必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): New Zealand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.90.53.192
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43904
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.90.53.192.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 157 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 06:29:05 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
192.53.90.118.in-addr.arpa domain name pointer ip-118-90-53-192.xdsl.xnet.co.nz.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
192.53.90.118.in-addr.arpa	name = ip-118-90-53-192.xdsl.xnet.co.nz.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
172.69.70.131 attack
SQL injection:/newsites/free/pierre/search/searchSVI.php?continentName=EU+%27-6863+union+all+select+CONCAT(0x3a6f79753a,0x4244764877697569706b,0x3a70687a3a)1,1,1,1,1,1,1,1%23&country=276+&prj_typ=all&startdate=&enddate=&from=&page=1&searchSubmission=Recherche
2020-02-05 04:09:03
49.235.169.15 attackbots
Feb  4 21:02:17 srv-ubuntu-dev3 sshd[58007]: Invalid user cpsrvsid from 49.235.169.15
Feb  4 21:02:17 srv-ubuntu-dev3 sshd[58007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.169.15
Feb  4 21:02:17 srv-ubuntu-dev3 sshd[58007]: Invalid user cpsrvsid from 49.235.169.15
Feb  4 21:02:20 srv-ubuntu-dev3 sshd[58007]: Failed password for invalid user cpsrvsid from 49.235.169.15 port 51344 ssh2
Feb  4 21:05:35 srv-ubuntu-dev3 sshd[58336]: Invalid user rodderick from 49.235.169.15
Feb  4 21:05:35 srv-ubuntu-dev3 sshd[58336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.169.15
Feb  4 21:05:35 srv-ubuntu-dev3 sshd[58336]: Invalid user rodderick from 49.235.169.15
Feb  4 21:05:37 srv-ubuntu-dev3 sshd[58336]: Failed password for invalid user rodderick from 49.235.169.15 port 47772 ssh2
Feb  4 21:08:56 srv-ubuntu-dev3 sshd[58656]: Invalid user tester from 49.235.169.15
...
2020-02-05 04:16:44
197.38.136.55 attackspambots
Honeypot hit.
2020-02-05 04:02:57
206.189.142.10 attack
Feb  4 21:05:21 server sshd\[26273\]: Invalid user tom from 206.189.142.10
Feb  4 21:05:21 server sshd\[26273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.142.10 
Feb  4 21:05:24 server sshd\[26273\]: Failed password for invalid user tom from 206.189.142.10 port 40142 ssh2
Feb  4 22:49:22 server sshd\[9152\]: Invalid user mishka from 206.189.142.10
Feb  4 22:49:22 server sshd\[9152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.142.10 
...
2020-02-05 03:54:36
137.59.0.6 attack
Unauthorized connection attempt detected from IP address 137.59.0.6 to port 2220 [J]
2020-02-05 03:42:45
134.209.156.240 attackspam
2019-04-18 11:25:13 1hH3I9-0005HE-KY SMTP connection from yummy.viethungseafood.com \(week.djcdub.icu\) \[134.209.156.240\]:49450 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-04-18 11:28:01 1hH3Kr-0005Kf-7v SMTP connection from yummy.viethungseafood.com \(sock.djcdub.icu\) \[134.209.156.240\]:36387 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-04-18 11:28:17 1hH3L7-0005Li-KM SMTP connection from yummy.viethungseafood.com \(toes.djcdub.icu\) \[134.209.156.240\]:52183 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-05 03:36:04
201.90.101.165 attackbots
Unauthorized connection attempt detected from IP address 201.90.101.165 to port 2220 [J]
2020-02-05 03:58:51
183.80.0.0 attack
MVPower DVR TV Shell Unauthenticated Command Execution Vulnerability, PTR: PTR record not found
2020-02-05 03:46:18
211.35.76.241 attackspam
Unauthorized connection attempt detected from IP address 211.35.76.241 to port 2220 [J]
2020-02-05 03:42:20
117.96.251.130 attackbots
Feb  4 14:47:49 grey postfix/smtpd\[26006\]: NOQUEUE: reject: RCPT from unknown\[117.96.251.130\]: 554 5.7.1 Service unavailable\; Client host \[117.96.251.130\] blocked using cbl.abuseat.org\; Blocked - see http://www.abuseat.org/lookup.cgi\?ip=117.96.251.130\; from=\ to=\ proto=ESMTP helo=\
...
