必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea Republic of

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.198.64.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55606
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.198.64.169.			IN	A

;; AUTHORITY SECTION:
.			596	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 04:20:39 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 169.64.198.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 169.64.198.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
54.37.151.239 attackspambots
Invalid user admin from 54.37.151.239 port 48849
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.151.239
Failed password for invalid user admin from 54.37.151.239 port 48849 ssh2
Invalid user bali from 54.37.151.239 port 54433
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.151.239
2019-11-01 05:50:26
103.208.34.199 attack
Oct 28 04:34:52 entropy sshd[25581]: Failed password for r.r from 103.208.34.199 port 56744 ssh2
Oct 28 04:41:25 entropy sshd[25597]: Failed password for r.r from 103.208.34.199 port 59794 ssh2
Oct 28 04:45:25 entropy sshd[25605]: Invalid user test1 from 103.208.34.199
Oct 28 04:45:27 entropy sshd[25605]: Failed password for invalid user test1 from 103.208.34.199 port 43256 ssh2
Oct 28 04:51:33 entropy sshd[25617]: Failed password for r.r from 103.208.34.199 port 54950 ssh2
Oct 28 04:55:14 entropy sshd[25626]: Invalid user 22 from 103.208.34.199


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.208.34.199
2019-11-01 05:38:01
185.176.27.178 attack
10/31/2019-22:35:24.165775 185.176.27.178 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-01 05:42:27
198.108.67.46 attackbotsspam
" "
2019-11-01 05:27:41
193.112.78.133 attackspambots
Oct 31 21:13:51 MK-Soft-VM3 sshd[27201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.78.133 
Oct 31 21:13:53 MK-Soft-VM3 sshd[27201]: Failed password for invalid user xbian from 193.112.78.133 port 15801 ssh2
...
2019-11-01 05:45:36
185.186.143.148 attackbotsspam
" "
2019-11-01 05:48:14
136.228.161.66 attack
Oct 31 22:26:11 dedicated sshd[27455]: Invalid user 123456 from 136.228.161.66 port 46698
2019-11-01 05:32:53
117.50.73.118 attackspam
Oct 31 20:00:13 thevastnessof sshd[2000]: Failed password for invalid user gm_prop from 117.50.73.118 port 42904 ssh2
Oct 31 20:14:30 thevastnessof sshd[2360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.73.118
...
2019-11-01 05:23:05
103.255.216.166 attackbots
Oct 31 21:13:50 h2812830 sshd[5621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.255.216.166  user=root
Oct 31 21:13:53 h2812830 sshd[5621]: Failed password for root from 103.255.216.166 port 38794 ssh2
Oct 31 21:13:54 h2812830 sshd[5625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.255.216.166  user=root
Oct 31 21:13:56 h2812830 sshd[5625]: Failed password for root from 103.255.216.166 port 45674 ssh2
Oct 31 21:14:00 h2812830 sshd[5631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.255.216.166  user=root
Oct 31 21:14:01 h2812830 sshd[5631]: Failed password for root from 103.255.216.166 port 48526 ssh2
...
2019-11-01 05:42:46
89.108.105.34 attackbotsspam
Oct 30 16:42:27 ihdb004 sshd[14460]: Connection from 89.108.105.34 port 46072 on 142.93.36.125 port 22
Oct 30 16:42:27 ihdb004 sshd[14460]: Did not receive identification string from 89.108.105.34 port 46072
Oct 30 16:43:37 ihdb004 sshd[14461]: Connection from 89.108.105.34 port 57594 on 142.93.36.125 port 22
Oct 30 16:43:38 ihdb004 sshd[14461]: reveeclipse mapping checking getaddrinfo for dasev1.example.com [89.108.105.34] failed.
Oct 30 16:43:38 ihdb004 sshd[14461]: User r.r from 89.108.105.34 not allowed because none of user's groups are listed in AllowGroups
Oct 30 16:43:38 ihdb004 sshd[14461]: Received disconnect from 89.108.105.34 port 57594:11: Normal Shutdown, Thank you for playing [preauth]
Oct 30 16:43:38 ihdb004 sshd[14461]: Disconnected from 89.108.105.34 port 57594 [preauth]
Oct 30 16:43:51 ihdb004 sshd[14465]: Connection from 89.108.105.34 port 58956 on 142.93.36.125 port 22
