必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.190.141.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26256
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;131.190.141.164.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 19:17:36 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 164.141.190.131.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.141.190.131.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.45.122.9 attackbots
Port probe, 6 failed login attempts SMTP:25.
IP auto-blocked.
2019-09-21 03:32:53
162.212.162.152 attackbotsspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/162.212.162.152/ 
 US - 1H : (191)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN36423 
 
 IP : 162.212.162.152 
 
 CIDR : 162.212.160.0/22 
 
 PREFIX COUNT : 197 
 
 UNIQUE IP COUNT : 158976 
 
 
 WYKRYTE ATAKI Z ASN36423 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery
2019-09-21 03:13:29
197.252.1.238 attackbotsspam
Sep 20 20:19:26 xzibhostname postfix/smtpd[21324]: connect from unknown[197.252.1.238]
Sep 20 20:19:27 xzibhostname postfix/smtpd[21324]: warning: unknown[197.252.1.238]: SASL CRAM-MD5 authentication failed: authentication failure
Sep 20 20:19:27 xzibhostname postfix/smtpd[21324]: warning: unknown[197.252.1.238]: SASL PLAIN authentication failed: authentication failure
Sep 20 20:19:28 xzibhostname postfix/smtpd[21324]: warning: unknown[197.252.1.238]: SASL LOGIN authentication failed: authentication failure
Sep 20 20:19:28 xzibhostname postfix/smtpd[21324]: lost connection after AUTH from unknown[197.252.1.238]
Sep 20 20:19:28 xzibhostname postfix/smtpd[21324]: disconnect from unknown[197.252.1.238]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=197.252.1.238
2019-09-21 03:41:22
218.173.98.204 attack
Sep 20 20:17:32 georgia postfix/smtpd[3213]: connect from 218-173-98-204.dynamic-ip.hinet.net[218.173.98.204]
Sep 20 20:17:33 georgia postfix/smtpd[3213]: warning: 218-173-98-204.dynamic-ip.hinet.net[218.173.98.204]: SASL CRAM-MD5 authentication failed: authentication failure
Sep 20 20:17:33 georgia postfix/smtpd[3213]: warning: 218-173-98-204.dynamic-ip.hinet.net[218.173.98.204]: SASL PLAIN authentication failed: authentication failure
Sep 20 20:17:34 georgia postfix/smtpd[3213]: warning: 218-173-98-204.dynamic-ip.hinet.net[218.173.98.204]: SASL LOGIN authentication failed: authentication failure


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=218.173.98.204
2019-09-21 03:27:05
5.39.77.117 attackspambots
2019-09-20T15:07:49.5732691495-001 sshd\[36100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3262586.ip-5-39-77.eu
2019-09-20T15:07:51.0070151495-001 sshd\[36100\]: Failed password for invalid user km from 5.39.77.117 port 48512 ssh2
2019-09-20T15:20:42.2316601495-001 sshd\[36931\]: Invalid user minerva from 5.39.77.117 port 55740
2019-09-20T15:20:42.2390571495-001 sshd\[36931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3262586.ip-5-39-77.eu
2019-09-20T15:20:44.1210371495-001 sshd\[36931\]: Failed password for invalid user minerva from 5.39.77.117 port 55740 ssh2
2019-09-20T15:25:07.7526401495-001 sshd\[37292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3262586.ip-5-39-77.eu  user=root
...
2019-09-21 03:36:45
59.93.160.193 attack
Sep 20 20:18:52 indra sshd[119450]: Invalid user admin from 59.93.160.193
Sep 20 20:18:52 indra sshd[119450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.93.160.193 
Sep 20 20:18:54 indra sshd[119450]: Failed password for invalid user admin from 59.93.160.193 port 46026 ssh2
Sep 20 20:18:56 indra sshd[119450]: Failed password for invalid user admin from 59.93.160.193 port 46026 ssh2
Sep 20 20:18:59 indra sshd[119450]: Failed password for invalid user admin from 59.93.160.193 port 46026 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=59.93.160.193
2019-09-21 03:39:15
188.166.41.192 attackbotsspam
2019-09-20T19:28:29.042080abusebot-3.cloudsearch.cf sshd\[27744\]: Invalid user Mielikki from 188.166.41.192 port 35522
2019-09-21 03:35:40
222.186.42.241 attackspam
20.09.2019 19:17:42 SSH access blocked by firewall
2019-09-21 03:15:18
151.80.37.18 attack
Sep 20 15:09:59 ny01 sshd[10258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.37.18
Sep 20 15:10:01 ny01 sshd[10258]: Failed password for invalid user a from 151.80.37.18 port 45932 ssh2
Sep 20 15:14:23 ny01 sshd[11050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.37.18
2019-09-21 03:22:45
178.128.21.113 attackbotsspam
Sep 20 21:14:30 vps691689 sshd[27231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.21.113
Sep 20 21:14:32 vps691689 sshd[27231]: Failed password for invalid user redmine from 178.128.21.113 port 38170 ssh2
...
2019-09-21 03:30:23
91.213.119.246 attackbots
SPAM Delivery Attempt
2019-09-21 03:34:30
103.99.178.151 attack
Sep 20 15:09:20 xtremcommunity sshd\[292003\]: Invalid user jayani from 103.99.178.151 port 50782
Sep 20 15:09:20 xtremcommunity sshd\[292003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.99.178.151
Sep 20 15:09:22 xtremcommunity sshd\[292003\]: Failed password for invalid user jayani from 103.99.178.151 port 50782 ssh2
Sep 20 15:13:44 xtremcommunity sshd\[292103\]: Invalid user admin from 103.99.178.151 port 36980
Sep 20 15:13:44 xtremcommunity sshd\[292103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.99.178.151
...
2019-09-21 03:24:04
45.70.3.2 attackspam
Sep 21 00:35:42 areeb-Workstation sshd[24424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.70.3.2
Sep 21 00:35:43 areeb-Workstation sshd[24424]: Failed password for invalid user ie from 45.70.3.2 port 50398 ssh2
...
2019-09-21 03:10:58
63.83.73.59 attackspambots
Lines containing failures of 63.83.73.59


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=63.83.73.59
2019-09-21 03:30:01
41.207.182.133 attackbotsspam
2019-09-20T18:53:39.051594abusebot-3.cloudsearch.cf sshd\[27581\]: Invalid user testing from 41.207.182.133 port 52680
2019-09-21 03:14:24

最近上报的IP列表

37.90.47.38 161.25.254.233 143.70.123.229 248.224.81.195
41.10.41.226 5.87.118.116 42.158.102.144 189.45.64.26
77.186.175.209 100.214.59.201 6.87.230.32 200.228.129.161
8.75.193.87 127.111.15.178 133.188.251.68 87.109.146.178
185.180.218.4 61.118.122.206 197.164.205.184 41.208.149.122