必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.148.214.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62347
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.148.214.159.		IN	A

;; AUTHORITY SECTION:
.			195	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:36:46 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
159.214.148.132.in-addr.arpa domain name pointer ip-132-148-214-159.ip.secureserver.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
159.214.148.132.in-addr.arpa	name = ip-132-148-214-159.ip.secureserver.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
80.151.229.8 attackbots
Jun 22 14:34:32 core01 sshd\[28114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.151.229.8  user=root
Jun 22 14:34:35 core01 sshd\[28114\]: Failed password for root from 80.151.229.8 port 20886 ssh2
...
2019-06-22 21:39:21
103.129.220.250 attack
wp brute-force
2019-06-22 20:50:07
121.227.43.149 attackspambots
SASL broute force
2019-06-22 21:45:00
146.200.228.6 attackspam
Jun 22 08:41:39 mout sshd[25666]: Invalid user teamspeak from 146.200.228.6 port 57458
2019-06-22 21:11:24
119.4.40.101 attackspam
Jun 21 23:14:45 aat-srv002 sshd[18716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.4.40.101
Jun 21 23:14:47 aat-srv002 sshd[18716]: Failed password for invalid user admin1 from 119.4.40.101 port 36735 ssh2
Jun 21 23:16:28 aat-srv002 sshd[18733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.4.40.101
Jun 21 23:16:30 aat-srv002 sshd[18733]: Failed password for invalid user fei from 119.4.40.101 port 54521 ssh2
...
2019-06-22 21:26:37
41.87.72.102 attack
Invalid user ei from 41.87.72.102 port 57025
2019-06-22 21:48:44
111.40.50.89 attack
Automatic report - Web App Attack
2019-06-22 20:45:27
203.186.184.146 attack
IP attempted unauthorised action
2019-06-22 21:20:20
45.227.254.103 attackbotsspam
Port scan on 6 port(s): 3514 3523 3670 3756 3866 3905
2019-06-22 21:49:42
68.183.84.15 attackbotsspam
Jun 22 06:15:32 ArkNodeAT sshd\[781\]: Invalid user developer from 68.183.84.15
Jun 22 06:15:32 ArkNodeAT sshd\[781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.84.15
Jun 22 06:15:34 ArkNodeAT sshd\[781\]: Failed password for invalid user developer from 68.183.84.15 port 36200 ssh2
2019-06-22 21:46:13
199.249.230.114 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.249.230.114  user=root
Failed password for root from 199.249.230.114 port 39099 ssh2
Failed password for root from 199.249.230.114 port 39099 ssh2
Failed password for root from 199.249.230.114 port 39099 ssh2
Failed password for root from 199.249.230.114 port 39099 ssh2
2019-06-22 21:01:21
188.226.182.209 attack
Jun 22 11:54:33 *** sshd[32641]: Invalid user nao from 188.226.182.209
2019-06-22 21:07:32
170.0.125.147 attackbots
2019-06-22 H=147-125-0-170.castelecom.com.br \[170.0.125.147\] sender verify fail for \: Unrouteable address
2019-06-22 H=147-125-0-170.castelecom.com.br \[170.0.125.147\] F=\ rejected RCPT \<**REMOVED****REMOVED**last.fm@**REMOVED**.de\>: Sender verify failed
2019-06-22 H=147-125-0-170.castelecom.com.br \[170.0.125.147\] F=\ rejected RCPT \<**REMOVED****REMOVED**perl.org@**REMOVED**.de\>: Sender verify failed
2019-06-22 21:25:36
103.207.39.88 attackbots
Jun 22 11:16:56 lcl-usvr-02 sshd[9644]: Invalid user support from 103.207.39.88 port 63290
Jun 22 11:16:56 lcl-usvr-02 sshd[9644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.207.39.88
Jun 22 11:16:56 lcl-usvr-02 sshd[9644]: Invalid user support from 103.207.39.88 port 63290
Jun 22 11:16:58 lcl-usvr-02 sshd[9644]: Failed password for invalid user support from 103.207.39.88 port 63290 ssh2
Jun 22 11:16:56 lcl-usvr-02 sshd[9644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.207.39.88
Jun 22 11:16:56 lcl-usvr-02 sshd[9644]: Invalid user support from 103.207.39.88 port 63290
Jun 22 11:16:58 lcl-usvr-02 sshd[9644]: Failed password for invalid user support from 103.207.39.88 port 63290 ssh2
Jun 22 11:16:58 lcl-usvr-02 sshd[9644]: error: Received disconnect from 103.207.39.88 port 63290:3: com.jcraft.jsch.JSchException: Auth fail [preauth]
Jun 22 11:16:58 lcl-usvr-02 sshd[9700]: Invalid user service from 103.207.39.88 port
2019-06-22 21:13:01
182.23.62.195 attack
proto=tcp  .  spt=52445  .  dpt=25  .     (listed on Blocklist de  Jun 21)     (185)
2019-06-22 21:20:53

最近上报的IP列表

132.148.229.77 132.148.23.221 132.148.233.52 132.148.234.43
132.148.235.179 132.148.233.129 132.148.234.130 132.148.224.27
132.148.237.232 132.148.226.184 132.148.238.233 132.148.229.148
132.148.23.74 132.148.237.39 132.148.239.73 132.148.240.138
132.148.242.126 132.148.243.238 132.148.244.203 132.148.245.6