必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Hong Kong

运营商(isp): Capital Online Data Service HK Co Ltd

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attackspam
2362/udp 10001/udp 37810/udp...
[2020-05-19/07-20]34pkt,3pt.(udp)
2020-07-21 02:12:50
attackbotsspam
1591847525 - 06/11/2020 05:52:05 Host: 118.193.31.180/118.193.31.180 Port: 37810 UDP Blocked
2020-06-11 17:18:17
attackspambots
" "
2020-05-09 04:43:44
attack
Unauthorized connection attempt detected from IP address 118.193.31.180 to port 9100 [T]
2020-04-13 16:08:14
attackspambots
Unauthorized connection attempt detected from IP address 118.193.31.180 to port 515 [T]
2020-03-24 18:57:38
attack
unauthorized connection attempt
2020-02-09 17:09:14
attackspam
Unauthorized connection attempt detected from IP address 118.193.31.180 to port 9100 [T]
2020-02-01 18:58:12
attackspam
Unauthorized connection attempt detected from IP address 118.193.31.180 to port 1234 [J]
2020-01-27 05:30:22
attackbots
Unauthorized connection attempt detected from IP address 118.193.31.180 to port 5672 [J]
2020-01-21 02:39:10
attackbotsspam
Unauthorized connection attempt detected from IP address 118.193.31.180 to port 9100 [T]
2020-01-16 01:30:16
attack
Unauthorized connection attempt detected from IP address 118.193.31.180 to port 1234 [T]
2020-01-09 02:37:42
attack
Unauthorized connection attempt detected from IP address 118.193.31.180 to port 1234 [J]
2020-01-08 05:20:11
attackbots
Unauthorized connection attempt detected from IP address 118.193.31.180 to port 1234 [J]
2020-01-07 02:38:27
attackbotsspam
Unauthorized connection attempt detected from IP address 118.193.31.180 to port 515
2020-01-04 08:04:06
attackspambots
Unauthorized connection attempt detected from IP address 118.193.31.180 to port 515
2020-01-02 20:04:33
attackbotsspam
Unauthorized connection attempt detected from IP address 118.193.31.180 to port 515
2020-01-01 20:25:36
attack
Unauthorized connection attempt detected from IP address 118.193.31.180 to port 515
2020-01-01 02:54:21
attackbotsspam
Unauthorized connection attempt detected from IP address 118.193.31.180 to port 5672
2019-12-31 03:04:32
attack
Portscan or hack attempt detected by psad/fwsnort
2019-12-14 16:52:17
attack
firewall-block, port(s): 5672/tcp
2019-12-08 20:47:35
attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-22 03:01:14
attack
1 pkts, ports: TCP:5672
2019-10-06 06:58:20
attackspam
" "
2019-07-11 06:11:46
相同子网IP讨论:
IP 类型 评论内容 时间
118.193.31.179 attackbots
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-10-05 05:42:41
118.193.31.179 attack
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-10-04 21:38:33
118.193.31.179 attackspam
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-10-04 13:24:52
118.193.31.182 attackbots
Port scan: Attack repeated for 24 hours
2020-08-30 05:17:28
118.193.31.182 attackspam
Unauthorized connection attempt detected from IP address 118.193.31.182 to port 515 [T]
2020-08-29 22:24:48
118.193.31.179 attackspambots
Unauthorized connection attempt detected from IP address 118.193.31.179 to port 554 [T]
2020-08-29 21:33:46
118.193.31.181 attackbotsspam
37810/udp 10001/udp 2362/udp...
[2020-06-27/08-28]19pkt,5pt.(udp)
2020-08-28 19:38:32
118.193.31.182 attackspam
Unauthorized connection attempt detected from IP address 118.193.31.182 to port 515 [T]
2020-08-27 20:35:44
118.193.31.206 attackbotsspam
Aug 23 19:07:03 nextcloud sshd\[12696\]: Invalid user mario from 118.193.31.206
Aug 23 19:07:03 nextcloud sshd\[12696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.193.31.206
Aug 23 19:07:05 nextcloud sshd\[12696\]: Failed password for invalid user mario from 118.193.31.206 port 33880 ssh2
2020-08-24 03:17:22
118.193.31.206 attackspambots
Aug 19 20:01:11 h2022099 sshd[18455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.193.31.206  user=r.r
Aug 19 20:01:13 h2022099 sshd[18455]: Failed password for r.r from 118.193.31.206 port 43614 ssh2
Aug 19 20:01:13 h2022099 sshd[18455]: Received disconnect from 118.193.31.206: 11: Bye Bye [preauth]
Aug 19 20:16:26 h2022099 sshd[20518]: Invalid user patrol from 118.193.31.206
Aug 19 20:16:26 h2022099 sshd[20518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.193.31.206 
Aug 19 20:16:28 h2022099 sshd[20518]: Failed password for invalid user patrol from 118.193.31.206 port 34432 ssh2
Aug 19 20:16:28 h2022099 sshd[20518]: Received disconnect from 118.193.31.206: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=118.193.31.206
2020-08-21 20:36:18
118.193.31.182 attack
Unauthorized connection attempt detected from IP address 118.193.31.182 to port 631 [T]
2020-08-14 04:08:36
118.193.31.182 attack
Tried our host z.
2020-07-29 23:23:31
118.193.31.182 attackspam
" "
2020-07-27 18:22:03
118.193.31.179 attackspambots
Unauthorized connection attempt detected from IP address 118.193.31.179 to port 554 [T]
2020-07-22 04:34:45
118.193.31.186 attackspambots
Unauthorized connection attempt detected from IP address 118.193.31.186 to port 1433 [T]
2020-07-22 03:18:45
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.193.31.180
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17170
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;118.193.31.180.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060700 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Jun 07 22:51:33 CST 2019
;; MSG SIZE  rcvd: 118

