必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
118.254.141.210 attackbotsspam
Brute force blocker - service: proftpd1 - aantal: 98 - Sat Aug 25 03:50:14 2018
2020-09-26 02:59:47
118.254.141.210 attackspam
Brute force blocker - service: proftpd1 - aantal: 98 - Sat Aug 25 03:50:14 2018
2020-09-25 18:46:06
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.254.141.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24850
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.254.141.157.		IN	A

;; AUTHORITY SECTION:
.			400	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 133 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:32:44 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 157.141.254.118.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 157.141.254.118.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.39.45.93 attack
Nov 11 07:08:48 h2421860 postfix/postscreen[20838]: CONNECT from [218.39.45.93]:11236 to [85.214.119.52]:25
Nov 11 07:08:48 h2421860 postfix/dnsblog[20841]: addr 218.39.45.93 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Nov 11 07:08:48 h2421860 postfix/dnsblog[20842]: addr 218.39.45.93 listed by domain bl.spamcop.net as 127.0.0.2
Nov 11 07:08:48 h2421860 postfix/dnsblog[20842]: addr 218.39.45.93 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 11 07:08:48 h2421860 postfix/dnsblog[20842]: addr 218.39.45.93 listed by domain zen.spamhaus.org as 127.0.0.11
Nov 11 07:08:48 h2421860 postfix/dnsblog[20842]: addr 218.39.45.93 listed by domain zen.spamhaus.org as 127.0.0.3
Nov 11 07:08:48 h2421860 postfix/dnsblog[20844]: addr 218.39.45.93 listed by domain bl.mailspike.net as 127.0.0.10
Nov 11 07:08:48 h2421860 postfix/dnsblog[20846]: addr 218.39.45.93 listed by domain dnsbl.sorbs.net as 127.0.0.6
Nov 11 07:08:48 h2421860 postfix/dnsblog[20846]: addr 218.39.45.93 listed by........
-------------------------------
2019-11-11 19:51:15
123.206.22.145 attack
Nov 11 08:52:08 meumeu sshd[26909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.22.145 
Nov 11 08:52:10 meumeu sshd[26909]: Failed password for invalid user wv from 123.206.22.145 port 57680 ssh2
Nov 11 08:56:33 meumeu sshd[27366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.22.145 
...
2019-11-11 19:42:48
14.232.160.213 attackbots
Nov 11 08:27:49 localhost sshd\[115536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.232.160.213  user=root
Nov 11 08:27:52 localhost sshd\[115536\]: Failed password for root from 14.232.160.213 port 37182 ssh2
Nov 11 08:32:07 localhost sshd\[115646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.232.160.213  user=root
Nov 11 08:32:10 localhost sshd\[115646\]: Failed password for root from 14.232.160.213 port 46552 ssh2
Nov 11 08:36:31 localhost sshd\[115750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.232.160.213  user=root
...
2019-11-11 20:08:03
159.203.179.230 attackbots
Nov 11 10:55:36 ip-172-31-62-245 sshd\[22496\]: Invalid user nfs from 159.203.179.230\
Nov 11 10:55:38 ip-172-31-62-245 sshd\[22496\]: Failed password for invalid user nfs from 159.203.179.230 port 60680 ssh2\
Nov 11 10:59:06 ip-172-31-62-245 sshd\[22527\]: Invalid user jw from 159.203.179.230\
Nov 11 10:59:08 ip-172-31-62-245 sshd\[22527\]: Failed password for invalid user jw from 159.203.179.230 port 40894 ssh2\
Nov 11 11:02:30 ip-172-31-62-245 sshd\[22538\]: Failed password for news from 159.203.179.230 port 49468 ssh2\
2019-11-11 19:51:48
188.166.239.106 attackspam
Nov 11 01:18:36 php1 sshd\[10526\]: Invalid user lyndsie from 188.166.239.106
Nov 11 01:18:36 php1 sshd\[10526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.239.106
Nov 11 01:18:39 php1 sshd\[10526\]: Failed password for invalid user lyndsie from 188.166.239.106 port 50844 ssh2
Nov 11 01:22:42 php1 sshd\[10880\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.239.106  user=root
Nov 11 01:22:44 php1 sshd\[10880\]: Failed password for root from 188.166.239.106 port 40804 ssh2
2019-11-11 19:26:37
132.232.126.232 attackspam
Automatic report - Banned IP Access
2019-11-11 20:07:44
94.45.149.101 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/94.45.149.101/ 
 
