必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.18.51.246
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47344
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.18.51.246.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031802 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 19 13:03:51 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 246.51.18.132.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 132.18.51.246.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.255.28.53 attackspambots
Aug 12 14:10:17 rocket sshd[23474]: Failed password for root from 51.255.28.53 port 60764 ssh2
Aug 12 14:14:26 rocket sshd[23845]: Failed password for root from 51.255.28.53 port 43030 ssh2
...
2020-08-12 22:46:52
83.24.23.18 attackspambots
Aug 12 05:05:15 mailrelay sshd[32534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.24.23.18  user=r.r
Aug 12 05:05:17 mailrelay sshd[32534]: Failed password for r.r from 83.24.23.18 port 45730 ssh2
Aug 12 05:05:17 mailrelay sshd[32534]: Received disconnect from 83.24.23.18 port 45730:11: Bye Bye [preauth]
Aug 12 05:05:17 mailrelay sshd[32534]: Disconnected from 83.24.23.18 port 45730 [preauth]
Aug 12 05:14:04 mailrelay sshd[32674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.24.23.18  user=r.r
Aug 12 05:14:07 mailrelay sshd[32674]: Failed password for r.r from 83.24.23.18 port 41194 ssh2
Aug 12 05:14:07 mailrelay sshd[32674]: Received disconnect from 83.24.23.18 port 41194:11: Bye Bye [preauth]
Aug 12 05:14:07 mailrelay sshd[32674]: Disconnected from 83.24.23.18 port 41194 [preauth]
Aug 12 05:21:46 mailrelay sshd[324]: pam_unix(sshd:auth): authentication failure; logname= uid=0........
-------------------------------
2020-08-12 22:05:37
60.167.180.216 attack
$f2bV_matches
2020-08-12 22:41:18
82.65.104.195 attackspambots
Automatic report - Banned IP Access
2020-08-12 22:14:26
218.92.0.216 attack
Aug 12 10:12:01 plusreed sshd[20195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.216  user=root
Aug 12 10:12:03 plusreed sshd[20195]: Failed password for root from 218.92.0.216 port 47737 ssh2
...
2020-08-12 22:15:52
222.186.173.142 attackbotsspam
Aug 12 16:17:46 abendstille sshd\[3145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
Aug 12 16:17:48 abendstille sshd\[3145\]: Failed password for root from 222.186.173.142 port 24420 ssh2
Aug 12 16:17:49 abendstille sshd\[3143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
Aug 12 16:17:51 abendstille sshd\[3143\]: Failed password for root from 222.186.173.142 port 21426 ssh2
Aug 12 16:17:51 abendstille sshd\[3145\]: Failed password for root from 222.186.173.142 port 24420 ssh2
...
2020-08-12 22:35:26
49.233.130.95 attackbots
Automatic report BANNED IP
2020-08-12 22:44:30
202.153.37.205 attackbotsspam
Aug 12 13:53:56 v11 sshd[23728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.153.37.205  user=r.r
Aug 12 13:53:58 v11 sshd[23728]: Failed password for r.r from 202.153.37.205 port 11849 ssh2
Aug 12 13:53:59 v11 sshd[23728]: Received disconnect from 202.153.37.205 port 11849:11: Bye Bye [preauth]
Aug 12 13:53:59 v11 sshd[23728]: Disconnected from 202.153.37.205 port 11849 [preauth]
Aug 12 13:58:36 v11 sshd[24086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.153.37.205  user=r.r
Aug 12 13:58:38 v11 sshd[24086]: Failed password for r.r from 202.153.37.205 port 34292 ssh2
Aug 12 13:58:38 v11 sshd[24086]: Received disconnect from 202.153.37.205 port 34292:11: Bye Bye [preauth]
Aug 12 13:58:38 v11 sshd[24086]: Disconnected from 202.153.37.205 port 34292 [preauth]
Aug 12 14:03:22 v11 sshd[24442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost........
-------------------------------
2020-08-12 22:31:56
89.190.84.3 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-08-12 22:30:37
46.30.237.145 attack
plussize.fitness 46.30.237.145 [12/Aug/2020:14:42:20 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4271 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
plussize.fitness 46.30.237.145 [12/Aug/2020:14:42:21 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4271 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
2020-08-12 22:26:02
159.65.154.48 attack
Aug 12 17:28:35 hosting sshd[8092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=adbizdirectory.com  user=root
Aug 12 17:28:37 hosting sshd[8092]: Failed password for root from 159.65.154.48 port 34520 ssh2
...
2020-08-12 22:35:47
138.68.184.70 attackspam
Aug 12 16:43:34 lukav-desktop sshd\[1733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.184.70  user=root
Aug 12 16:43:37 lukav-desktop sshd\[1733\]: Failed password for root from 138.68.184.70 port 51346 ssh2
Aug 12 16:47:52 lukav-desktop sshd\[4769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.184.70  user=root
Aug 12 16:47:54 lukav-desktop sshd\[4769\]: Failed password for root from 138.68.184.70 port 34382 ssh2
Aug 12 16:52:10 lukav-desktop sshd\[7926\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.184.70  user=root
2020-08-12 22:29:42
106.53.97.115 attackspambots
Port Scan
...
2020-08-12 22:39:08
64.225.119.164 attackbotsspam
Aug 12 14:40:34 haigwepa sshd[4620]: Failed password for root from 64.225.119.164 port 36160 ssh2
...
2020-08-12 22:08:44
49.135.33.170 attackbots
Aug 12 14:06:45 rs-7 sshd[39196]: Connection closed by 49.135.33.170 port 51392 [preauth]
Aug 12 14:16:35 rs-7 sshd[41534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.135.33.170  user=r.r
Aug 12 14:16:37 rs-7 sshd[41534]: Failed password for r.r from 49.135.33.170 port 33616 ssh2
Aug 12 14:16:37 rs-7 sshd[41534]: Received disconnect from 49.135.33.170 port 33616:11: Bye Bye [preauth]
Aug 12 14:16:37 rs-7 sshd[41534]: Disconnected from 49.135.33.170 port 33616 [preauth]
Aug 12 14:24:28 rs-7 sshd[43028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.135.33.170  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.135.33.170
2020-08-12 22:44:59

最近上报的IP列表

23.225.223.161 119.27.144.152 185.222.144.1 117.235.34.68
137.114.124.61 186.232.170.137 188.165.56.162 51.255.119.246
203.36.214.25 57.201.150.92 238.155.109.175 200.142.35.169
211.228.134.74 26.60.78.84 152.85.181.228 82.151.70.191
145.159.125.31 67.206.142.204 36.95.77.34 168.64.127.26