2020-02-05 04:11:21
182.182.118.254 attack
Feb  4 14:48:11 grey postfix/smtpd\[26854\]: NOQUEUE: reject: RCPT from unknown\[182.182.118.254\]: 554 5.7.1 Service unavailable\; Client host \[182.182.118.254\] blocked using cbl.abuseat.org\; Blocked - see http://www.abuseat.org/lookup.cgi\?ip=182.182.118.254\; from=\ to=\ proto=ESMTP helo=\<\[182.182.118.254\]\>
...
2020-02-05 03:40:48
27.76.159.206 attack
Feb  4 14:47:59 grey postfix/smtpd\[26473\]: NOQUEUE: reject: RCPT from unknown\[27.76.159.206\]: 554 5.7.1 Service unavailable\; Client host \[27.76.159.206\] blocked using cbl.abuseat.org\; Blocked - see http://www.abuseat.org/lookup.cgi\?ip=27.76.159.206\; from=\ to=\ proto=ESMTP helo=\
...
2020-02-05 04:02:29
132.157.66.25 attackbotsspam
2019-06-22 21:01:01 1helFy-0004wE-Vo SMTP connection from \(\[132.157.66.25\]\) \[132.157.66.25\]:39256 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-22 21:01:11 1helG8-0004wT-1q SMTP connection from \(\[132.157.66.25\]\) \[132.157.66.25\]:39749 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-22 21:01:21 1helGH-0004wa-23 SMTP connection from \(\[132.157.66.25\]\) \[132.157.66.25\]:40145 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-05 04:13:08
134.209.122.236 attack
2019-03-20 12:13:40 1h6ZAC-000077-4o SMTP connection from eggs.coldcaseforums.com \(wakeful.rashidminhaj.icu\) \[134.209.122.236\]:35062 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-20 12:13:57 1h6ZAT-00007W-G3 SMTP connection from eggs.coldcaseforums.com \(dare.rashidminhaj.icu\) \[134.209.122.236\]:38388 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-20 12:16:26 1h6ZCs-0000Du-K7 SMTP connection from eggs.coldcaseforums.com \(meaty.rashidminhaj.icu\) \[134.209.122.236\]:45380 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-20 12:43:48 1h6ZdM-0001Ho-Hg SMTP connection from eggs.coldcaseforums.com \(wakeful.rashidminhaj.icu\) \[134.209.122.236\]:38467 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-20 12:44:44 1h6ZeF-0001Jl-VX SMTP connection from eggs.coldcaseforums.com \(dare.rashidminhaj.icu\) \[134.209.122.236\]:38148 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-20 12:47:24 1h6Zgq-0001Ql-Ph SMTP connection from eggs.coldcaseforums.com \(meaty.ras
...
2020-02-05 03:56:45
222.186.15.166 attackbotsspam
Feb  4 14:31:21 plusreed sshd[7232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.166  user=root
Feb  4 14:31:23 plusreed sshd[7232]: Failed password for root from 222.186.15.166 port 60827 ssh2
...
2020-02-05 03:35:32

最近上报的IP列表

130.252.27.31 142.66.222.97 34.56.188.164 173.225.253.189
74.28.126.117 62.161.163.58 100.232.148.206 6.132.223.200
140.227.151.232 57.1.252.209 8.186.4.70 130.250.203.35
76.149.158.152 5.65.82.76 225.79.40.70 79.214.229.54
77.154.98.245 36.235.236.132 24.156.213.130 68.234.1.244