必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.26.113.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62018
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.26.113.148.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 04:20:48 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 148.113.26.120.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.113.26.120.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.51.190.65 attack
2020-03-09T22:04:40.491805homeassistant sshd[15705]: Invalid user oleta from 122.51.190.65 port 57600
2020-03-09T22:04:40.505032homeassistant sshd[15705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.190.65
...
2020-03-10 08:58:00
222.186.30.145 attackspambots
Mar  9 20:55:24 plusreed sshd[20106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.145  user=root
Mar  9 20:55:26 plusreed sshd[20106]: Failed password for root from 222.186.30.145 port 34632 ssh2
...
2020-03-10 09:03:25
218.92.0.212 attackspambots
Mar 10 00:39:11 hcbbdb sshd\[6545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212  user=root
Mar 10 00:39:13 hcbbdb sshd\[6545\]: Failed password for root from 218.92.0.212 port 28746 ssh2
Mar 10 00:39:16 hcbbdb sshd\[6545\]: Failed password for root from 218.92.0.212 port 28746 ssh2
Mar 10 00:39:20 hcbbdb sshd\[6545\]: Failed password for root from 218.92.0.212 port 28746 ssh2
Mar 10 00:39:23 hcbbdb sshd\[6545\]: Failed password for root from 218.92.0.212 port 28746 ssh2
2020-03-10 08:43:46
197.251.207.20 attackspambots
Jun 19 21:18:12 ms-srv sshd[30236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.251.207.20
Jun 19 21:18:15 ms-srv sshd[30236]: Failed password for invalid user zhan from 197.251.207.20 port 35256 ssh2
2020-03-10 08:37:24
192.241.133.33 attack
Mar  9 23:40:40 lock-38 sshd[4875]: Failed password for invalid user timesheet from 192.241.133.33 port 47076 ssh2
...
2020-03-10 08:33:26
197.37.138.63 attackspam
Sep 10 23:05:15 ms-srv sshd[16647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.37.138.63
Sep 10 23:05:18 ms-srv sshd[16647]: Failed password for invalid user admin from 197.37.138.63 port 33879 ssh2
2020-03-10 08:26:01
197.245.154.29 attack
Dec  2 06:41:35 ms-srv sshd[24754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.245.154.29
Dec  2 06:41:37 ms-srv sshd[24754]: Failed password for invalid user dietpi from 197.245.154.29 port 52484 ssh2
2020-03-10 08:55:48
111.230.61.51 attackspam
Dec 29 21:46:56 woltan sshd[32466]: Failed password for invalid user admin from 111.230.61.51 port 50132 ssh2
2020-03-10 08:31:31
111.230.25.204 attack
Jan 18 00:51:59 woltan sshd[18221]: Failed password for invalid user janis from 111.230.25.204 port 50416 ssh2
2020-03-10 08:33:45
197.33.145.0 attackspam
Jul 31 08:28:42 ms-srv sshd[37280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.33.145.0
Jul 31 08:28:44 ms-srv sshd[37280]: Failed password for invalid user admin from 197.33.145.0 port 58590 ssh2
2020-03-10 08:30:25
197.251.157.144 attackbotsspam
Oct 25 06:26:54 ms-srv sshd[51284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.251.157.144
Oct 25 06:26:56 ms-srv sshd[51284]: Failed password for invalid user admin from 197.251.157.144 port 48057 ssh2
2020-03-10 08:44:20
68.183.19.63 attackbots
Mar 10 01:20:41 MainVPS sshd[23571]: Invalid user wp-user from 68.183.19.63 port 50408
Mar 10 01:20:41 MainVPS sshd[23571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.63
Mar 10 01:20:41 MainVPS sshd[23571]: Invalid user wp-user from 68.183.19.63 port 50408
Mar 10 01:20:42 MainVPS sshd[23571]: Failed password for invalid user wp-user from 68.183.19.63 port 50408 ssh2
Mar 10 01:23:52 MainVPS sshd[29946]: Invalid user wp from 68.183.19.63 port 54030
...
2020-03-10 08:36:17
95.82.255.58 attack
Mar 10 00:21:42 jane sshd[11095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.82.255.58 
Mar 10 00:21:44 jane sshd[11095]: Failed password for invalid user testftp!@# from 95.82.255.58 port 51670 ssh2
...
2020-03-10 08:58:57
113.172.223.180 attackspambots
Brute force attempt
2020-03-10 08:38:39
111.231.109.151 attackspam
Dec 12 20:02:57 woltan sshd[7002]: Failed password for root from 111.231.109.151 port 47502 ssh2
2020-03-10 08:28:35

最近上报的IP列表

138.6.162.125 176.247.70.160 146.237.165.83 139.202.4.182
222.214.185.231 79.133.248.118 196.171.100.204 233.190.16.83
202.186.49.68 215.6.143.236 188.79.195.214 28.193.122.174
75.73.28.117 29.68.188.85 90.173.92.6 253.12.55.137
39.190.144.162 160.110.233.106 178.191.131.116 245.254.117.191