必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Viet Nam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.107.145.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64154
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.107.145.93.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 11:47:03 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
93.145.107.116.in-addr.arpa domain name pointer dynamic-ip-adsl.viettel.vn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
93.145.107.116.in-addr.arpa	name = dynamic-ip-adsl.viettel.vn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
41.33.154.146 attackspambots
Unauthorized connection attempt from IP address 41.33.154.146 on Port 445(SMB)
2020-10-09 15:22:22
177.53.147.188 attackspam
Unauthorized connection attempt from IP address 177.53.147.188 on Port 445(SMB)
2020-10-09 15:02:23
141.98.216.154 attack
[2020-10-09 03:02:51] NOTICE[1182] chan_sip.c: Registration from '' failed for '141.98.216.154:55722' - Wrong password
[2020-10-09 03:02:51] SECURITY[1204] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-10-09T03:02:51.666-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="607",SessionID="0x7f22f8572958",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/141.98.216.154/55722",Challenge="5486b07e",ReceivedChallenge="5486b07e",ReceivedHash="8ad0544ebf8ca430c9eee69b8bf23dca"
[2020-10-09 03:06:44] NOTICE[1182] chan_sip.c: Registration from '' failed for '141.98.216.154:57312' - Wrong password
[2020-10-09 03:06:44] SECURITY[1204] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-10-09T03:06:44.734-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="607",SessionID="0x7f22f8572958",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/141.98.216.154
...
2020-10-09 15:09:53
182.122.6.73 attack
Oct  9 06:55:11 rocket sshd[32088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.122.6.73
Oct  9 06:55:12 rocket sshd[32088]: Failed password for invalid user root0 from 182.122.6.73 port 35940 ssh2
...
2020-10-09 15:11:42
94.25.228.146 attackspam
Unauthorized connection attempt from IP address 94.25.228.146 on Port 445(SMB)
2020-10-09 15:33:10
186.147.35.76 attackspam
(sshd) Failed SSH login from 186.147.35.76 (CO/Colombia/static-ip-1861473576.cable.net.co): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  9 01:03:00 server sshd[5761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.147.35.76  user=root
Oct  9 01:03:01 server sshd[5761]: Failed password for root from 186.147.35.76 port 57511 ssh2
Oct  9 01:21:01 server sshd[10186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.147.35.76  user=root
Oct  9 01:21:03 server sshd[10186]: Failed password for root from 186.147.35.76 port 44055 ssh2
Oct  9 01:25:46 server sshd[11303]: Invalid user system2 from 186.147.35.76 port 46344
2020-10-09 15:39:21
210.22.77.70 attack
Oct  8 19:25:29 hanapaa sshd\[24789\]: Invalid user upload from 210.22.77.70
Oct  8 19:25:29 hanapaa sshd\[24789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.22.77.70
Oct  8 19:25:31 hanapaa sshd\[24789\]: Failed password for invalid user upload from 210.22.77.70 port 20224 ssh2
Oct  8 19:32:08 hanapaa sshd\[25275\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.22.77.70  user=root
Oct  8 19:32:09 hanapaa sshd\[25275\]: Failed password for root from 210.22.77.70 port 33184 ssh2
2020-10-09 15:35:17
62.210.206.78 attack
SSH login attempts.
2020-10-09 15:25:56
206.189.171.204 attack
Oct  9 09:59:14 dignus sshd[26614]: Failed password for invalid user rr from 206.189.171.204 port 33080 ssh2
Oct  9 10:02:40 dignus sshd[26691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.171.204  user=root
Oct  9 10:02:42 dignus sshd[26691]: Failed password for root from 206.189.171.204 port 38796 ssh2
Oct  9 10:06:11 dignus sshd[26741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.171.204  user=root
Oct  9 10:06:14 dignus sshd[26741]: Failed password for root from 206.189.171.204 port 44484 ssh2
...
2020-10-09 15:09:35
190.248.84.205 attackbots
repeated SSH login attempts
2020-10-09 15:36:52
209.141.41.230 attackbotsspam
Port scan denied
2020-10-09 15:22:46
31.135.44.108 attackbots
Unauthorized connection attempt from IP address 31.135.44.108 on Port 445(SMB)
2020-10-09 15:36:03
93.179.93.54 attack
Icarus honeypot on github
2020-10-09 15:43:00
110.164.163.54 attack
Oct  7 04:52:33 datentool sshd[4173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.164.163.54  user=r.r
Oct  7 04:52:35 datentool sshd[4173]: Failed password for r.r from 110.164.163.54 port 44540 ssh2
Oct  7 05:05:55 datentool sshd[4453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.164.163.54  user=r.r
Oct  7 05:05:57 datentool sshd[4453]: Failed password for r.r from 110.164.163.54 port 44684 ssh2
Oct  7 05:12:30 datentool sshd[4509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.164.163.54  user=r.r
Oct  7 05:12:31 datentool sshd[4509]: Failed password for r.r from 110.164.163.54 port 49714 ssh2
Oct  7 05:18:52 datentool sshd[4609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.164.163.54  user=r.r
Oct  7 05:18:53 datentool sshd[4609]: Failed password for r.r from 110.164.163.54 port........
-------------------------------
2020-10-09 15:27:23
201.209.94.67 attackbotsspam
20/10/8@16:46:01: FAIL: Alarm-Intrusion address from=201.209.94.67
...
2020-10-09 15:30:15

最近上报的IP列表

4.29.159.222 151.193.251.75 240.34.140.199 51.243.139.250
57.155.125.95 3.122.73.231 240.231.114.52 64.164.112.31
12.51.16.117 17.164.43.40 244.243.77.69 7.104.82.172
195.156.42.128 194.177.154.142 218.125.43.241 249.30.140.31
145.127.1.176 212.226.133.193 54.191.149.112 232.31.221.187