必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea Republic of

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.131.216.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44671
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.131.216.118.		IN	A

;; AUTHORITY SECTION:
.			192	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 23:41:56 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 118.216.131.118.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 118.216.131.118.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
187.24.130.93 attackspambots
2020-05-15T05:48:03.433846mail.broermann.family sshd[19086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187-24-130-93.3g.claro.net.br
2020-05-15T05:48:03.185004mail.broermann.family sshd[19086]: Invalid user ubnt from 187.24.130.93 port 14776
2020-05-15T05:48:05.567960mail.broermann.family sshd[19086]: Failed password for invalid user ubnt from 187.24.130.93 port 14776 ssh2
2020-05-15T05:48:08.164377mail.broermann.family sshd[19109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187-24-130-93.3g.claro.net.br  user=root
2020-05-15T05:48:09.650574mail.broermann.family sshd[19109]: Failed password for root from 187.24.130.93 port 14777 ssh2
...
2020-05-15 19:55:49
139.194.143.105 attack
Honeypot hit.
2020-05-15 20:10:36
167.71.48.57 attackspam
May 15 11:47:20 vserver sshd\[20067\]: Invalid user ohh from 167.71.48.57May 15 11:47:22 vserver sshd\[20067\]: Failed password for invalid user ohh from 167.71.48.57 port 60676 ssh2May 15 11:51:46 vserver sshd\[20109\]: Invalid user po8 from 167.71.48.57May 15 11:51:48 vserver sshd\[20109\]: Failed password for invalid user po8 from 167.71.48.57 port 52682 ssh2
...
2020-05-15 19:54:47
103.123.87.233 attackspam
May 15 05:24:40 server1 sshd\[3069\]: Failed password for invalid user user from 103.123.87.233 port 48360 ssh2
May 15 05:27:02 server1 sshd\[3760\]: Invalid user zf from 103.123.87.233
May 15 05:27:02 server1 sshd\[3760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.123.87.233 
May 15 05:27:04 server1 sshd\[3760\]: Failed password for invalid user zf from 103.123.87.233 port 50366 ssh2
May 15 05:29:43 server1 sshd\[4602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.123.87.233  user=root
...
2020-05-15 19:51:32
68.183.12.80 attackspambots
Invalid user payroll from 68.183.12.80 port 37124
2020-05-15 20:19:13
192.42.116.26 attack
CMS (WordPress or Joomla) login attempt.
2020-05-15 19:56:04
45.225.216.80 attack
May 15 12:29:51 srv-ubuntu-dev3 sshd[1672]: Invalid user ubuntu from 45.225.216.80
May 15 12:29:51 srv-ubuntu-dev3 sshd[1672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.225.216.80
May 15 12:29:51 srv-ubuntu-dev3 sshd[1672]: Invalid user ubuntu from 45.225.216.80
May 15 12:29:54 srv-ubuntu-dev3 sshd[1672]: Failed password for invalid user ubuntu from 45.225.216.80 port 56964 ssh2
May 15 12:32:09 srv-ubuntu-dev3 sshd[2100]: Invalid user panasonic from 45.225.216.80
May 15 12:32:09 srv-ubuntu-dev3 sshd[2100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.225.216.80
May 15 12:32:09 srv-ubuntu-dev3 sshd[2100]: Invalid user panasonic from 45.225.216.80
May 15 12:32:11 srv-ubuntu-dev3 sshd[2100]: Failed password for invalid user panasonic from 45.225.216.80 port 54796 ssh2
May 15 12:34:27 srv-ubuntu-dev3 sshd[2517]: Invalid user privoxy from 45.225.216.80
...
2020-05-15 20:21:34
14.29.64.91 attackbots
May 15 06:54:36 vps687878 sshd\[29532\]: Failed password for invalid user ellen from 14.29.64.91 port 38180 ssh2
May 15 06:57:46 vps687878 sshd\[29868\]: Invalid user msr from 14.29.64.91 port 44426
May 15 06:57:46 vps687878 sshd\[29868\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.64.91
May 15 06:57:48 vps687878 sshd\[29868\]: Failed password for invalid user msr from 14.29.64.91 port 44426 ssh2
May 15 07:01:31 vps687878 sshd\[30274\]: Invalid user ykk from 14.29.64.91 port 50706
May 15 07:01:31 vps687878 sshd\[30274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.64.91
...
2020-05-15 19:54:17
182.253.75.234 attackbotsspam
$f2bV_matches
2020-05-15 20:13:34
129.226.118.77 attackbots
May 15 13:43:31 web1 sshd[23478]: Invalid user samba from 129.226.118.77 port 39458
May 15 13:43:31 web1 sshd[23478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.118.77
May 15 13:43:31 web1 sshd[23478]: Invalid user samba from 129.226.118.77 port 39458
May 15 13:43:33 web1 sshd[23478]: Failed password for invalid user samba from 129.226.118.77 port 39458 ssh2
May 15 13:53:53 web1 sshd[26154]: Invalid user monika from 129.226.118.77 port 52008
May 15 13:53:53 web1 sshd[26154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.118.77
May 15 13:53:53 web1 sshd[26154]: Invalid user monika from 129.226.118.77 port 52008
May 15 13:53:55 web1 sshd[26154]: Failed password for invalid user monika from 129.226.118.77 port 52008 ssh2
May 15 14:02:35 web1 sshd[28341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.118.77  user=root
May 15 14:02:37 web1 
...
2020-05-15 20:20:38
64.90.40.100 attack
CMS (WordPress or Joomla) login attempt.
2020-05-15 19:56:54
129.28.173.105 attack
Invalid user george from 129.28.173.105 port 51464
2020-05-15 20:26:42
65.93.189.5 attackspam
May 14 19:50:11 cumulus sshd[21801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.93.189.5  user=r.r
May 14 19:50:14 cumulus sshd[21801]: Failed password for r.r from 65.93.189.5 port 44729 ssh2
May 14 19:50:14 cumulus sshd[21801]: Received disconnect from 65.93.189.5 port 44729:11: Bye Bye [preauth]
May 14 19:50:14 cumulus sshd[21801]: Disconnected from 65.93.189.5 port 44729 [preauth]
May 14 19:53:37 cumulus sshd[21962]: Invalid user mike from 65.93.189.5 port 49821
May 14 19:53:37 cumulus sshd[21962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.93.189.5
May 14 19:53:39 cumulus sshd[21962]: Failed password for invalid user mike from 65.93.189.5 port 49821 ssh2
May 14 19:53:39 cumulus sshd[21962]: Received disconnect from 65.93.189.5 port 49821:11: Bye Bye [preauth]
May 14 19:53:39 cumulus sshd[21962]: Disconnected from 65.93.189.5 port 49821 [preauth]


