必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.135.142.226
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46023
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.135.142.226.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024092601 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 27 03:36:46 CST 2024
;; MSG SIZE  rcvd: 108
HOST信息:
Host 226.142.135.113.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 226.142.135.113.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
140.143.233.218 attackbots
Aug 8 17:32:45 *hidden* sshd[4268]: Failed password for *hidden* from 140.143.233.218 port 52582 ssh2 Aug 8 17:35:55 *hidden* sshd[4668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.233.218 user=root Aug 8 17:35:57 *hidden* sshd[4668]: Failed password for *hidden* from 140.143.233.218 port 54570 ssh2
2020-08-08 23:36:52
77.204.146.180 attack
residential vpn service
2020-08-08 23:47:40
110.43.50.229 attackspam
2020-08-08T13:02:58.526343ionos.janbro.de sshd[119162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.43.50.229  user=root
2020-08-08T13:03:00.442108ionos.janbro.de sshd[119162]: Failed password for root from 110.43.50.229 port 11176 ssh2
2020-08-08T13:08:36.551743ionos.janbro.de sshd[119173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.43.50.229  user=root
2020-08-08T13:08:38.534502ionos.janbro.de sshd[119173]: Failed password for root from 110.43.50.229 port 5842 ssh2
2020-08-08T13:13:59.840701ionos.janbro.de sshd[119215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.43.50.229  user=root
2020-08-08T13:14:01.831966ionos.janbro.de sshd[119215]: Failed password for root from 110.43.50.229 port 65016 ssh2
2020-08-08T13:19:27.938508ionos.janbro.de sshd[119248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=11
...
2020-08-08 23:37:26
79.137.116.226 attackspam
ET SCAN Sipvicious Scan - port: 5060 proto: udp cat: Attempted Information Leakbytes: 455
2020-08-08 23:40:43
118.25.74.199 attack
Aug  8 14:13:50  sshd\[30443\]: User root from 118.25.74.199 not allowed because not listed in AllowUsersAug  8 14:13:52  sshd\[30443\]: Failed password for invalid user root from 118.25.74.199 port 34810 ssh2
...
2020-08-09 00:15:19
3.101.0.4 attackspambots
AWS bot
2020-08-08 23:52:32
52.229.114.81 attackbots
" "
2020-08-09 00:20:25
163.172.49.56 attack
Aug  8 16:59:36 vps sshd[16520]: Failed password for root from 163.172.49.56 port 47064 ssh2
Aug  8 17:14:32 vps sshd[17435]: Failed password for root from 163.172.49.56 port 57973 ssh2
...
2020-08-09 00:10:36
127.0.0.1 attackspambots
This is a Test for the status Page
2020-08-09 00:02:48
1.196.238.130 attackspam
Aug  8 15:06:05 mail sshd[32549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.196.238.130  user=root
Aug  8 15:06:07 mail sshd[32549]: Failed password for root from 1.196.238.130 port 37976 ssh2
...
2020-08-08 23:42:55
13.68.247.181 attackspam
[f2b] sshd bruteforce, retries: 1
2020-08-08 23:50:19
46.235.72.115 attackbotsspam
Aug  2 20:47:50 cumulus sshd[32146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.235.72.115  user=r.r
Aug  2 20:47:52 cumulus sshd[32146]: Failed password for r.r from 46.235.72.115 port 33846 ssh2
Aug  2 20:47:52 cumulus sshd[32146]: Received disconnect from 46.235.72.115 port 33846:11: Bye Bye [preauth]
Aug  2 20:47:52 cumulus sshd[32146]: Disconnected from 46.235.72.115 port 33846 [preauth]
Aug  2 20:53:27 cumulus sshd[32643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.235.72.115  user=r.r
Aug  2 20:53:28 cumulus sshd[32643]: Failed password for r.r from 46.235.72.115 port 59656 ssh2
Aug  2 20:53:28 cumulus sshd[32643]: Received disconnect from 46.235.72.115 port 59656:11: Bye Bye [preauth]
Aug  2 20:53:28 cumulus sshd[32643]: Disconnected from 46.235.72.115 port 59656 [preauth]
Aug  2 20:58:01 cumulus sshd[635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e........
-------------------------------
2020-08-08 23:39:52
208.109.11.34 attackspambots
Aug  8 12:27:45 game-panel sshd[25632]: Failed password for root from 208.109.11.34 port 48340 ssh2
Aug  8 12:32:11 game-panel sshd[25887]: Failed password for root from 208.109.11.34 port 48532 ssh2
2020-08-08 23:43:26
194.26.29.13 attack
Aug  8 17:39:25 debian-2gb-nbg1-2 kernel: \[19159611.282734\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.13 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=1594 PROTO=TCP SPT=54762 DPT=634 WINDOW=1024 RES=0x00 SYN URGP=0
2020-08-08 23:45:24
182.148.112.4 attackbots
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-08 23:52:14

最近上报的IP列表

113.133.79.232 113.135.11.217 113.134.140.164 113.134.36.49
113.132.206.228 113.134.87.30 113.135.223.8 113.135.233.47
113.134.2.38 113.135.171.208 113.133.209.129 113.132.203.152
113.135.29.11 113.135.159.109 113.134.83.178 113.133.7.198
113.135.26.141 113.134.81.247 113.132.205.128 113.135.17.92