必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Israel

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.66.141.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56578
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.66.141.152.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020700 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 19:32:25 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 152.141.66.132.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 152.141.66.132.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
207.154.229.50 attackbotsspam
Aug 23 23:53:50 bouncer sshd\[20865\]: Invalid user prios from 207.154.229.50 port 39462
Aug 23 23:53:50 bouncer sshd\[20865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.229.50 
Aug 23 23:53:52 bouncer sshd\[20865\]: Failed password for invalid user prios from 207.154.229.50 port 39462 ssh2
...
2019-08-24 07:44:30
177.184.70.8 attack
Aug 24 01:45:19 webhost01 sshd[20153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.184.70.8
Aug 24 01:45:21 webhost01 sshd[20153]: Failed password for invalid user win from 177.184.70.8 port 55065 ssh2
...
2019-08-24 08:18:55
85.241.49.89 attackbotsspam
Aug 23 20:04:59 OPSO sshd\[11881\]: Invalid user zzz from 85.241.49.89 port 38608
Aug 23 20:04:59 OPSO sshd\[11881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.241.49.89
Aug 23 20:05:01 OPSO sshd\[11881\]: Failed password for invalid user zzz from 85.241.49.89 port 38608 ssh2
Aug 23 20:09:11 OPSO sshd\[12421\]: Invalid user wuhao from 85.241.49.89 port 54756
Aug 23 20:09:11 OPSO sshd\[12421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.241.49.89
2019-08-24 08:12:32
176.235.252.105 attackspambots
Aug 23 17:33:21 mxgate1 postfix/postscreen[18780]: CONNECT from [176.235.252.105]:14027 to [176.31.12.44]:25
Aug 23 17:33:22 mxgate1 postfix/dnsblog[18788]: addr 176.235.252.105 listed by domain zen.spamhaus.org as 127.0.0.3
Aug 23 17:33:22 mxgate1 postfix/dnsblog[18787]: addr 176.235.252.105 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Aug 23 17:33:22 mxgate1 postfix/postscreen[18780]: PREGREET 24 after 0.13 from [176.235.252.105]:14027: EHLO [176.235.252.105]

Aug 23 17:33:22 mxgate1 postfix/postscreen[18780]: DNSBL rank 3 for [176.235.252.105]:14027
Aug x@x
Aug 23 17:33:22 mxgate1 postfix/postscreen[18780]: HANGUP after 0.35 from [176.235.252.105]:14027 in tests after SMTP handshake
Aug 23 17:33:22 mxgate1 postfix/postscreen[18780]: DISCONNECT [176.235.252.105]:14027


