必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.117.139.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44615
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.117.139.86.			IN	A

;; AUTHORITY SECTION:
.			491	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 16:01:40 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 86.139.117.118.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 86.139.117.118.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.129.33.101 attackspam
Multiport scan : 80 ports scanned 1000 1122 2019 2020 2289 3323 3360 3362 3363 3364 3365 3366 3367 3368 3369 3370 3371 3372 3373 3374 3375 3376 3377 3378 3379 3380 3381 3382 3383 3384 3385 3386 3387 3388 3390 3391 3392 3394 3395 3396 3397 3398 3399 3400 3401 3402 3403 3404 3405 3406 3407 3408 3409 3411 3413 3414 3415 3416 3417 3418 3419 3420 4001 4567 5050 5555 6556 6996 7000 7777 8088 8090 8800 8877 8888 8933 9999 13389 22222 23389
2020-08-28 07:15:52
223.4.66.222 attack
Time:     Thu Aug 27 21:50:13 2020 +0000
IP:       223.4.66.222 (CN/China/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Aug 27 21:39:01 vps1 sshd[9143]: Invalid user admin from 223.4.66.222 port 12915
Aug 27 21:39:03 vps1 sshd[9143]: Failed password for invalid user admin from 223.4.66.222 port 12915 ssh2
Aug 27 21:47:46 vps1 sshd[9371]: Invalid user popuser from 223.4.66.222 port 11386
Aug 27 21:47:48 vps1 sshd[9371]: Failed password for invalid user popuser from 223.4.66.222 port 11386 ssh2
Aug 27 21:50:09 vps1 sshd[9439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.4.66.222  user=root
2020-08-28 06:38:08
111.93.71.219 attack
2020-08-27T21:19:01.754911shield sshd\[21874\]: Invalid user deploy from 111.93.71.219 port 60682
2020-08-27T21:19:01.794423shield sshd\[21874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.71.219
2020-08-27T21:19:03.749817shield sshd\[21874\]: Failed password for invalid user deploy from 111.93.71.219 port 60682 ssh2
2020-08-27T21:22:58.973378shield sshd\[23106\]: Invalid user demo from 111.93.71.219 port 35226
2020-08-27T21:22:59.024381shield sshd\[23106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.71.219
2020-08-28 07:02:19
196.0.113.214 attackbots
Aug 27 11:46:39 mail.srvfarm.net postfix/smtpd[1519780]: warning: unknown[196.0.113.214]: SASL PLAIN authentication failed: 
Aug 27 11:46:40 mail.srvfarm.net postfix/smtpd[1519780]: lost connection after AUTH from unknown[196.0.113.214]
Aug 27 11:49:24 mail.srvfarm.net postfix/smtpd[1519775]: warning: unknown[196.0.113.214]: SASL PLAIN authentication failed: 
Aug 27 11:49:25 mail.srvfarm.net postfix/smtpd[1519775]: lost connection after AUTH from unknown[196.0.113.214]
Aug 27 11:55:49 mail.srvfarm.net postfix/smtpd[1519776]: warning: unknown[196.0.113.214]: SASL PLAIN authentication failed:
2020-08-28 07:06:13
51.68.190.223 attackspam
Aug 27 23:18:56 inter-technics sshd[13349]: Invalid user nagios from 51.68.190.223 port 35916
Aug 27 23:18:57 inter-technics sshd[13349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.190.223
Aug 27 23:18:56 inter-technics sshd[13349]: Invalid user nagios from 51.68.190.223 port 35916
Aug 27 23:18:59 inter-technics sshd[13349]: Failed password for invalid user nagios from 51.68.190.223 port 35916 ssh2
Aug 27 23:22:42 inter-technics sshd[13643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.190.223  user=root
Aug 27 23:22:44 inter-technics sshd[13643]: Failed password for root from 51.68.190.223 port 40978 ssh2
...
2020-08-28 06:48:06
89.187.168.172 attackspambots
0,39-12/07 [bc00/m60] PostRequest-Spammer scoring: brussels
2020-08-28 06:54:50
150.136.81.55 attackspambots
Aug 27 21:04:40 onepixel sshd[4119694]: Failed password for root from 150.136.81.55 port 57254 ssh2
Aug 27 21:07:09 onepixel sshd[4120037]: Invalid user thierry from 150.136.81.55 port 60482
Aug 27 21:07:09 onepixel sshd[4120037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.136.81.55 
Aug 27 21:07:09 onepixel sshd[4120037]: Invalid user thierry from 150.136.81.55 port 60482
