必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Philippines

运营商(isp): Oakridge Realty Development Corporation

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Commercial

用户上报:
类型 评论内容 时间
attackbots
1581828976 - 02/16/2020 05:56:16 Host: 119.93.51.104/119.93.51.104 Port: 445 TCP Blocked
2020-02-16 17:31:41
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.93.51.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16177
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;119.93.51.104.			IN	A

;; AUTHORITY SECTION:
.			529	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020021600 1800 900 604800 86400

;; Query time: 327 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 17:31:38 CST 2020
;; MSG SIZE  rcvd: 117
HOST信息:
104.51.93.119.in-addr.arpa domain name pointer 119.93.51.104.static.pldt.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.51.93.119.in-addr.arpa	name = 119.93.51.104.static.pldt.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.54.44.202 attackbotsspam
2020-06-17T09:26:05.021412ionos.janbro.de sshd[126737]: Failed password for ftp from 106.54.44.202 port 37238 ssh2
2020-06-17T09:27:19.064143ionos.janbro.de sshd[126741]: Invalid user cps from 106.54.44.202 port 51604
2020-06-17T09:27:19.070282ionos.janbro.de sshd[126741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.44.202
2020-06-17T09:27:19.064143ionos.janbro.de sshd[126741]: Invalid user cps from 106.54.44.202 port 51604
2020-06-17T09:27:21.162791ionos.janbro.de sshd[126741]: Failed password for invalid user cps from 106.54.44.202 port 51604 ssh2
2020-06-17T09:28:37.861068ionos.janbro.de sshd[126745]: Invalid user denis from 106.54.44.202 port 37742
2020-06-17T09:28:37.866882ionos.janbro.de sshd[126745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.44.202
2020-06-17T09:28:37.861068ionos.janbro.de sshd[126745]: Invalid user denis from 106.54.44.202 port 37742
2020-06-17T09:28:39.99971
...
2020-06-17 17:35:04
54.37.149.233 attackspam
Jun 17 11:09:33 vpn01 sshd[22937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.149.233
Jun 17 11:09:35 vpn01 sshd[22937]: Failed password for invalid user greatwall from 54.37.149.233 port 32772 ssh2
...
2020-06-17 17:21:50
162.243.144.149 attackspambots
 TCP (SYN) 162.243.144.149:59249 -> port 1527, len 44
2020-06-17 17:41:46
141.98.10.178 attackspam
Blocked for port scanning.
Time: Wed Jun 17. 04:54:48 2020 +0200
IP: 141.98.10.178 (LT/Republic of Lithuania/-)

Sample of block hits:
Jun 17 04:51:46 vserv kernel: [422531.722613] Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC= SRC=141.98.10.178 DST=[removed] LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=49670 PROTO=TCP SPT=42135 DPT=9004 WINDOW=1024 RES=0x00 SYN URGP=0
Jun 17 04:52:58 vserv kernel: [422603.804232] Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC= SRC=141.98.10.178 DST=[removed] LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=8750 PROTO=TCP SPT=42135 DPT=9014 WINDOW=1024 RES=0x00 SYN URGP=0
Jun 17 04:53:12 vserv kernel: [422617.511891] Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC= SRC=141.98.10.178 DST=[removed] LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=24401 PROTO=TCP SPT=42135 DPT=9005 WINDOW=1024 RES=0x00 SYN URGP=0
Jun 17 04:53:15 vserv kernel: [422620.344516] Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC= SRC=141.98.10.178 DST=[removed] LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=29289 PROTO=TCP SPT=42135 DPT=10020
2020-06-17 17:00:31
185.234.217.177 attackbotsspam
20 attempts against mh_ha-misbehave-ban on oak
2020-06-17 17:13:34
62.234.142.49 attack
(sshd) Failed SSH login from 62.234.142.49 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 17 08:55:16 amsweb01 sshd[26128]: Invalid user vnc from 62.234.142.49 port 60074
Jun 17 08:55:19 amsweb01 sshd[26128]: Failed password for invalid user vnc from 62.234.142.49 port 60074 ssh2
Jun 17 09:02:42 amsweb01 sshd[27093]: Invalid user develop from 62.234.142.49 port 39696
Jun 17 09:02:45 amsweb01 sshd[27093]: Failed password for invalid user develop from 62.234.142.49 port 39696 ssh2
Jun 17 09:04:28 amsweb01 sshd[27331]: Invalid user harry from 62.234.142.49 port 55362
2020-06-17 17:35:17
159.203.30.50 attack
Jun 17 11:23:20 vmd17057 sshd[28109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.30.50 
Jun 17 11:23:22 vmd17057 sshd[28109]: Failed password for invalid user webapps from 159.203.30.50 port 53880 ssh2
...
2020-06-17 17:43:34
158.69.110.31 attackbots
$f2bV_matches
2020-06-17 17:04:00
51.38.186.180 attackspam
Jun 17 05:41:25 firewall sshd[19135]: Failed password for invalid user user from 51.38.186.180 port 40611 ssh2
Jun 17 05:44:42 firewall sshd[19259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.180  user=root
Jun 17 05:44:44 firewall sshd[19259]: Failed password for root from 51.38.186.180 port 40093 ssh2
...
2020-06-17 17:26:57
195.93.168.1 attack
Jun 17 09:41:16 dhoomketu sshd[814086]: Invalid user hacker from 195.93.168.1 port 60334
Jun 17 09:41:16 dhoomketu sshd[814086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.93.168.1 
Jun 17 09:41:16 dhoomketu sshd[814086]: Invalid user hacker from 195.93.168.1 port 60334
Jun 17 09:41:18 dhoomketu sshd[814086]: Failed password for invalid user hacker from 195.93.168.1 port 60334 ssh2
Jun 17 09:44:40 dhoomketu sshd[814156]: Invalid user rd from 195.93.168.1 port 35090
...
2020-06-17 17:37:23
161.189.115.201 attack
Jun 17 05:50:17 mailserver sshd\[29096\]: Invalid user zabbix from 161.189.115.201
...
2020-06-17 17:39:08
177.84.77.115 attack
Invalid user xw from 177.84.77.115 port 38785
2020-06-17 17:27:48
23.253.159.51 attackspambots
$f2bV_matches
2020-06-17 17:32:49
152.171.201.186 attackspam
Invalid user factorio from 152.171.201.186 port 38544
2020-06-17 17:42:33
92.220.10.100 attackbots
many hits
2020-06-17 17:36:32

最近上报的IP列表

49.69.56.48 49.49.248.168 39.53.209.36 223.152.196.143
219.149.186.132 255.207.96.119 218.74.7.117 202.113.80.84
190.39.89.192 187.113.209.225 183.83.78.6 181.129.212.26
177.154.84.94 124.46.217.135 123.183.161.126 117.197.205.15
114.33.10.169 64.44.80.100 61.90.110.122 45.4.85.53