必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Peru

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.157.48.180
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39591
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.157.48.180.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 00:01:41 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 180.48.157.132.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 180.48.157.132.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
31.208.27.160 attack
Jul  4 15:01:57 klukluk sshd\[23750\]: Invalid user admin from 31.208.27.160
Jul  4 15:05:23 klukluk sshd\[26247\]: Invalid user ubuntu from 31.208.27.160
Jul  4 15:08:49 klukluk sshd\[28348\]: Invalid user pi from 31.208.27.160
...
2019-07-05 02:46:38
148.70.226.162 attack
$f2bV_matches
2019-07-05 02:49:53
154.116.120.148 attackspam
2019-07-04 14:44:18 H=([154.116.120.148]) [154.116.120.148]:12910 I=[10.100.18.23]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=154.116.120.148)
2019-07-04 14:44:18 unexpected disconnection while reading SMTP command from ([154.116.120.148]) [154.116.120.148]:12910 I=[10.100.18.23]:25 (error: Connection reset by peer)
2019-07-04 14:54:00 H=([154.116.120.148]) [154.116.120.148]:59242 I=[10.100.18.23]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=154.116.120.148)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=154.116.120.148
2019-07-05 02:46:05
49.69.126.14 attack
Jul  4 09:08:50 server sshd\[231923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.69.126.14  user=root
Jul  4 09:08:53 server sshd\[231923\]: Failed password for root from 49.69.126.14 port 36053 ssh2
Jul  4 09:09:01 server sshd\[231923\]: Failed password for root from 49.69.126.14 port 36053 ssh2
...
2019-07-05 02:38:40
37.49.227.12 attackspam
04.07.2019 15:30:18 Connection to port 81 blocked by firewall
2019-07-05 02:23:39
167.114.230.252 attackbotsspam
Jul  4 19:15:52 server sshd[33679]: Failed password for invalid user ue from 167.114.230.252 port 41804 ssh2
Jul  4 19:20:11 server sshd[34597]: Failed password for invalid user nr from 167.114.230.252 port 37362 ssh2
Jul  4 19:22:37 server sshd[35156]: Failed password for invalid user hadoop from 167.114.230.252 port 49908 ssh2
2019-07-05 02:29:36
85.30.30.230 attackbots
2019-07-04 14:45:54 unexpected disconnection while reading SMTP command from h85-30-30-230.cust.a3fiber.se [85.30.30.230]:31747 I=[10.100.18.25]:25 (error: Connection reset by peer)
2019-07-04 14:51:53 unexpected disconnection while reading SMTP command from h85-30-30-230.cust.a3fiber.se [85.30.30.230]:20901 I=[10.100.18.25]:25 (error: Connection reset by peer)
2019-07-04 14:54:26 unexpected disconnection while reading SMTP command from h85-30-30-230.cust.a3fiber.se [85.30.30.230]:55635 I=[10.100.18.25]:25 (error: Connection reset by peer)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=85.30.30.230
2019-07-05 03:06:02
14.237.161.185 attack
3389BruteforceFW22
2019-07-05 02:24:01
117.64.82.139 attackbotsspam
Jul  4 09:09:05 ast sshd[19095]: Invalid user admin from 117.64.82.139 port 37415
Jul  4 09:09:08 ast sshd[19095]: error: maximum authentication attempts exceeded for invalid user admin from 117.64.82.139 port 37415 ssh2 [preauth]
Jul  4 09:09:05 ast sshd[19095]: Invalid user admin from 117.64.82.139 port 37415
Jul  4 09:09:08 ast sshd[19095]: error: maximum authentication attempts exceeded for invalid user admin from 117.64.82.139 port 37415 ssh2 [preauth]
Jul  4 09:09:17 ast sshd[19097]: error: maximum authentication attempts exceeded for root from 117.64.82.139 port 37413 ssh2 [preauth]
...
2019-07-05 02:31:06
106.12.193.160 attackspambots
Apr 13 22:03:56 yesfletchmain sshd\[10855\]: Invalid user test from 106.12.193.160 port 38778
Apr 13 22:03:56 yesfletchmain sshd\[10855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.193.160
Apr 13 22:03:59 yesfletchmain sshd\[10855\]: Failed password for invalid user test from 106.12.193.160 port 38778 ssh2
Apr 13 22:07:21 yesfletchmain sshd\[10985\]: Invalid user sejoong from 106.12.193.160 port 33398
Apr 13 22:07:21 yesfletchmain sshd\[10985\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.193.160
...
2019-07-05 02:54:05
124.122.123.200 attackspambots
2019-07-04 14:49:07 unexpected disconnection while reading SMTP command from ppp-124-122-123-200.revip2.asianet.co.th [124.122.123.200]:25166 I=[10.100.18.21]:25 (error: Connection reset by peer)
2019-07-04 14:50:36 unexpected disconnection while reading SMTP command from ppp-124-122-123-200.revip2.asianet.co.th [124.122.123.200]:41483 I=[10.100.18.21]:25 (error: Connection reset by peer)
2019-07-04 14:53:59 unexpected disconnection while reading SMTP command from ppp-124-122-123-200.revip2.asianet.co.th [124.122.123.200]:63423 I=[10.100.18.21]:25 (error: Connection reset by peer)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=124.122.123.200
2019-07-05 02:48:53
104.236.224.69 attackbotsspam
04.07.2019 13:08:53 SSH access blocked by firewall
2019-07-05 02:44:41
182.71.77.58 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 11:55:38,150 INFO [shellcode_manager] (182.71.77.58) no match, writing hexdump (379e09e5e5c4b74dcd4bb5a0fa6a61b6 :13168) - SMB (Unknown)
2019-07-05 02:57:41
49.88.197.187 attackspambots
" "
2019-07-05 02:28:13
51.75.207.61 attack
Jul  4 13:08:47 MK-Soft-VM4 sshd\[3408\]: Invalid user myuser1 from 51.75.207.61 port 46934
Jul  4 13:08:47 MK-Soft-VM4 sshd\[3408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.207.61
Jul  4 13:08:48 MK-Soft-VM4 sshd\[3408\]: Failed password for invalid user myuser1 from 51.75.207.61 port 46934 ssh2
...
2019-07-05 02:48:09

最近上报的IP列表

73.109.55.164 126.19.84.157 26.196.136.179 214.135.8.83
143.140.110.152 126.223.5.236 203.94.118.61 89.144.216.128
213.171.34.158 151.72.156.94 214.114.62.164 163.112.51.112
243.30.48.235 232.41.219.90 150.80.240.206 74.211.175.200
20.13.184.203 70.225.124.101 69.166.192.51 243.192.183.54