Aug 27 21:07:11 onepixel sshd[4120037]: Failed password for invalid user thierry from 150.136.81.55 port 60482 ssh2
2020-08-28 07:01:23
91.83.161.107 attackspambots
Aug 27 06:00:27 mail.srvfarm.net postfix/smtps/smtpd[1364784]: warning: unknown[91.83.161.107]: SASL PLAIN authentication failed: 
Aug 27 06:00:27 mail.srvfarm.net postfix/smtps/smtpd[1364784]: lost connection after AUTH from unknown[91.83.161.107]
Aug 27 06:01:41 mail.srvfarm.net postfix/smtpd[1379880]: warning: unknown[91.83.161.107]: SASL PLAIN authentication failed: 
Aug 27 06:01:41 mail.srvfarm.net postfix/smtpd[1379880]: lost connection after AUTH from unknown[91.83.161.107]
Aug 27 06:09:50 mail.srvfarm.net postfix/smtps/smtpd[1381943]: warning: unknown[91.83.161.107]: SASL PLAIN authentication failed:
2020-08-28 07:13:14
177.130.162.146 attackbotsspam
Aug 27 12:03:57 mail.srvfarm.net postfix/smtps/smtpd[1523356]: warning: unknown[177.130.162.146]: SASL PLAIN authentication failed: 
Aug 27 12:03:57 mail.srvfarm.net postfix/smtps/smtpd[1523356]: lost connection after AUTH from unknown[177.130.162.146]
Aug 27 12:04:19 mail.srvfarm.net postfix/smtps/smtpd[1523325]: warning: unknown[177.130.162.146]: SASL PLAIN authentication failed: 
Aug 27 12:04:19 mail.srvfarm.net postfix/smtps/smtpd[1523325]: lost connection after AUTH from unknown[177.130.162.146]
Aug 27 12:12:46 mail.srvfarm.net postfix/smtpd[1525631]: warning: unknown[177.130.162.146]: SASL PLAIN authentication failed:
2020-08-28 07:08:55
121.122.99.187 attackbots
Automatic report - Port Scan Attack
2020-08-28 06:46:04
87.103.126.98 attack
Aug 27 22:15:14 rush sshd[4737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.103.126.98
Aug 27 22:15:15 rush sshd[4737]: Failed password for invalid user linuxprobe from 87.103.126.98 port 51742 ssh2
Aug 27 22:18:55 rush sshd[4858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.103.126.98
...
2020-08-28 06:41:15
106.12.122.138 attack
Aug 27 23:45:06 ip106 sshd[709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.122.138 
Aug 27 23:45:08 ip106 sshd[709]: Failed password for invalid user db2fenc1 from 106.12.122.138 port 49722 ssh2
...
2020-08-28 06:39:35
141.98.10.200 attackspambots
Aug 28 01:08:26 marvibiene sshd[25842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.10.200 
Aug 28 01:08:28 marvibiene sshd[25842]: Failed password for invalid user admin from 141.98.10.200 port 37509 ssh2
Aug 28 01:08:55 marvibiene sshd[25891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.10.200
2020-08-28 07:11:19
13.75.92.25 attackspambots
2020-08-28 00:22:32 dovecot_login authenticator failed for \(ADMIN\) \[13.75.92.25\]: 535 Incorrect authentication data \(set_id=jonas.bathke@jugend-ohne-grenzen.net\)
2020-08-28 00:22:32 dovecot_login authenticator failed for \(ADMIN\) \[13.75.92.25\]: 535 Incorrect authentication data \(set_id=info@jugend-ohne-grenzen.net\)
2020-08-28 00:22:32 dovecot_login authenticator failed for \(ADMIN\) \[13.75.92.25\]: 535 Incorrect authentication data \(set_id=alica.levenhagen@jugend-ohne-grenzen.net\)
2020-08-28 00:25:10 dovecot_login authenticator failed for \(ADMIN\) \[13.75.92.25\]: 535 Incorrect authentication data \(set_id=info@jugend-ohne-grenzen.net\)
2020-08-28 00:25:10 dovecot_login authenticator failed for \(ADMIN\) \[13.75.92.25\]: 535 Incorrect authentication data \(set_id=alica.levenhagen@jugend-ohne-grenzen.net\)
2020-08-28 00:25:10 dovecot_login authenticator failed for \(ADMIN\) \[13.75.92.25\]: 535 Incorrect authentication data \(set_id=jonas.bathke@jugend-ohne-grenzen.net\)
...
2020-08-28 06:47:15
201.156.225.127 attack
Automatic report - Port Scan Attack
2020-08-28 06:38:28

最近上报的IP列表

118.117.139.123 113.116.42.238 118.117.174.144 118.117.188.100
118.117.188.104 118.117.188.10 118.117.188.107 118.117.188.110
118.117.188.102 118.117.188.108 118.117.17.25 118.117.188.112
118.117.188.118 118.117.188.114 118.117.188.12 118.117.188.121
118.117.188.124 118.117.188.122 118.117.188.130 118.117.188.132