必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.84.131.33
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51077
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.84.131.33.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 12:25:59 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 33.131.84.132.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 132.84.131.33.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.254.23.75 attackspambots
1598646283 - 08/28/2020 22:24:43 Host: 222.254.23.75/222.254.23.75 Port: 445 TCP Blocked
2020-08-29 05:14:53
129.211.171.24 attackspam
Invalid user xm from 129.211.171.24 port 53998
2020-08-29 05:18:07
82.221.100.91 attack
Aug 28 22:04:48 ns392434 sshd[3181]: Invalid user sce from 82.221.100.91 port 42920
Aug 28 22:04:48 ns392434 sshd[3181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.221.100.91
Aug 28 22:04:48 ns392434 sshd[3181]: Invalid user sce from 82.221.100.91 port 42920
Aug 28 22:04:50 ns392434 sshd[3181]: Failed password for invalid user sce from 82.221.100.91 port 42920 ssh2
Aug 28 22:21:34 ns392434 sshd[3699]: Invalid user rabbitmq from 82.221.100.91 port 44536
Aug 28 22:21:34 ns392434 sshd[3699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.221.100.91
Aug 28 22:21:34 ns392434 sshd[3699]: Invalid user rabbitmq from 82.221.100.91 port 44536
Aug 28 22:21:35 ns392434 sshd[3699]: Failed password for invalid user rabbitmq from 82.221.100.91 port 44536 ssh2
Aug 28 22:28:41 ns392434 sshd[3901]: Invalid user lucas from 82.221.100.91 port 51786
2020-08-29 05:01:54
106.52.135.239 attackspam
Aug 28 23:22:46 lukav-desktop sshd\[25837\]: Invalid user ansible from 106.52.135.239
Aug 28 23:22:46 lukav-desktop sshd\[25837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.135.239
Aug 28 23:22:48 lukav-desktop sshd\[25837\]: Failed password for invalid user ansible from 106.52.135.239 port 47974 ssh2
Aug 28 23:25:05 lukav-desktop sshd\[25850\]: Invalid user gaojie from 106.52.135.239
Aug 28 23:25:05 lukav-desktop sshd\[25850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.135.239
2020-08-29 04:48:55
27.224.145.243 attack
(ftpd) Failed FTP login from 27.224.145.243 (CN/China/-): 10 in the last 3600 secs
2020-08-29 04:50:46
62.148.142.202 attackspambots
$f2bV_matches
2020-08-29 05:21:25
5.187.188.116 attackbotsspam
Aug 28 22:50:28 abendstille sshd\[32015\]: Invalid user b3 from 5.187.188.116
Aug 28 22:50:28 abendstille sshd\[32015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.187.188.116
Aug 28 22:50:30 abendstille sshd\[32015\]: Failed password for invalid user b3 from 5.187.188.116 port 42126 ssh2
Aug 28 22:54:14 abendstille sshd\[3472\]: Invalid user ansible from 5.187.188.116
Aug 28 22:54:14 abendstille sshd\[3472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.187.188.116
...
