必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.107.59.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40785
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.107.59.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022301 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 11:33:15 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 12.59.107.132.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
server can't find 132.107.59.12.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.158.113.194 attack
Nov  7 08:16:22 DAAP sshd[22339]: Invalid user ubuntu from 51.158.113.194 port 54166
Nov  7 08:16:22 DAAP sshd[22339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.113.194
Nov  7 08:16:22 DAAP sshd[22339]: Invalid user ubuntu from 51.158.113.194 port 54166
Nov  7 08:16:24 DAAP sshd[22339]: Failed password for invalid user ubuntu from 51.158.113.194 port 54166 ssh2
Nov  7 08:22:14 DAAP sshd[22393]: Invalid user production from 51.158.113.194 port 54170
...
2019-11-07 17:40:12
123.135.124.238 attackspambots
5x Failed Password
2019-11-07 17:15:34
206.189.137.113 attackbotsspam
IP blocked
2019-11-07 17:05:41
51.75.66.11 attackbots
Nov  7 07:45:44 SilenceServices sshd[3277]: Failed password for root from 51.75.66.11 port 39042 ssh2
Nov  7 07:49:26 SilenceServices sshd[4360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.11
Nov  7 07:49:29 SilenceServices sshd[4360]: Failed password for invalid user web2 from 51.75.66.11 port 48682 ssh2
2019-11-07 17:13:15
218.92.0.199 attackbotsspam
2019-11-07T06:21:26.646336Z \[cowrie.ssh.factory.CowrieSSHFactory\] New connection: 218.92.0.199:31055 \(107.175.91.48:22\) \[session: 4404fa872243\]
2019-11-07T06:26:02.983004Z \[cowrie.ssh.factory.CowrieSSHFactory\] New connection: 218.92.0.199:17767 \(107.175.91.48:22\) \[session: 657817e2fd9e\]
...
2019-11-07 17:44:31
196.29.99.2 attackbots
2019-11-07T07:26:09.013176struts4.enskede.local sshd\[15798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.29.99.2  user=root
2019-11-07T07:26:12.066802struts4.enskede.local sshd\[15798\]: Failed password for root from 196.29.99.2 port 42852 ssh2
2019-11-07T07:26:13.947130struts4.enskede.local sshd\[15801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.29.99.2  user=root
2019-11-07T07:26:16.533608struts4.enskede.local sshd\[15801\]: Failed password for root from 196.29.99.2 port 44452 ssh2
2019-11-07T07:26:18.382036struts4.enskede.local sshd\[15804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.29.99.2  user=root
...
2019-11-07 17:14:11
187.190.105.178 attack
Unauthorised access (Nov  7) SRC=187.190.105.178 LEN=52 TTL=108 ID=24793 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-07 17:37:42
51.89.57.123 attackbots
Triggered by Fail2Ban at Ares web server
2019-11-07 17:44:07
201.174.182.159 attackbotsspam
SSH invalid-user multiple login attempts
2019-11-07 17:29:53
190.28.118.221 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/190.28.118.221/ 
 
 CO - 1H : (14)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CO 
 NAME ASN : ASN27805 
 
 IP : 190.28.118.221 
 
 CIDR : 190.28.0.0/16 
 
 PREFIX COUNT : 52 
 
 UNIQUE IP COUNT : 2105088 
 
 
 ATTACKS DETECTED ASN27805 :  
  1H - 2 
  3H - 3 
  6H - 4 
 12H - 4 
 24H - 6 
 
 DateTime : 2019-11-07 07:26:36 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-07 17:34:43
148.70.118.95 attackspambots
2019-11-07T08:38:12.695585abusebot-5.cloudsearch.cf sshd\[17676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.118.95  user=root
2019-11-07 17:25:45
85.117.115.38 attack
Nov  7 00:22:40 mailman postfix/smtpd[16310]: NOQUEUE: reject: RCPT from unknown[85.117.115.38]: 554 5.7.1 Service unavailable; Client host [85.117.115.38] blocked using sbl-xbl.spamhaus.org; https://www.spamhaus.org/query/ip/85.117.115.38; from= to= proto=ESMTP helo=<[85.117.115.38]>
Nov  7 00:26:52 mailman postfix/smtpd[16333]: NOQUEUE: reject: RCPT from unknown[85.117.115.38]: 554 5.7.1 Service unavailable; Client host [85.117.115.38] blocked using sbl-xbl.spamhaus.org; https://www.spamhaus.org/query/ip/85.117.115.38; from= to= proto=ESMTP helo=<[85.117.115.38]>
2019-11-07 17:23:57
123.160.246.55 attack
Nov  7 10:22:53 vmanager6029 sshd\[3252\]: Invalid user doina from 123.160.246.55 port 34768
Nov  7 10:22:53 vmanager6029 sshd\[3252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.160.246.55
Nov  7 10:22:55 vmanager6029 sshd\[3252\]: Failed password for invalid user doina from 123.160.246.55 port 34768 ssh2
2019-11-07 17:39:09
185.232.67.5 attack
[portscan] tcp/22 [SSH]
[scan/connect: 125 time(s)]
in blocklist.de:'listed [ssh]'
in spfbl.net:'listed'
*(RWIN=29200)(11071155)
2019-11-07 17:27:49
188.166.42.50 attack
Nov  7 10:27:03 relay postfix/smtpd\[28212\]: warning: unknown\[188.166.42.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  7 10:28:16 relay postfix/smtpd\[23231\]: warning: unknown\[188.166.42.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  7 10:28:48 relay postfix/smtpd\[24590\]: warning: unknown\[188.166.42.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  7 10:33:22 relay postfix/smtpd\[24590\]: warning: unknown\[188.166.42.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  7 10:42:10 relay postfix/smtpd\[25780\]: warning: unknown\[188.166.42.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-07 17:44:52

最近上报的IP列表

55.230.67.235 146.219.145.131 160.242.45.137 26.196.115.157
176.29.51.129 238.171.64.132 94.159.173.154 72.134.39.63
66.38.87.29 76.120.40.74 49.55.94.81 194.55.248.253
180.90.117.40 31.138.31.176 58.123.89.119 248.42.176.213
98.132.192.84 18.74.250.137 139.223.104.105 38.252.58.143