必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Switzerland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.141.119.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24847
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;128.141.119.105.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022602 1800 900 604800 86400

;; Query time: 115 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 11:27:25 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 105.119.141.128.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 105.119.141.128.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.128.42.36 attack
Oct  8 05:41:15 mail sshd[24722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.42.36  user=root
Oct  8 05:41:18 mail sshd[24722]: Failed password for root from 178.128.42.36 port 59950 ssh2
Oct  8 05:58:47 mail sshd[26855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.42.36  user=root
Oct  8 05:58:48 mail sshd[26855]: Failed password for root from 178.128.42.36 port 35658 ssh2
...
2019-10-08 12:36:02
192.227.252.30 attack
Oct  8 03:55:50 localhost sshd\[9992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.252.30  user=root
Oct  8 03:55:52 localhost sshd\[9992\]: Failed password for root from 192.227.252.30 port 45366 ssh2
Oct  8 03:58:45 localhost sshd\[10039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.252.30  user=root
...
2019-10-08 12:38:28
58.211.166.170 attackbots
Oct  8 05:54:38 h2177944 sshd\[23909\]: Invalid user Sunrise2017 from 58.211.166.170 port 41714
Oct  8 05:54:38 h2177944 sshd\[23909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.211.166.170
Oct  8 05:54:40 h2177944 sshd\[23909\]: Failed password for invalid user Sunrise2017 from 58.211.166.170 port 41714 ssh2
Oct  8 05:58:43 h2177944 sshd\[24018\]: Invalid user Par0la12345 from 58.211.166.170 port 50316
Oct  8 05:58:43 h2177944 sshd\[24018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.211.166.170
...
2019-10-08 12:42:12
122.194.41.37 attack
Oct  8 06:58:43 www sshd\[48826\]: Invalid user admin from 122.194.41.37
Oct  8 06:58:43 www sshd\[48826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.194.41.37
Oct  8 06:58:45 www sshd\[48826\]: Failed password for invalid user admin from 122.194.41.37 port 46474 ssh2
...
2019-10-08 12:39:24
106.52.24.215 attackspam
Oct  8 05:50:51 echo390 sshd[26825]: Failed password for root from 106.52.24.215 port 33908 ssh2
Oct  8 05:54:48 echo390 sshd[27120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.24.215  user=root
Oct  8 05:54:51 echo390 sshd[27120]: Failed password for root from 106.52.24.215 port 39138 ssh2
Oct  8 05:58:42 echo390 sshd[27349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.24.215  user=root
Oct  8 05:58:44 echo390 sshd[27349]: Failed password for root from 106.52.24.215 port 44356 ssh2
...
2019-10-08 12:41:32
83.15.183.137 attackspambots
Oct  8 06:29:39 [host] sshd[21658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.15.183.137  user=root
Oct  8 06:29:41 [host] sshd[21658]: Failed password for root from 83.15.183.137 port 35607 ssh2
Oct  8 06:34:09 [host] sshd[21692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.15.183.137  user=root
2019-10-08 12:48:27
144.131.34.196 attackbotsspam
Automatic report - Port Scan Attack
2019-10-08 12:23:23
222.186.15.204 attackspambots
Oct  8 06:21:15 fr01 sshd[25725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.204  user=root
Oct  8 06:21:17 fr01 sshd[25725]: Failed password for root from 222.186.15.204 port 42506 ssh2
...
2019-10-08 12:25:45
149.56.46.220 attackbots
Oct  8 06:55:14 www sshd\[48717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.46.220  user=root
Oct  8 06:55:16 www sshd\[48717\]: Failed password for root from 149.56.46.220 port 41754 ssh2