2020-08-29 05:25:18
144.64.3.101 attackbots
Time:     Fri Aug 28 20:43:54 2020 +0000
IP:       144.64.3.101 (bl23-3-101.dsl.telepac.pt)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Aug 28 20:33:09 ca-18-ede1 sshd[15407]: Invalid user ansible from 144.64.3.101 port 45354
Aug 28 20:33:11 ca-18-ede1 sshd[15407]: Failed password for invalid user ansible from 144.64.3.101 port 45354 ssh2
Aug 28 20:40:11 ca-18-ede1 sshd[16172]: Invalid user alberto from 144.64.3.101 port 34626
Aug 28 20:40:13 ca-18-ede1 sshd[16172]: Failed password for invalid user alberto from 144.64.3.101 port 34626 ssh2
Aug 28 20:43:49 ca-18-ede1 sshd[16599]: Invalid user deploy from 144.64.3.101 port 43884
2020-08-29 04:55:12
85.45.123.234 attackspam
Aug 28 22:23:55 [host] sshd[12002]: Invalid user k
Aug 28 22:23:55 [host] sshd[12002]: pam_unix(sshd:
Aug 28 22:23:57 [host] sshd[12002]: Failed passwor
2020-08-29 05:27:31
143.92.42.120 attackspam
Time:     Fri Aug 28 20:23:50 2020 +0000
IP:       143.92.42.120 (-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Aug 28 20:03:37 ca-16-ede1 sshd[15790]: Invalid user luther from 143.92.42.120 port 52738
Aug 28 20:03:39 ca-16-ede1 sshd[15790]: Failed password for invalid user luther from 143.92.42.120 port 52738 ssh2
Aug 28 20:17:51 ca-16-ede1 sshd[17639]: Invalid user vmail from 143.92.42.120 port 46524
Aug 28 20:17:54 ca-16-ede1 sshd[17639]: Failed password for invalid user vmail from 143.92.42.120 port 46524 ssh2
Aug 28 20:23:46 ca-16-ede1 sshd[18410]: Invalid user git from 143.92.42.120 port 53866
2020-08-29 04:55:36
180.246.247.61 attackbotsspam
2020-08-28 15:21:40.688482-0500  localhost sshd[72695]: Failed password for invalid user eliane from 180.246.247.61 port 41302 ssh2
2020-08-29 04:53:43
123.30.249.49 attackbots
Failed password for invalid user testftp from 123.30.249.49 port 55280 ssh2
2020-08-29 05:00:59
62.94.206.57 attackbots
Time:     Fri Aug 28 20:23:00 2020 +0000
IP:       62.94.206.57 (ip-206-57.sn1.clouditalia.com)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Aug 28 20:01:14 ca-16-ede1 sshd[15469]: Invalid user unturned from 62.94.206.57 port 52015
Aug 28 20:01:16 ca-16-ede1 sshd[15469]: Failed password for invalid user unturned from 62.94.206.57 port 52015 ssh2
Aug 28 20:18:01 ca-16-ede1 sshd[17668]: Invalid user git from 62.94.206.57 port 44274
Aug 28 20:18:03 ca-16-ede1 sshd[17668]: Failed password for invalid user git from 62.94.206.57 port 44274 ssh2
Aug 28 20:22:56 ca-16-ede1 sshd[18282]: Invalid user sysadmin from 62.94.206.57 port 49116
2020-08-29 04:57:48
104.131.131.140 attack
Aug 28 23:44:19 pkdns2 sshd\[56504\]: Invalid user oracle from 104.131.131.140Aug 28 23:44:21 pkdns2 sshd\[56504\]: Failed password for invalid user oracle from 104.131.131.140 port 49585 ssh2Aug 28 23:47:32 pkdns2 sshd\[56697\]: Invalid user openerp from 104.131.131.140Aug 28 23:47:35 pkdns2 sshd\[56697\]: Failed password for invalid user openerp from 104.131.131.140 port 45128 ssh2Aug 28 23:50:58 pkdns2 sshd\[56889\]: Invalid user zzh from 104.131.131.140Aug 28 23:51:00 pkdns2 sshd\[56889\]: Failed password for invalid user zzh from 104.131.131.140 port 40672 ssh2
...
2020-08-29 05:16:32
51.158.120.58 attackbots
$f2bV_matches
2020-08-29 05:22:17

最近上报的IP列表

9.161.175.134 168.164.65.13 30.186.87.2 225.247.33.40
193.163.73.196 199.119.235.71 253.86.182.250 137.68.121.189
7.146.175.218 129.105.152.157 239.166.226.251 168.85.38.53
120.204.134.242 169.179.101.103 240.59.186.152 226.138.18.141
230.58.37.151 38.72.206.140 170.187.89.163 210.138.176.87