必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.139.159.236
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54296
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.139.159.236.		IN	A

;; AUTHORITY SECTION:
.			453	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 18:51:18 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 236.159.139.116.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 236.159.139.116.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
217.61.57.72 attack
Mar  7 23:19:30 mail.srvfarm.net postfix/smtpd[2941675]: warning: unknown[217.61.57.72]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar  7 23:19:30 mail.srvfarm.net postfix/smtpd[2941675]: lost connection after AUTH from unknown[217.61.57.72]
Mar  7 23:19:35 mail.srvfarm.net postfix/smtpd[2938495]: warning: unknown[217.61.57.72]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar  7 23:19:35 mail.srvfarm.net postfix/smtpd[2938495]: lost connection after AUTH from unknown[217.61.57.72]
Mar  7 23:19:39 mail.srvfarm.net postfix/smtpd[2941675]: warning: unknown[217.61.57.72]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-03-08 06:37:28
36.227.127.57 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-08 06:45:06
14.187.43.250 attackbotsspam
2020-03-07T22:08:37.119785l03.customhost.org.uk postfix/smtpd[2536]: warning: unknown[14.187.43.250]: SASL PLAIN authentication failed: authentication failure
2020-03-07T22:08:40.938765l03.customhost.org.uk postfix/smtpd[2536]: warning: unknown[14.187.43.250]: SASL LOGIN authentication failed: authentication failure
2020-03-07T22:08:48.742767l03.customhost.org.uk postfix/smtpd[2536]: warning: unknown[14.187.43.250]: SASL PLAIN authentication failed: authentication failure
2020-03-07T22:08:52.560775l03.customhost.org.uk postfix/smtpd[2536]: warning: unknown[14.187.43.250]: SASL LOGIN authentication failed: authentication failure
...
2020-03-08 07:23:48
2a00:d640:d640:9999::2eeb:2a2c attackbotsspam
2a00:d640:d640:9999::2eeb:2a2c - - [08/Mar/2020:01:10:00 +0300] "POST /wp-login.php HTTP/1.1" 200 2790 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-03-08 06:48:14
222.186.31.166 attack
2020-03-07T23:55:53.477731centos sshd\[425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166  user=root
2020-03-07T23:55:55.745754centos sshd\[425\]: Failed password for root from 222.186.31.166 port 52067 ssh2
2020-03-07T23:55:57.900715centos sshd\[425\]: Failed password for root from 222.186.31.166 port 52067 ssh2
2020-03-08 07:07:56
66.34.192.6 attack
firewall-block, port(s): 623/tcp
2020-03-08 06:43:53
49.235.16.103 attack
Mar  7 23:01:06 dev0-dcde-rnet sshd[31883]: Failed password for root from 49.235.16.103 port 39458 ssh2
Mar  7 23:09:06 dev0-dcde-rnet sshd[31922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.16.103
Mar  7 23:09:08 dev0-dcde-rnet sshd[31922]: Failed password for invalid user liuyukun from 49.235.16.103 port 51958 ssh2
2020-03-08 07:16:52
115.29.7.45 attackbots
Mar  7 21:31:13 vps sshd\[17060\]: Invalid user ftpuser from 115.29.7.45
Mar  7 23:10:04 vps sshd\[19289\]: Invalid user ftpuser from 115.29.7.45
...
2020-03-08 06:43:23
166.175.57.73 attack
Brute forcing email accounts
2020-03-08 06:51:04
45.134.179.57 attackspambots