 UA - 1H : (35)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : UA 
 NAME ASN : ASN29491 
 
 IP : 94.45.149.101 
 
 CIDR : 94.45.148.0/23 
 
 PREFIX COUNT : 16 
 
 UNIQUE IP COUNT : 10240 
 
 
 ATTACKS DETECTED ASN29491 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-11 07:22:18 
 
 INFO : Server 403 - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2019-11-11 19:57:10
131.221.121.128 attackbotsspam
Port 1433 Scan
2019-11-11 19:49:29
113.225.129.214 attack
Nov 11 01:13:27 eola sshd[32546]: Invalid user pi from 113.225.129.214 port 33952
Nov 11 01:13:28 eola sshd[32547]: Invalid user pi from 113.225.129.214 port 33958
Nov 11 01:13:28 eola sshd[32546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.225.129.214 
Nov 11 01:13:28 eola sshd[32547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.225.129.214 
Nov 11 01:13:30 eola sshd[32546]: Failed password for invalid user pi from 113.225.129.214 port 33952 ssh2
Nov 11 01:13:30 eola sshd[32547]: Failed password for invalid user pi from 113.225.129.214 port 33958 ssh2
Nov 11 01:13:30 eola sshd[32546]: Connection closed by 113.225.129.214 port 33952 [preauth]
Nov 11 01:13:30 eola sshd[32547]: Connection closed by 113.225.129.214 port 33958 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.225.129.214
2019-11-11 20:03:01
27.109.139.150 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/27.109.139.150/ 
 
 MO - 1H : (3)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : MO 
 NAME ASN : ASN4609 
 
 IP : 27.109.139.150 
 
 CIDR : 27.109.128.0/19 
 
 PREFIX COUNT : 64 
 
 UNIQUE IP COUNT : 269568 
 
 
 ATTACKS DETECTED ASN4609 :  
  1H - 1 
  3H - 1 
  6H - 2 
 12H - 2 
 24H - 4 
 
 DateTime : 2019-11-11 07:22:39 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-11 19:44:55
106.13.9.75 attack
k+ssh-bruteforce
2019-11-11 19:31:47
201.238.198.114 attack
Nov 10 11:54:36 host sshd[6511]: Failed password for invalid user admin from 201.238.198.114 port 11017
2019-11-11 19:36:28
51.79.70.223 attackbots
Nov 11 11:21:00 ArkNodeAT sshd\[31013\]: Invalid user devices from 51.79.70.223
Nov 11 11:21:00 ArkNodeAT sshd\[31013\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.70.223
Nov 11 11:21:02 ArkNodeAT sshd\[31013\]: Failed password for invalid user devices from 51.79.70.223 port 45810 ssh2
2019-11-11 19:47:46
202.137.142.68 attack
Nov 11 16:31:32 our-server-hostname postfix/smtpd[27863]: connect from unknown[202.137.142.68]
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=202.137.142.68
2019-11-11 19:46:58
34.76.225.49 attackbots
firewall-block, port(s): 443/tcp
2019-11-11 19:34:58

最近上报的IP列表

118.254.141.149 118.254.141.158 118.254.141.161 118.254.141.162
118.254.141.164 139.5.31.203 139.5.29.8 139.5.31.10
139.5.31.204 139.5.31.201 139.5.31.192 139.5.31.194
139.5.31.199 139.5.31.208 139.5.31.210 139.5.31.206
139.5.31.196 118.254.141.169 139.5.31.213 139.5.31.214