HOST信息:
Host 180.31.193.118.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 180.31.193.118.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
170.83.177.141 attackspambots
Unauthorized access detected from black listed ip!
2020-09-02 04:07:48
88.202.239.116 attackspam
E-Mail Spam (RBL) [REJECTED]
2020-09-02 04:11:36
105.186.212.134 attackspam
1598963235 - 09/01/2020 14:27:15 Host: 105.186.212.134/105.186.212.134 Port: 445 TCP Blocked
2020-09-02 04:02:19
141.98.9.164 attack
Sep  1 19:34:11 scw-6657dc sshd[12316]: Invalid user admin from 141.98.9.164 port 44355
Sep  1 19:34:11 scw-6657dc sshd[12316]: Invalid user admin from 141.98.9.164 port 44355
Sep  1 19:34:11 scw-6657dc sshd[12316]: Failed none for invalid user admin from 141.98.9.164 port 44355 ssh2
...
2020-09-02 04:08:14
165.3.86.68 attack
2020-09-01T14:27:13.815961+02:00 lumpi kernel: [24252790.734878] INPUT:DROP:SPAMHAUS_DROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=165.3.86.68 DST=78.46.199.189 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=10572 DF PROTO=TCP SPT=18951 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 
...
2020-09-02 04:04:16
88.202.239.115 attackbotsspam
E-Mail Spam (RBL) [REJECTED]
2020-09-02 04:09:23
177.207.58.145 attackspam
SMB Server BruteForce Attack
2020-09-02 04:06:29
193.227.16.35 attack
B: There is NO wordpress hosted!
2020-09-02 03:52:21
124.109.40.40 attack
124.109.40.40 - - [01/Sep/2020:13:38:39 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
124.109.40.40 - - [01/Sep/2020:13:38:41 +0100] "POST /wp-login.php HTTP/1.1" 200 7638 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
124.109.40.40 - - [01/Sep/2020:13:43:31 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
...
2020-09-02 04:07:00
122.163.7.77 attackbotsspam
1598963236 - 09/01/2020 14:27:16 Host: 122.163.7.77/122.163.7.77 Port: 445 TCP Blocked
2020-09-02 04:00:15
95.53.223.202 attack
1598963233 - 09/01/2020 14:27:13 Host: 95.53.223.202/95.53.223.202 Port: 445 TCP Blocked
2020-09-02 04:04:41
112.85.42.174 attackbots
Sep  1 21:40:03 vm1 sshd[3030]: Failed password for root from 112.85.42.174 port 21174 ssh2
Sep  1 21:40:16 vm1 sshd[3030]: error: maximum authentication attempts exceeded for root from 112.85.42.174 port 21174 ssh2 [preauth]
...
2020-09-02 03:46:58
103.148.44.10 attack
Sep  1 13:27:05 shivevps sshd[27761]: Bad protocol version identification '\024' from 103.148.44.10 port 33083
...
2020-09-02 04:13:23
81.68.85.195 attack
12379/tcp
[2020-09-01]1pkt
2020-09-02 03:51:31
141.98.9.167 attackbotsspam
Sep  1 21:23:25 elp-server sshd[69089]: Invalid user guest from 141.98.9.167 port 34063
Sep  1 21:23:25 elp-server sshd[69089]: Invalid user guest from 141.98.9.167 port 34063
Sep  1 21:23:25 elp-server sshd[69089]: Connection closed by invalid user guest 141.98.9.167 port 34063 [preauth]
...
2020-09-02 03:59:59

最近上报的IP列表

144.217.255.89 194.171.164.26 12.45.54.15 89.132.118.24
36.65.186.193 163.172.215.78 212.155.8.7 50.97.192.83
187.32.254.119 94.134.211.52 129.24.131.214 103.52.52.23
91.90.232.101 79.127.116.146 78.22.247.235 107.32.200.237
53.198.212.100 89.46.105.123 176.218.1.239 65.156.128.98