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=176.235.252.105
2019-08-24 08:12:03
117.218.31.215 attackbotsspam
Automatic report - Port Scan Attack
2019-08-24 07:53:55
91.121.110.50 attackbots
Aug 24 00:18:23 [munged] sshd[10311]: Invalid user cyber from 91.121.110.50 port 43014
Aug 24 00:18:23 [munged] sshd[10311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.110.50
2019-08-24 08:05:58
52.140.239.46 attackspambots
Aug 23 08:43:25 friendsofhawaii sshd\[8633\]: Invalid user untu from 52.140.239.46
Aug 23 08:43:25 friendsofhawaii sshd\[8633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.239.46
Aug 23 08:43:28 friendsofhawaii sshd\[8633\]: Failed password for invalid user untu from 52.140.239.46 port 54520 ssh2
Aug 23 08:48:34 friendsofhawaii sshd\[9043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.239.46  user=root
Aug 23 08:48:36 friendsofhawaii sshd\[9043\]: Failed password for root from 52.140.239.46 port 47536 ssh2
2019-08-24 08:06:21
114.44.144.220 attack
:
2019-08-24 08:01:21
148.70.26.85 attackspambots
Multiple SSH auth failures recorded by fail2ban
2019-08-24 07:49:58
188.217.41.101 attackspambots
(Aug 24)  LEN=44 TTL=54 ID=42225 TCP DPT=8080 WINDOW=132 SYN 
 (Aug 23)  LEN=44 TTL=54 ID=60026 TCP DPT=8080 WINDOW=19574 SYN 
 (Aug 22)  LEN=44 TTL=54 ID=60446 TCP DPT=8080 WINDOW=132 SYN 
 (Aug 22)  LEN=44 TTL=54 ID=29414 TCP DPT=8080 WINDOW=132 SYN 
 (Aug 22)  LEN=44 TTL=54 ID=37777 TCP DPT=8080 WINDOW=19574 SYN 
 (Aug 22)  LEN=44 TTL=54 ID=15187 TCP DPT=8080 WINDOW=132 SYN 
 (Aug 21)  LEN=44 TTL=54 ID=48883 TCP DPT=8080 WINDOW=132 SYN 
 (Aug 21)  LEN=44 TTL=54 ID=2106 TCP DPT=8080 WINDOW=132 SYN 
 (Aug 21)  LEN=44 TTL=54 ID=45275 TCP DPT=8080 WINDOW=132 SYN 
 (Aug 21)  LEN=44 TTL=54 ID=1839 TCP DPT=8080 WINDOW=132 SYN 
 (Aug 20)  LEN=44 TTL=54 ID=28787 TCP DPT=8080 WINDOW=19574 SYN 
 (Aug 20)  LEN=44 TTL=54 ID=8618 TCP DPT=8080 WINDOW=132 SYN
2019-08-24 08:15:08
46.35.83.72 attackspam
Aug 23 17:50:13 pl3server sshd[2040403]: Did not receive identification string from 46.35.83.72
Aug 23 17:50:17 pl3server sshd[2040415]: Invalid user thostname0nich from 46.35.83.72
Aug 23 17:50:17 pl3server sshd[2040415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=adsl-46-35-83-72.dynamic.yemennet.ye
Aug 23 17:50:19 pl3server sshd[2040415]: Failed password for invalid user thostname0nich from 46.35.83.72 port 58786 ssh2
Aug 23 17:50:20 pl3server sshd[2040415]: Connection closed by 46.35.83.72 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=46.35.83.72
2019-08-24 08:01:53
116.103.234.67 attackspam
Automatic report - Port Scan Attack
2019-08-24 08:07:18
186.224.186.146 attack
2323/tcp
[2019-08-23]1pkt
2019-08-24 07:52:52
191.53.52.66 attackspambots
Aug 23 17:35:48 pl1server postfix/smtpd[29723]: warning: hostname 191-53-52-66.vze-wr.mastercabo.com.br does not resolve to address 191.53.52.66: Name or service not known
Aug 23 17:35:48 pl1server postfix/smtpd[29723]: connect from unknown[191.53.52.66]
Aug 23 17:35:53 pl1server postfix/smtpd[29723]: warning: unknown[191.53.52.66]: SASL CRAM-MD5 authentication failed: authentication failure
Aug 23 17:35:53 pl1server postfix/smtpd[29723]: warning: unknown[191.53.52.66]: SASL PLAIN authentication failed: authentication failure
Aug 23 17:35:55 pl1server postfix/smtpd[29723]: warning: unknown[191.53.52.66]: SASL LOGIN authentication failed: authentication failure


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=191.53.52.66
2019-08-24 08:14:36
23.129.64.191 attackbots
Aug 23 05:00:51 *** sshd[21478]: Failed password for invalid user deployer from 23.129.64.191 port 23380 ssh2
Aug 23 05:00:58 *** sshd[21485]: Failed password for invalid user deploy from 23.129.64.191 port 52142 ssh2
2019-08-24 08:03:46

最近上报的IP列表

191.101.223.147 13.2.74.154 247.8.110.184 45.202.239.86
126.248.23.0 226.28.180.89 31.41.221.247 45.247.44.156
122.95.25.49 208.154.208.174 32.254.193.39 224.114.154.120
3.154.12.16 224.149.42.254 50.54.239.246 60.12.250.142
252.177.150.66 141.119.198.196 171.61.95.136 133.65.222.219