........
-----------------------------------------------
https:
2020-05-15 20:15:33
104.239.136.8 attack
May 13 20:59:57 ns sshd[3515]: Connection from 104.239.136.8 port 37264 on 134.119.39.98 port 22
May 13 20:59:58 ns sshd[3515]: Invalid user postgres from 104.239.136.8 port 37264
May 13 20:59:58 ns sshd[3515]: Failed password for invalid user postgres from 104.239.136.8 port 37264 ssh2
May 13 20:59:58 ns sshd[3515]: Received disconnect from 104.239.136.8 port 37264:11: Bye Bye [preauth]
May 13 20:59:58 ns sshd[3515]: Disconnected from 104.239.136.8 port 37264 [preauth]
May 13 21:07:10 ns sshd[23139]: Connection from 104.239.136.8 port 40782 on 134.119.39.98 port 22
May 13 21:07:17 ns sshd[23139]: Connection closed by 104.239.136.8 port 40782 [preauth]
May 13 21:09:28 ns sshd[19026]: Connection from 104.239.136.8 port 32796 on 134.119.39.98 port 22
May 13 21:09:33 ns sshd[19026]: Invalid user eom from 104.239.136.8 port 32796
May 13 21:09:33 ns sshd[19026]: Failed password for invalid user eom from 104.239.136.8 port 32796 ssh2
May 13 21:09:33 ns sshd[19026]: Received d........
-------------------------------
2020-05-15 20:17:30
222.211.87.16 attackbots
May 15 09:04:00 localhost sshd\[4928\]: Invalid user Cloud@123456 from 222.211.87.16 port 2227
May 15 09:04:00 localhost sshd\[4928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.211.87.16
May 15 09:04:03 localhost sshd\[4928\]: Failed password for invalid user Cloud@123456 from 222.211.87.16 port 2227 ssh2
...
2020-05-15 19:49:18

最近上报的IP列表

109.139.106.50 187.184.228.145 0.192.52.154 104.90.136.248
230.9.155.217 119.238.123.197 13.118.120.97 185.68.54.189
0.87.80.246 190.136.115.97 153.215.242.151 0.13.166.224
158.218.148.64 200.74.38.159 119.221.202.22 241.207.31.146
14.186.87.38 241.171.125.152 122.109.228.144 151.117.12.177