必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.140.33.160
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4892
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;133.140.33.160.			IN	A

;; AUTHORITY SECTION:
.			289	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 22:49:12 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 160.33.140.133.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 160.33.140.133.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
42.200.155.72 attackspam
k+ssh-bruteforce
2020-08-07 05:29:31
37.187.102.226 attackspambots
Aug  6 17:57:00 h2646465 sshd[23705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.102.226  user=root
Aug  6 17:57:02 h2646465 sshd[23705]: Failed password for root from 37.187.102.226 port 38336 ssh2
Aug  6 18:09:18 h2646465 sshd[25512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.102.226  user=root
Aug  6 18:09:19 h2646465 sshd[25512]: Failed password for root from 37.187.102.226 port 44414 ssh2
Aug  6 18:16:19 h2646465 sshd[26629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.102.226  user=root
Aug  6 18:16:21 h2646465 sshd[26629]: Failed password for root from 37.187.102.226 port 56080 ssh2
Aug  6 18:23:12 h2646465 sshd[27280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.102.226  user=root
Aug  6 18:23:13 h2646465 sshd[27280]: Failed password for root from 37.187.102.226 port 39508 ssh2
Aug  6 18:29:58 h264
2020-08-07 05:36:51
47.56.9.124 attackspam
GET /xmlrpc.php HTTP/1.1
2020-08-07 05:30:52
14.232.164.76 attack
Aug  6 09:17:53 Host-KEWR-E postfix/submission/smtpd[10258]: warning: unknown[14.232.164.76]: SASL PLAIN authentication failed:
...
2020-08-07 05:19:36
106.55.150.24 attackspam
2020-08-06T21:34:30.263394amanda2.illicoweb.com sshd\[43291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.150.24  user=root
2020-08-06T21:34:32.122327amanda2.illicoweb.com sshd\[43291\]: Failed password for root from 106.55.150.24 port 53460 ssh2
2020-08-06T21:37:23.873708amanda2.illicoweb.com sshd\[43998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.150.24  user=root
2020-08-06T21:37:26.146974amanda2.illicoweb.com sshd\[43998\]: Failed password for root from 106.55.150.24 port 41274 ssh2
2020-08-06T21:40:17.244786amanda2.illicoweb.com sshd\[44741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.150.24  user=root
...
2020-08-07 05:21:53
61.153.14.115 attackspam
(sshd) Failed SSH login from 61.153.14.115 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug  6 22:26:20 amsweb01 sshd[5833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.153.14.115  user=root
Aug  6 22:26:22 amsweb01 sshd[5833]: Failed password for root from 61.153.14.115 port 32818 ssh2
Aug  6 22:45:09 amsweb01 sshd[8388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.153.14.115  user=root
Aug  6 22:45:10 amsweb01 sshd[8388]: Failed password for root from 61.153.14.115 port 60348 ssh2
Aug  6 22:50:00 amsweb01 sshd[9056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.153.14.115  user=root
2020-08-07 05:40:51
117.40.196.21 attack
1596734944 - 08/06/2020 19:29:04 Host: 117.40.196.21/117.40.196.21 Port: 900 TCP Blocked
...
2020-08-07 05:29:08
212.129.246.52 attack
