必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.16.139.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17672
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.16.139.159.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 07:05:25 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 159.139.16.116.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 159.139.16.116.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
121.204.166.240 attack
May 21 06:25:55 eventyay sshd[13133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.204.166.240
May 21 06:25:57 eventyay sshd[13133]: Failed password for invalid user xwg from 121.204.166.240 port 60343 ssh2
May 21 06:29:10 eventyay sshd[13240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.204.166.240
...
2020-05-21 12:36:10
197.214.64.230 attackbots
2020-05-21T04:11:31.728754shield sshd\[19569\]: Invalid user rgp from 197.214.64.230 port 40746
2020-05-21T04:11:31.732797shield sshd\[19569\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.214.64.230
2020-05-21T04:11:33.450343shield sshd\[19569\]: Failed password for invalid user rgp from 197.214.64.230 port 40746 ssh2
2020-05-21T04:15:48.847948shield sshd\[20238\]: Invalid user kfm from 197.214.64.230 port 46412
2020-05-21T04:15:48.851592shield sshd\[20238\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.214.64.230
2020-05-21 12:28:53
177.87.68.236 attack
(smtpauth) Failed SMTP AUTH login from 177.87.68.236 (BR/Brazil/ns68236.terres.net.br): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-05-21 08:29:12 plain authenticator failed for ([177.87.68.236]) [177.87.68.236]: 535 Incorrect authentication data (set_id=m.kamran)
2020-05-21 12:24:07
37.255.233.80 attackbotsspam
May 20 23:59:30 lanister sshd[2405]: Failed password for invalid user pi from 37.255.233.80 port 55604 ssh2
May 20 23:59:28 lanister sshd[2404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.255.233.80
May 20 23:59:28 lanister sshd[2404]: Invalid user pi from 37.255.233.80
May 20 23:59:30 lanister sshd[2404]: Failed password for invalid user pi from 37.255.233.80 port 55596 ssh2
2020-05-21 12:16:02
40.115.247.138 attack
May 21 02:01:39 minden010 sshd[3016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.115.247.138
May 21 02:01:40 minden010 sshd[3016]: Failed password for invalid user add from 40.115.247.138 port 34172 ssh2
May 21 02:03:34 minden010 sshd[3260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.115.247.138
...
2020-05-21 08:31:35
129.28.157.199 attackbotsspam
May 21 06:21:46 vps647732 sshd[3033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.157.199
May 21 06:21:48 vps647732 sshd[3033]: Failed password for invalid user ywn from 129.28.157.199 port 42880 ssh2
...
2020-05-21 12:22:53
125.230.108.169 attackbotsspam
trying to access non-authorized port
2020-05-21 12:00:25
87.117.178.105 attackbots
May 21 00:56:03 firewall sshd[10524]: Invalid user tqv from 87.117.178.105
May 21 00:56:04 firewall sshd[10524]: Failed password for invalid user tqv from 87.117.178.105 port 44428 ssh2
May 21 00:59:26 firewall sshd[10640]: Invalid user mhi from 87.117.178.105
...
2020-05-21 12:19:19
115.231.158.146 attackbots
Attempts against Pop3/IMAP
2020-05-21 12:34:50
191.53.196.136 attackspam
(smtpauth) Failed SMTP AUTH login from 191.53.196.136 (BR/Brazil/191-53-196-136.dvl-wr.mastercabo.com.br): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-05-21 08:28:59 plain authenticator failed for ([191.53.196.136]) [191.53.196.136]: 535 Incorrect authentication data (set_id=m.kamran@safanicu.com)
2020-05-21 12:34:04
58.27.99.112 attackbotsspam
ssh brute force
2020-05-21 12:23:39
123.206.64.77 attackbotsspam
May 21 05:52:36 vps sshd[566719]: Failed password for invalid user dot from 123.206.64.77 port 41386 ssh2
May 21 05:56:15 vps sshd[585068]: Invalid user yad from 123.206.64.77 port 33692
May 21 05:56:15 vps sshd[585068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.64.77
May 21 05:56:17 vps sshd[585068]: Failed password for invalid user yad from 123.206.64.77 port 33692 ssh2
May 21 05:59:48 vps sshd[598274]: Invalid user xvl from 123.206.64.77 port 53216
...
2020-05-21 12:03:58
114.80.94.228 attackspambots
May 21 05:51:52 Ubuntu-1404-trusty-64-minimal sshd\[994\]: Invalid user cjc from 114.80.94.228
May 21 05:51:52 Ubuntu-1404-trusty-64-minimal sshd\[994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.80.94.228
May 21 05:51:54 Ubuntu-1404-trusty-64-minimal sshd\[994\]: Failed password for invalid user cjc from 114.80.94.228 port 10523 ssh2
May 21 06:12:54 Ubuntu-1404-trusty-64-minimal sshd\[15595\]: Invalid user wqz from 114.80.94.228
May 21 06:12:54 Ubuntu-1404-trusty-64-minimal sshd\[15595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.80.94.228
2020-05-21 12:18:40
96.127.179.156 attackbotsspam
May 21 01:56:58 h1745522 sshd[10807]: Invalid user xhd from 96.127.179.156 port 46996
May 21 01:56:58 h1745522 sshd[10807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.127.179.156
May 21 01:56:58 h1745522 sshd[10807]: Invalid user xhd from 96.127.179.156 port 46996
May 21 01:57:00 h1745522 sshd[10807]: Failed password for invalid user xhd from 96.127.179.156 port 46996 ssh2
May 21 02:00:19 h1745522 sshd[11276]: Invalid user mv from 96.127.179.156 port 53988
May 21 02:00:19 h1745522 sshd[11276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.127.179.156
May 21 02:00:19 h1745522 sshd[11276]: Invalid user mv from 96.127.179.156 port 53988
May 21 02:00:21 h1745522 sshd[11276]: Failed password for invalid user mv from 96.127.179.156 port 53988 ssh2
May 21 02:03:39 h1745522 sshd[11724]: Invalid user emg from 96.127.179.156 port 60976
...
2020-05-21 08:31:12
156.96.46.114 attackbotsspam
SASL broute force
2020-05-21 12:26:46

最近上报的IP列表

218.173.225.133 195.123.241.30 123.129.65.254 197.246.202.117
45.61.184.2 159.65.59.113 158.174.208.158 93.178.119.192
111.92.76.241 3.0.31.133 27.23.251.56 2.135.67.39
138.201.119.222 139.227.155.164 183.189.21.220 113.67.229.224
188.14.132.73 58.11.55.209 188.208.63.152 1.117.143.141