必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.189.42.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21689
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.189.42.197.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 13:35:55 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 197.42.189.132.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 197.42.189.132.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
42.118.85.242 attackspambots
Scanning random ports - tries to find possible vulnerable services
2020-01-05 17:07:36
68.183.133.104 attack
Dec  1 22:10:08 vpn sshd[17534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.133.104
Dec  1 22:10:10 vpn sshd[17534]: Failed password for invalid user costa from 68.183.133.104 port 32922 ssh2
Dec  1 22:13:41 vpn sshd[17563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.133.104
2020-01-05 17:22:38
68.183.106.129 attack
Mar 26 09:34:25 vpn sshd[30230]: Failed password for root from 68.183.106.129 port 39376 ssh2
Mar 26 09:40:54 vpn sshd[30257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.106.129
Mar 26 09:40:55 vpn sshd[30257]: Failed password for invalid user account from 68.183.106.129 port 55264 ssh2
2020-01-05 17:31:08
68.183.190.34 attack
Mar  9 03:10:49 vpn sshd[21323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.190.34
Mar  9 03:10:51 vpn sshd[21323]: Failed password for invalid user fabian from 68.183.190.34 port 57858 ssh2
Mar  9 03:17:14 vpn sshd[21339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.190.34
2020-01-05 17:10:16
68.169.163.154 attackbots
Feb 24 20:51:59 vpn sshd[3008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.169.163.154
Feb 24 20:52:01 vpn sshd[3008]: Failed password for invalid user ftpuser from 68.169.163.154 port 28419 ssh2
Feb 24 20:58:03 vpn sshd[3037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.169.163.154
2020-01-05 17:34:56
68.183.184.141 attack
Feb  3 15:06:38 vpn sshd[23645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.184.141
Feb  3 15:06:40 vpn sshd[23645]: Failed password for invalid user test from 68.183.184.141 port 38378 ssh2
Feb  3 15:07:49 vpn sshd[23647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.184.141
2020-01-05 17:14:24
68.183.133.58 attackspam
Jan  8 22:15:36 vpn sshd[18464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.133.58
Jan  8 22:15:38 vpn sshd[18464]: Failed password for invalid user user from 68.183.133.58 port 49194 ssh2
Jan  8 22:18:43 vpn sshd[18482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.133.58
2020-01-05 17:22:51
106.13.183.92 attackbots
Jan  4 21:46:28 hanapaa sshd\[29577\]: Invalid user bmuuser from 106.13.183.92
Jan  4 21:46:28 hanapaa sshd\[29577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.183.92
Jan  4 21:46:30 hanapaa sshd\[29577\]: Failed password for invalid user bmuuser from 106.13.183.92 port 49680 ssh2
Jan  4 21:56:03 hanapaa sshd\[30458\]: Invalid user 123456 from 106.13.183.92
Jan  4 21:56:03 hanapaa sshd\[30458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.183.92
2020-01-05 17:24:45
67.215.37.126 attack
Apr 15 04:30:24 vpn sshd[14647]: Invalid user admin from 67.215.37.126
Apr 15 04:30:24 vpn sshd[14647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.215.37.126
Apr 15 04:30:25 vpn sshd[14647]: Failed password for invalid user admin from 67.215.37.126 port 54013 ssh2
Apr 15 04:30:27 vpn sshd[14647]: Failed password for invalid user admin from 67.215.37.126 port 54013 ssh2
Apr 15 04:30:29 vpn sshd[14647]: Failed password for invalid user admin from 67.215.37.126 port 54013 ssh2
2020-01-05 17:40:19
68.183.124.72 attackspambots
Nov 25 06:13:59 vpn sshd[28419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.124.72
Nov 25 06:14:01 vpn sshd[28419]: Failed password for invalid user admin from 68.183.124.72 port 39578 ssh2
Nov 25 06:23:24 vpn sshd[28463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.124.72
2020-01-05 17:25:41
68.183.161.41 attack
Mar  3 18:11:17 vpn sshd[26526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.161.41
Mar  3 18:11:19 vpn sshd[26526]: Failed password for invalid user rl from 68.183.161.41 port 46878 ssh2
Mar  3 18:17:20 vpn sshd[26539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.161.41
2020-01-05 17:16:42
68.183.186.94 attackspambots
Feb  6 12:47:20 vpn sshd[4516]: Failed password for root from 68.183.186.94 port 49268 ssh2
Feb  6 12:49:50 vpn sshd[4518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.186.94
Feb  6 12:49:52 vpn sshd[4518]: Failed password for invalid user bot from 68.183.186.94 port 57934 ssh2
2020-01-05 17:10:47
67.207.95.95 attackspambots
Dec 31 20:11:33 vpn sshd[9682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.95.95
Dec 31 20:11:34 vpn sshd[9682]: Failed password for invalid user claudio from 67.207.95.95 port 33092 ssh2
Dec 31 20:15:12 vpn sshd[9699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.95.95
2020-01-05 17:42:07
68.183.231.174 attackbotsspam
Mar 11 11:41:05 vpn sshd[1883]: Failed password for root from 68.183.231.174 port 37862 ssh2
Mar 11 11:49:17 vpn sshd[1931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.231.174
Mar 11 11:49:19 vpn sshd[1931]: Failed password for invalid user transfer from 68.183.231.174 port 47958 ssh2
2020-01-05 17:06:24
68.183.117.212 attackbotsspam
Mar  9 03:48:32 vpn sshd[21460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.117.212
Mar  9 03:48:34 vpn sshd[21460]: Failed password for invalid user ubuntu from 68.183.117.212 port 59028 ssh2
Mar  9 03:53:42 vpn sshd[21474]: Failed password for root from 68.183.117.212 port 57192 ssh2
2020-01-05 17:29:29

最近上报的IP列表

152.252.197.104 26.188.147.117 18.40.227.69 155.247.146.30
47.20.33.66 57.98.27.245 25.150.213.186 223.69.83.14
178.194.250.88 47.235.92.233 187.0.61.98 168.218.122.158
115.215.74.212 197.61.153.178 201.183.198.69 239.232.98.69
4.80.87.230 27.148.130.45 84.27.49.222 129.223.177.66