必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.91.12.191
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 548
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.91.12.191.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 20:25:46 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 191.12.91.132.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 132.91.12.191.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
86.104.220.20 attackspam
Sep 16 05:15:27 pornomens sshd\[26974\]: Invalid user teamspeak2 from 86.104.220.20 port 39907
Sep 16 05:15:27 pornomens sshd\[26974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.104.220.20
Sep 16 05:15:29 pornomens sshd\[26974\]: Failed password for invalid user teamspeak2 from 86.104.220.20 port 39907 ssh2
...
2019-09-16 15:03:44
139.59.20.248 attackspambots
Sep 16 07:55:52 SilenceServices sshd[22350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.20.248
Sep 16 07:55:54 SilenceServices sshd[22350]: Failed password for invalid user cecil123 from 139.59.20.248 port 60352 ssh2
Sep 16 08:00:43 SilenceServices sshd[24118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.20.248
2019-09-16 14:16:00
121.67.246.139 attack
Sep 15 19:48:52 php1 sshd\[9515\]: Invalid user dovecot from 121.67.246.139
Sep 15 19:48:52 php1 sshd\[9515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.67.246.139
Sep 15 19:48:53 php1 sshd\[9515\]: Failed password for invalid user dovecot from 121.67.246.139 port 54268 ssh2
Sep 15 19:53:20 php1 sshd\[9922\]: Invalid user csadmin from 121.67.246.139
Sep 15 19:53:20 php1 sshd\[9922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.67.246.139
2019-09-16 14:48:44
37.59.58.142 attack
Sep 16 01:38:45 new sshd[4546]: Invalid user usuario from 37.59.58.142
Sep 16 01:38:47 new sshd[4546]: Failed password for invalid user usuario from 37.59.58.142 port 50942 ssh2
Sep 16 01:46:37 new sshd[6435]: Invalid user facturacion from 37.59.58.142
Sep 16 01:46:39 new sshd[6435]: Failed password for invalid user facturacion from 37.59.58.142 port 34590 ssh2
Sep 16 01:51:31 new sshd[7596]: Invalid user appman from 37.59.58.142


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=37.59.58.142
2019-09-16 14:23:52
191.235.91.156 attackspambots
Sep 15 22:44:39 xtremcommunity sshd\[129861\]: Invalid user dayz from 191.235.91.156 port 53340
Sep 15 22:44:39 xtremcommunity sshd\[129861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235.91.156
Sep 15 22:44:41 xtremcommunity sshd\[129861\]: Failed password for invalid user dayz from 191.235.91.156 port 53340 ssh2
Sep 15 22:54:24 xtremcommunity sshd\[130122\]: Invalid user musicbot3 from 191.235.91.156 port 44924
Sep 15 22:54:24 xtremcommunity sshd\[130122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235.91.156
...
2019-09-16 14:21:42
92.63.194.90 attackbots
Sep 16 06:48:38 tuxlinux sshd[42204]: Invalid user admin from 92.63.194.90 port 33418
Sep 16 06:48:38 tuxlinux sshd[42204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.90 
...
2019-09-16 14:14:16
165.22.181.77 attackbotsspam
Sep 16 00:29:53 MK-Soft-VM5 sshd\[9908\]: Invalid user eliot from 165.22.181.77 port 48410
Sep 16 00:29:53 MK-Soft-VM5 sshd\[9908\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.181.77
Sep 16 00:29:55 MK-Soft-VM5 sshd\[9908\]: Failed password for invalid user eliot from 165.22.181.77 port 48410 ssh2
...
2019-09-16 14:46:24
200.152.99.82 attackspambots
TCP Port: 25 _    invalid blocked dnsbl-sorbs abuseat-org _  _  _ _ (10)
2019-09-16 14:29:43
51.75.251.153 attackbots
Sep 16 07:56:10 yabzik sshd[9161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.251.153
Sep 16 07:56:12 yabzik sshd[9161]: Failed password for invalid user test2 from 51.75.251.153 port 57456 ssh2
Sep 16 08:00:27 yabzik sshd[10718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.251.153
2019-09-16 14:16:55
188.226.250.69 attackspambots
Sep 16 02:16:37 XXX sshd[17435]: Invalid user toor from 188.226.250.69 port 36946
2019-09-16 15:00:31
141.98.81.38 attack
Sep 16 03:08:21 meumeu sshd[9216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.38 
Sep 16 03:08:23 meumeu sshd[9216]: Failed password for invalid user admin from 141.98.81.38 port 57141 ssh2
Sep 16 03:08:32 meumeu sshd[9260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.38 
...
2019-09-16 14:26:14
106.13.6.116 attack
Sep 16 01:50:45 vps200512 sshd\[26013\]: Invalid user minera from 106.13.6.116
Sep 16 01:50:45 vps200512 sshd\[26013\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.116
Sep 16 01:50:48 vps200512 sshd\[26013\]: Failed password for invalid user minera from 106.13.6.116 port 56202 ssh2
Sep 16 02:00:15 vps200512 sshd\[26188\]: Invalid user userftp from 106.13.6.116
Sep 16 02:00:15 vps200512 sshd\[26188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.116
2019-09-16 14:36:38
185.196.118.119 attackspambots
Invalid user kalavathi from 185.196.118.119 port 51836
2019-09-16 14:48:20
81.22.45.225 attackspambots
Sep 16 08:55:15 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.225 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=65473 PROTO=TCP SPT=56444 DPT=6700 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-09-16 15:02:43
123.198.197.183 attack
Sep 16 03:14:19 km20725 sshd[13726]: Invalid user support from 123.198.197.183
Sep 16 03:14:21 km20725 sshd[13726]: Failed password for invalid user support from 123.198.197.183 port 36812 ssh2
Sep 16 03:14:26 km20725 sshd[13726]: Failed password for invalid user support from 123.198.197.183 port 36812 ssh2
Sep 16 03:14:32 km20725 sshd[13726]: Failed password for invalid user support from 123.198.197.183 port 36812 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=123.198.197.183
2019-09-16 15:01:43

最近上报的IP列表

217.201.136.115 220.9.149.164 191.185.235.32 201.158.82.153
185.225.219.210 61.66.131.189 244.236.141.247 70.78.164.75
231.227.145.96 246.112.44.41 133.222.117.1 213.244.111.225
43.68.105.163 26.186.178.252 186.152.214.7 67.58.99.35
66.249.64.101 204.40.125.25 53.77.213.244 54.251.182.41