必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.131.154.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45547
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.131.154.49.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013001 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 10:14:28 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 49.154.131.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.154.131.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
77.247.110.39 attackspam
[2020-02-06 09:08:43] NOTICE[1148] chan_sip.c: Registration from '"222" ' failed for '77.247.110.39:5787' - Wrong password
[2020-02-06 09:08:43] SECURITY[1163] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-02-06T09:08:43.437-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="222",SessionID="0x7fd82c2bd8a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.39/5787",Challenge="2b3ac8b0",ReceivedChallenge="2b3ac8b0",ReceivedHash="65e7bd2ffe63ed55a23d6f3deb0b2271"
[2020-02-06 09:08:43] NOTICE[1148] chan_sip.c: Registration from '"222" ' failed for '77.247.110.39:5787' - Wrong password
[2020-02-06 09:08:43] SECURITY[1163] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-02-06T09:08:43.552-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="222",SessionID="0x7fd82c307128",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.1
...
2020-02-06 22:26:29
222.186.175.202 attackbotsspam
Failed password for root from 222.186.175.202 port 18774 ssh2
Failed password for root from 222.186.175.202 port 18774 ssh2
Failed password for root from 222.186.175.202 port 18774 ssh2
Failed password for root from 222.186.175.202 port 18774 ssh2
2020-02-06 22:18:24
163.172.101.217 attackspambots
Unauthorized connection attempt detected from IP address 163.172.101.217 to port 80
2020-02-06 22:02:12
139.155.118.190 attack
Feb  6 19:16:53 areeb-Workstation sshd[16378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.118.190 
Feb  6 19:16:56 areeb-Workstation sshd[16378]: Failed password for invalid user xuy from 139.155.118.190 port 33485 ssh2
...
2020-02-06 22:07:00
157.230.28.196 attack
Feb  6 14:23:32 *** sshd[31064]: Did not receive identification string from 157.230.28.196
2020-02-06 22:37:12
46.5.124.100 attackspam
Feb  6 04:01:32 auw2 sshd\[1561\]: Invalid user wtl from 46.5.124.100
Feb  6 04:01:32 auw2 sshd\[1561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=hsi-kbw-046-005-124-100.hsi8.kabel-badenwuerttemberg.de
Feb  6 04:01:34 auw2 sshd\[1561\]: Failed password for invalid user wtl from 46.5.124.100 port 35016 ssh2
Feb  6 04:09:24 auw2 sshd\[2358\]: Invalid user arc from 46.5.124.100
Feb  6 04:09:24 auw2 sshd\[2358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=hsi-kbw-046-005-124-100.hsi8.kabel-badenwuerttemberg.de
2020-02-06 22:29:19
177.12.227.131 attackbotsspam
detected by Fail2Ban
2020-02-06 22:42:44
179.215.136.238 attackbots
Lines containing failures of 179.215.136.238
Feb  5 14:34:37 shared01 sshd[11421]: Invalid user guest from 179.215.136.238 port 57855
Feb  5 14:34:37 shared01 sshd[11421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.215.136.238
Feb  5 14:34:40 shared01 sshd[11421]: Failed password for invalid user guest from 179.215.136.238 port 57855 ssh2
Feb  5 14:34:40 shared01 sshd[11421]: Received disconnect from 179.215.136.238 port 57855:11: Bye Bye [preauth]
Feb  5 14:34:40 shared01 sshd[11421]: Disconnected from invalid user guest 179.215.136.238 port 57855 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=179.215.136.238
2020-02-06 22:41:09
188.165.210.176 attackspam
Feb  6 14:46:33 [host] sshd[7058]: Invalid user ii
Feb  6 14:46:33 [host] sshd[7058]: pam_unix(sshd:a
Feb  6 14:46:34 [host] sshd[7058]: Failed password
2020-02-06 22:12:44
165.227.58.61 attack
Feb  3 00:57:42 v2hgb sshd[12480]: Invalid user deb from 165.227.58.61 port 50408
Feb  3 00:57:42 v2hgb sshd[12480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.58.61 
Feb  3 00:57:44 v2hgb sshd[12480]: Failed password for invalid user deb from 165.227.58.61 port 50408 ssh2
Feb  3 00:57:46 v2hgb sshd[12480]: Received disconnect from 165.227.58.61 port 50408:11: Bye Bye [preauth]
Feb  3 00:57:46 v2hgb sshd[12480]: Disconnected from invalid user deb 165.227.58.61 port 50408 [preauth]
Feb  5 22:52:47 v2hgb sshd[17418]: Invalid user kqg from 165.227.58.61 port 57880
Feb  5 22:52:47 v2hgb sshd[17418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.58.61 
Feb  5 22:52:50 v2hgb sshd[17418]: Failed password for invalid user kqg from 165.227.58.61 port 57880 ssh2
Feb  5 22:52:51 v2hgb sshd[17418]: Received disconnect from 165.227.58.61 port 57880:11: Bye Bye [preauth]
Feb  5 22:5........
-------------------------------
2020-02-06 22:21:39
18.176.60.64 attackbots
Feb  6 14:46:09 MK-Soft-VM8 sshd[2120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.176.60.64 
Feb  6 14:46:11 MK-Soft-VM8 sshd[2120]: Failed password for invalid user tcn from 18.176.60.64 port 46872 ssh2
...
2020-02-06 22:19:22
49.88.112.65 attack
Feb  6 14:03:25 hcbbdb sshd\[19337\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
Feb  6 14:03:27 hcbbdb sshd\[19337\]: Failed password for root from 49.88.112.65 port 32879 ssh2
Feb  6 14:04:37 hcbbdb sshd\[19445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
Feb  6 14:04:39 hcbbdb sshd\[19445\]: Failed password for root from 49.88.112.65 port 36911 ssh2
Feb  6 14:04:42 hcbbdb sshd\[19445\]: Failed password for root from 49.88.112.65 port 36911 ssh2
2020-02-06 22:05:08
185.36.81.143 attackbots
Rude login attack (3 tries in 1d)
2020-02-06 22:08:37
81.218.126.102 attackspambots
Unauthorized connection attempt from IP address 81.218.126.102 on Port 445(SMB)
2020-02-06 22:33:57
219.94.95.83 attackspam
Feb  6 14:41:41 markkoudstaal sshd[15300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.94.95.83
Feb  6 14:41:43 markkoudstaal sshd[15300]: Failed password for invalid user jane from 219.94.95.83 port 35904 ssh2
Feb  6 14:46:12 markkoudstaal sshd[16107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.94.95.83
2020-02-06 22:23:45

最近上报的IP列表

43.88.84.82 137.148.150.216 24.34.62.22 156.187.135.25
233.121.41.69 110.4.50.255 100.20.243.31 190.222.218.137
97.126.112.220 74.222.169.205 51.56.96.226 192.155.237.235
101.51.207.152 115.113.199.170 236.247.48.151 71.255.20.200
53.241.13.38 235.64.84.139 233.100.41.249 208.88.207.137