Oct 30 16:43:51 ihdb004 sshd[14465]: reveeclipse mapping checking getaddrinfo for ........
-------------------------------
2019-11-01 05:35:23
46.166.139.146 attackspam
\[2019-10-31 17:36:13\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-31T17:36:13.780-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="901116207186163",SessionID="0x7fdf2c003608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.139.146/61548",ACLName="no_extension_match"
\[2019-10-31 17:36:19\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-31T17:36:19.016-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00016207186163",SessionID="0x7fdf2c62c4c8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.139.146/57277",ACLName="no_extension_match"
\[2019-10-31 17:36:21\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-31T17:36:21.420-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="90016207186163",SessionID="0x7fdf2c3f5928",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.139.146/62322",ACLName="no_ex
2019-11-01 05:50:53
64.251.159.53 attack
port scan and connect, tcp 23 (telnet)
2019-11-01 05:22:35
81.22.45.65 attackbotsspam
Oct 31 22:16:28 h2177944 kernel: \[5432310.993283\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.65 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=28941 PROTO=TCP SPT=46347 DPT=39742 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 31 22:20:50 h2177944 kernel: \[5432572.907484\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.65 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=41135 PROTO=TCP SPT=46347 DPT=39894 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 31 22:29:31 h2177944 kernel: \[5433093.228673\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.65 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=53889 PROTO=TCP SPT=46347 DPT=39563 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 31 22:29:46 h2177944 kernel: \[5433108.785418\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.65 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=43148 PROTO=TCP SPT=46347 DPT=39558 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 31 22:31:47 h2177944 kernel: \[5433229.725491\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.65 DST=85.214.117.9 LEN=4
2019-11-01 05:43:05
157.245.251.97 attackspambots
Oct 29 20:15:35 h2022099 sshd[25368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.251.97  user=r.r
Oct 29 20:15:37 h2022099 sshd[25368]: Failed password for r.r from 157.245.251.97 port 41508 ssh2
Oct 29 20:15:37 h2022099 sshd[25368]: Received disconnect from 157.245.251.97: 11: Bye Bye [preauth]
Oct 29 20:25:34 h2022099 sshd[26576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.251.97  user=r.r
Oct 29 20:25:37 h2022099 sshd[26576]: Failed password for r.r from 157.245.251.97 port 58620 ssh2
Oct 29 20:25:37 h2022099 sshd[26576]: Received disconnect from 157.245.251.97: 11: Bye Bye [preauth]
Oct 29 20:29:06 h2022099 sshd[26816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.251.97  user=r.r
Oct 29 20:29:08 h2022099 sshd[26816]: Failed password for r.r from 157.245.251.97 port 41014 ssh2
Oct 29 20:29:08 h2022099 sshd[26816........
-------------------------------
2019-11-01 05:53:53
221.195.189.154 attack
Oct 31 21:55:08 sd-53420 sshd\[5118\]: Invalid user nanyou from 221.195.189.154
Oct 31 21:55:08 sd-53420 sshd\[5118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.195.189.154
Oct 31 21:55:10 sd-53420 sshd\[5118\]: Failed password for invalid user nanyou from 221.195.189.154 port 39816 ssh2
Oct 31 21:58:35 sd-53420 sshd\[5355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.195.189.154  user=root
Oct 31 21:58:37 sd-53420 sshd\[5355\]: Failed password for root from 221.195.189.154 port 37370 ssh2
...
2019-11-01 05:32:33

最近上报的IP列表

138.122.140.14 37.114.198.66 109.248.201.48 182.23.108.164
59.94.132.192 191.85.16.122 58.30.141.222 185.81.66.228
84.39.247.99 71.38.143.152 154.201.45.243 212.60.74.74
37.114.194.111 220.126.225.142 202.51.115.187 24.152.45.189
142.44.241.30 175.7.176.213 47.246.50.131 221.161.134.21