2020-08-06T22:31:23.843264+02:00  sshd[22303]: Failed password for root from 212.129.246.52 port 53838 ssh2
2020-08-07 05:38:46
186.122.148.216 attackbotsspam
2020-08-06T23:50:52.230759amanda2.illicoweb.com sshd\[17249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.148.216  user=root
2020-08-06T23:50:54.001958amanda2.illicoweb.com sshd\[17249\]: Failed password for root from 186.122.148.216 port 49888 ssh2
2020-08-06T23:53:30.636949amanda2.illicoweb.com sshd\[17860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.148.216  user=root
2020-08-06T23:53:32.765904amanda2.illicoweb.com sshd\[17860\]: Failed password for root from 186.122.148.216 port 35180 ssh2
2020-08-06T23:55:43.765931amanda2.illicoweb.com sshd\[18173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.148.216  user=root
...
2020-08-07 05:57:03
182.208.252.91 attackbotsspam
2020-08-06T22:00:28.698283amanda2.illicoweb.com sshd\[49109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.208.252.91  user=root
2020-08-06T22:00:30.777704amanda2.illicoweb.com sshd\[49109\]: Failed password for root from 182.208.252.91 port 45378 ssh2
2020-08-06T22:04:14.018486amanda2.illicoweb.com sshd\[969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.208.252.91  user=root
2020-08-06T22:04:15.791614amanda2.illicoweb.com sshd\[969\]: Failed password for root from 182.208.252.91 port 58484 ssh2
2020-08-06T22:07:51.223665amanda2.illicoweb.com sshd\[1635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.208.252.91  user=root
...
2020-08-07 05:26:09
9.9.9.9 attack
Aug 6 19:36:40 *hidden* kernel: [UFW BLOCK] IN=ens192 OUT= MAC=00:50:56:bc:13:b8:30:e4:db:97:3e:3f:08:00 SRC=9.9.9.9 DST=217.198.117.163 LEN=40 TOS=0x00 PREC=0x00 TTL=58 ID=40875 DF PROTO=TCP SPT=853 DPT=43836 WINDOW=0 RES=0x00 RST URGP=0 Aug 6 19:37:19 *hidden* kernel: [UFW BLOCK] IN=ens192 OUT= MAC=00:50:56:bc:13:b8:30:e4:db:97:3e:3f:08:00 SRC=9.9.9.9 DST=217.198.117.163 LEN=40 TOS=0x00 PREC=0x00 TTL=58 ID=48387 DF PROTO=TCP SPT=853 DPT=43854 WINDOW=0 RES=0x00 RST URGP=0 Aug 6 19:37:19 *hidden* kernel: [UFW BLOCK] IN=ens192 OUT= MAC=00:50:56:bc:13:b8:30:e4:db:97:3e:3f:08:00 SRC=9.9.9.9 DST=217.198.117.163 LEN=40 TOS=0x00 PREC=0x00 TTL=58 ID=48388 DF PROTO=TCP SPT=853 DPT=43854 WINDOW=0 RES=0x00 RST URGP=0 Aug 6 19:37:46 *hidden* kernel: [UFW BLOCK] IN=ens192 OUT= MAC=00:50:56:bc:13:b8:30:e4:db:97:3e:3f:08:00 SRC=9.9.9.9 DST=217.198.117.163 LEN=40 TOS=0x00 PREC=0x00 TTL=58 ID=61917 DF PROTO=TCP SPT=853 DPT=43858 WINDOW=0 RES=0x00 RST URGP=0 Aug 6 19:37:46 *hidden* kernel: [UFW BLOCK] 
...
2020-08-07 05:26:21
156.96.106.18 attackbotsspam
Aug  6 20:59:48 haigwepa sshd[7955]: Failed password for root from 156.96.106.18 port 60376 ssh2
...
2020-08-07 05:37:21
77.247.109.20 attack
Automatic report - Banned IP Access
2020-08-07 05:56:06
107.6.183.228 attackbotsspam
[Sun Jul 26 07:10:11 2020] - DDoS Attack From IP: 107.6.183.228 Port: 25475
2020-08-07 05:23:36
177.196.35.76 attack
Automatic report - Port Scan Attack
2020-08-07 05:46:01

最近上报的IP列表

194.15.218.222 132.13.208.200 172.97.246.193 163.145.70.145
248.51.71.116 138.172.230.85 167.162.239.130 203.77.67.169
254.170.0.27 210.251.181.127 214.215.144.88 109.242.173.2
188.212.65.176 187.201.34.127 190.125.121.88 147.220.67.89
228.131.54.224 189.221.97.132 0.29.163.61 101.79.22.228