Oct  8 06:59:06 www sshd\[48854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.46.220  user=root
...
2019-10-08 12:23:02
160.20.111.80 attack
Oct  8 14:22:03 our-server-hostname postfix/smtpd[14317]: connect from unknown[160.20.111.80]
Oct x@x
Oct  8 14:22:05 our-server-hostname postfix/smtpd[14317]: disconnect from unknown[160.20.111.80]
Oct  8 14:29:47 our-server-hostname postfix/smtpd[14317]: connect from unknown[160.20.111.80]
Oct  8 14:29:48 our-server-hostname postfix/smtpd[13237]: connect from unknown[160.20.111.80]
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct  8 14:29:49 our-server-hostname postfix/smtpd[14317]: disconnect from unknown[160.20.111.80]
Oct  8 14:29:49 our-server-hostname postfix/smtpd[13237]: disconnect from unknown[160.20.111.80]
Oct  8 14:34:06 our-server-hostname postfix/smtpd[3467]: connect from unknown[160.20.111.80]
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct  8 14:34:13 our-server-hostname postfix/smtpd[3467]: too many errors after DATA from unknown[160.20.111.80]
Oct  8 14:34:13 our-server-hostname postfix/smtpd[3467]: disconnect from unknown[160.2........
-------------------------------
2019-10-08 12:27:45
193.201.224.214 attack
Oct  8 10:58:20 lcl-usvr-01 sshd[7318]: Invalid user 0 from 193.201.224.214
Oct  8 10:58:21 lcl-usvr-01 sshd[7318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.201.224.214 
Oct  8 10:58:20 lcl-usvr-01 sshd[7318]: Invalid user 0 from 193.201.224.214
Oct  8 10:58:23 lcl-usvr-01 sshd[7318]: Failed password for invalid user 0 from 193.201.224.214 port 44905 ssh2
Oct  8 10:58:45 lcl-usvr-01 sshd[7473]: Invalid user 22 from 193.201.224.214
2019-10-08 12:40:39
149.202.170.60 attack
Oct  8 05:58:59 mail sshd[26866]: Invalid user 111111 from 149.202.170.60
...
2019-10-08 12:29:04
198.211.110.133 attack
Oct  8 04:12:06 venus sshd\[3521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.110.133  user=root
Oct  8 04:12:08 venus sshd\[3521\]: Failed password for root from 198.211.110.133 port 52820 ssh2
Oct  8 04:16:27 venus sshd\[3589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.110.133  user=root
...
2019-10-08 12:32:42
222.186.175.150 attack
Oct  8 04:13:48 marvibiene sshd[14597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150  user=root
Oct  8 04:13:50 marvibiene sshd[14597]: Failed password for root from 222.186.175.150 port 62864 ssh2
Oct  8 04:13:54 marvibiene sshd[14597]: Failed password for root from 222.186.175.150 port 62864 ssh2
Oct  8 04:13:48 marvibiene sshd[14597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150  user=root
Oct  8 04:13:50 marvibiene sshd[14597]: Failed password for root from 222.186.175.150 port 62864 ssh2
Oct  8 04:13:54 marvibiene sshd[14597]: Failed password for root from 222.186.175.150 port 62864 ssh2
...
2019-10-08 12:21:12
193.68.57.155 attack
Oct  8 07:26:35 server sshd\[28996\]: User root from 193.68.57.155 not allowed because listed in DenyUsers
Oct  8 07:26:35 server sshd\[28996\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.68.57.155  user=root
Oct  8 07:26:37 server sshd\[28996\]: Failed password for invalid user root from 193.68.57.155 port 39020 ssh2
Oct  8 07:30:37 server sshd\[25905\]: User root from 193.68.57.155 not allowed because listed in DenyUsers
Oct  8 07:30:37 server sshd\[25905\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.68.57.155  user=root
2019-10-08 12:32:30

最近上报的IP列表

231.100.89.80 228.4.179.44 94.10.165.62 245.142.12.186
28.101.133.146 242.192.40.25 149.142.23.47 75.174.91.234
145.226.182.109 203.145.187.216 152.109.104.223 89.232.111.194
122.231.18.224 42.211.26.36 24.86.48.214 144.66.211.49
30.103.221.26 128.194.130.197 42.174.83.187 243.10.13.187