 112.80.139.254 112.80.139.28 112.80.139.4
112.80.139.52 112.80.139.57 112.80.139.59 112.80.139.62
112.80.139.69 112.80.139.71 112.80.139.79 112.80.144.23
112.80.144.38 112.80.150.219 112.80.150.68 112.80.151.145