必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.117.139.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6363
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.117.139.19.			IN	A

;; AUTHORITY SECTION:
.			487	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 21:27:54 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 19.139.117.113.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 19.139.117.113.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.1.203.180 attack
Jan 28 21:28:27 php1 sshd\[1621\]: Invalid user kaushika from 190.1.203.180
Jan 28 21:28:27 php1 sshd\[1621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dsl-emcali-190.1.203.180.emcali.net.co
Jan 28 21:28:29 php1 sshd\[1621\]: Failed password for invalid user kaushika from 190.1.203.180 port 53664 ssh2
Jan 28 21:31:03 php1 sshd\[1955\]: Invalid user bhayanashini from 190.1.203.180
Jan 28 21:31:03 php1 sshd\[1955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dsl-emcali-190.1.203.180.emcali.net.co
2020-01-29 15:32:29
218.240.152.11 attack
Unauthorized connection attempt detected from IP address 218.240.152.11 to port 2220 [J]
2020-01-29 15:08:57
18.220.20.203 attackspam
Jan 29 07:56:24 MK-Soft-Root2 sshd[26313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.220.20.203 
Jan 29 07:56:26 MK-Soft-Root2 sshd[26313]: Failed password for invalid user isita from 18.220.20.203 port 48154 ssh2
...
2020-01-29 15:21:37
190.147.159.34 attack
2020-01-29T17:54:09.164592luisaranguren sshd[2627800]: Invalid user karmistha from 190.147.159.34 port 48100
2020-01-29T17:54:10.835368luisaranguren sshd[2627800]: Failed password for invalid user karmistha from 190.147.159.34 port 48100 ssh2
...
2020-01-29 15:05:01
160.16.197.125 attack
Jan 29 06:40:21 game-panel sshd[5207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.16.197.125
Jan 29 06:40:23 game-panel sshd[5207]: Failed password for invalid user jacob from 160.16.197.125 port 36834 ssh2
Jan 29 06:43:31 game-panel sshd[5314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.16.197.125
2020-01-29 15:01:40
209.105.168.91 attackspambots
Jan 29 01:31:14 NPSTNNYC01T sshd[6638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.105.168.91
Jan 29 01:31:16 NPSTNNYC01T sshd[6638]: Failed password for invalid user nirabhra from 209.105.168.91 port 47304 ssh2
Jan 29 01:36:56 NPSTNNYC01T sshd[6971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.105.168.91
...
2020-01-29 14:59:24
222.186.15.10 attack
Jan 29 04:21:50 firewall sshd[27506]: Failed password for root from 222.186.15.10 port 24358 ssh2
Jan 29 04:21:53 firewall sshd[27506]: Failed password for root from 222.186.15.10 port 24358 ssh2
Jan 29 04:21:56 firewall sshd[27506]: Failed password for root from 222.186.15.10 port 24358 ssh2
...
2020-01-29 15:26:55
138.68.4.198 attackbotsspam
Unauthorized connection attempt detected from IP address 138.68.4.198 to port 2220 [J]
2020-01-29 15:19:47
165.22.108.156 attackspambots
Jan 29 07:14:08 meumeu sshd[20083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.108.156 
Jan 29 07:14:10 meumeu sshd[20083]: Failed password for invalid user samarjit from 165.22.108.156 port 51916 ssh2
Jan 29 07:16:30 meumeu sshd[20453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.108.156 
...
2020-01-29 14:52:38
222.186.30.31 attackspam
Unauthorized connection attempt detected from IP address 222.186.30.31 to port 22 [T]
2020-01-29 14:51:55
182.73.55.91 attack
Jan 29 00:42:57 vzmaster sshd[27021]: Invalid user nainika from 182.73.55.91
Jan 29 00:42:57 vzmaster sshd[27021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.55.91 
Jan 29 00:42:58 vzmaster sshd[27021]: Failed password for invalid user nainika from 182.73.55.91 port 54300 ssh2
Jan 29 00:55:51 vzmaster sshd[12439]: Invalid user manideepa from 182.73.55.91
Jan 29 00:55:51 vzmaster sshd[12439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.55.91 
Jan 29 00:55:53 vzmaster sshd[12439]: Failed password for invalid user manideepa from 182.73.55.91 port 38316 ssh2
Jan 29 01:00:24 vzmaster sshd[18841]: Invalid user imaran from 182.73.55.91
Jan 29 01:00:24 vzmaster sshd[18841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.55.91 
Jan 29 01:00:26 vzmaster sshd[18841]: Failed password for invalid user imaran from 182.73.55.91 port 349........
-------------------------------
2020-01-29 14:52:14
45.55.50.52 attackspambots
Jan 29 08:02:42 silence02 sshd[21390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.50.52
Jan 29 08:02:44 silence02 sshd[21390]: Failed password for invalid user choopa from 45.55.50.52 port 46118 ssh2
Jan 29 08:04:43 silence02 sshd[21474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.50.52
2020-01-29 15:25:44
203.185.61.137 attack
Jan 28 19:16:18 php1 sshd\[17898\]: Invalid user aarush from 203.185.61.137
Jan 28 19:16:18 php1 sshd\[17898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203185061137.static.ctinets.com
Jan 28 19:16:20 php1 sshd\[17898\]: Failed password for invalid user aarush from 203.185.61.137 port 41974 ssh2
Jan 28 19:18:24 php1 sshd\[18104\]: Invalid user gghouse from 203.185.61.137
Jan 28 19:18:24 php1 sshd\[18104\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203185061137.static.ctinets.com
2020-01-29 15:02:07
41.45.21.114 attack
DATE:2020-01-29 05:52:39, IP:41.45.21.114, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-01-29 15:18:43
202.205.160.242 attack
DATE:2020-01-29 05:53:10, IP:202.205.160.242, PORT:ssh SSH brute force auth on honeypot server (epe-honey1-hq)
2020-01-29 15:00:19

最近上报的IP列表

110.125.111.233 118.164.57.176 13.231.107.168 144.71.187.243
26.60.252.109 206.219.85.141 14.66.168.216 186.0.61.221
0.13.78.248 176.165.252.45 105.207.112.156 151.163.163.71
110.211.147.171 141.221.10.130 254.142.44.236 10.122.2.186
148.248.188.127 163.121.28.4 252.185.58.121 157.241.144.165