firewall-block, port(s): 33604/tcp, 33611/tcp, 33612/tcp, 33619/tcp, 33620/tcp, 33629/tcp, 33646/tcp, 33647/tcp, 33654/tcp, 33662/tcp, 33669/tcp, 33678/tcp, 33688/tcp, 33693/tcp, 33695/tcp, 33696/tcp, 33705/tcp, 33706/tcp, 33710/tcp, 33712/tcp, 33713/tcp, 33721/tcp, 33722/tcp, 33728/tcp, 33747/tcp, 33750/tcp, 33753/tcp, 33754/tcp, 33761/tcp, 33762/tcp, 33766/tcp, 33768/tcp, 33769/tcp, 33773/tcp, 33779/tcp, 33780/tcp, 33785/tcp, 33786/tcp, 33787/tcp, 33801/tcp, 33806/tcp, 33810/tcp, 33812/tcp, 33813/tcp, 33816/tcp, 33818/tcp, 33821/tcp, 33826/tcp, 33827/tcp, 33828/tcp, 33831/tcp, 33835/tcp, 33842/tcp, 33848/tcp, 33853/tcp, 33875/tcp, 33876/tcp, 33888/tcp, 33896/tcp
2020-03-08 06:46:41
117.89.13.188 attackbots
Lines containing failures of 117.89.13.188
Mar  6 16:37:59 UTC__SANYALnet-Labs__cac1 sshd[18498]: Connection from 117.89.13.188 port 33564 on 104.167.106.93 port 22
Mar  6 16:38:01 UTC__SANYALnet-Labs__cac1 sshd[18498]: reveeclipse mapping checking getaddrinfo for 188.13.89.117.broad.nj.js.dynamic.163data.com.cn [117.89.13.188] failed - POSSIBLE BREAK-IN ATTEMPT!
Mar  6 16:38:01 UTC__SANYALnet-Labs__cac1 sshd[18498]: User r.r from 117.89.13.188 not allowed because not listed in AllowUsers
Mar  6 16:38:02 UTC__SANYALnet-Labs__cac1 sshd[18498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.89.13.188  user=r.r
Mar  6 16:38:04 UTC__SANYALnet-Labs__cac1 sshd[18498]: Failed password for invalid user r.r from 117.89.13.188 port 33564 ssh2
Mar  6 16:38:04 UTC__SANYALnet-Labs__cac1 sshd[18498]: Received disconnect from 117.89.13.188 port 33564:11: Bye Bye [preauth]
Mar  6 16:38:04 UTC__SANYALnet-Labs__cac1 sshd[18498]: Disconnected fr........
------------------------------
2020-03-08 07:13:01
45.134.179.52 attack
firewall-block, port(s): 290/tcp, 295/tcp, 330/tcp, 350/tcp, 380/tcp, 3940/tcp, 9678/tcp, 13334/tcp, 28889/tcp, 29596/tcp, 29899/tcp, 34041/tcp, 34243/tcp, 44647/tcp, 46768/tcp, 46970/tcp, 47374/tcp, 47576/tcp, 48283/tcp, 48788/tcp, 52728/tcp, 56162/tcp, 63632/tcp
2020-03-08 06:47:56
138.197.136.72 attack
GET /wp-login.php HTTP/1.1
2020-03-08 07:26:14
213.32.90.232 attack
Mar  7 23:59:50 ift sshd\[46557\]: Invalid user storm from 213.32.90.232Mar  7 23:59:52 ift sshd\[46557\]: Failed password for invalid user storm from 213.32.90.232 port 55918 ssh2Mar  8 00:04:33 ift sshd\[47271\]: Invalid user d from 213.32.90.232Mar  8 00:04:34 ift sshd\[47271\]: Failed password for invalid user d from 213.32.90.232 port 53552 ssh2Mar  8 00:09:13 ift sshd\[47884\]: Invalid user lingqi from 213.32.90.232
...
2020-03-08 07:10:50
141.98.10.137 attack
Mar  7 23:28:07 mail postfix/smtpd\[10549\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Mar  7 23:32:42 mail postfix/smtpd\[11067\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Mar  8 00:14:42 mail postfix/smtpd\[11665\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Mar  8 00:20:37 mail postfix/smtpd\[12037\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-03-08 07:22:22

最近上报的IP列表

116.138.163.160 116.14.10.52 116.14.177.148 116.14.171.110
116.14.19.204 116.14.202.22 116.14.217.2 116.14.41.229
116.14.49.158 114.104.183.20 116.14.60.83 116.14.91.1
116.14.78.17 116.140.101.131 116.140.101.45 114.104.183.200
116.140.108.12 114.104.183.203 114.104.183.204 114.104.183.205