必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.18.55.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55882
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;133.18.55.148.			IN	A

;; AUTHORITY SECTION:
.			230	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 05:45:15 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
148.55.18.133.in-addr.arpa domain name pointer v133-18-55-148.vir.kagoya.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.55.18.133.in-addr.arpa	name = v133-18-55-148.vir.kagoya.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
47.19.86.253 attackbots
20/6/7@16:24:34: FAIL: Alarm-Network address from=47.19.86.253
20/6/7@16:24:34: FAIL: Alarm-Network address from=47.19.86.253
...
2020-06-08 07:25:10
79.134.5.153 attackbotsspam
Automatic report - Port Scan Attack
2020-06-08 07:42:35
151.30.253.128 attackbotsspam
Jun  5 20:21:55 xxx sshd[19446]: Failed password for r.r from 151.30.253.128 port 43266 ssh2
Jun  5 20:21:55 xxx sshd[19446]: Received disconnect from 151.30.253.128 port 43266:11: Bye Bye [preauth]
Jun  5 20:21:55 xxx sshd[19446]: Disconnected from 151.30.253.128 port 43266 [preauth]
Jun  5 20:49:30 xxx sshd[24939]: Failed password for r.r from 151.30.253.128 port 37972 ssh2
Jun  5 20:49:30 xxx sshd[24939]: Received disconnect from 151.30.253.128 port 37972:11: Bye Bye [preauth]
Jun  5 20:49:30 xxx sshd[24939]: Disconnected from 151.30.253.128 port 37972 [preauth]
Jun  5 21:05:42 xxx sshd[29397]: Failed password for r.r from 151.30.253.128 port 43490 ssh2
Jun  5 21:05:42 xxx sshd[29397]: Received disconnect from 151.30.253.128 port 43490:11: Bye Bye [preauth]
Jun  5 21:05:42 xxx sshd[29397]: Disconnected from 151.30.253.128 port 43490 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=151.30.253.128
2020-06-08 07:35:49
112.171.26.46 attackspambots
Jun  8 00:59:09 zulu412 sshd\[14689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.171.26.46  user=root
Jun  8 00:59:11 zulu412 sshd\[14689\]: Failed password for root from 112.171.26.46 port 34802 ssh2
Jun  8 01:02:45 zulu412 sshd\[15040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.171.26.46  user=root
...
2020-06-08 07:10:19
2.34.183.228 attack
Trying ports that it shouldn't be.
2020-06-08 07:31:13
13.82.49.222 attackspambots
Jun  7 19:46:25 nbi-636 sshd[24429]: User r.r from 13.82.49.222 not allowed because not listed in AllowUsers
Jun  7 19:46:25 nbi-636 sshd[24429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.82.49.222  user=r.r
Jun  7 19:46:27 nbi-636 sshd[24429]: Failed password for invalid user r.r from 13.82.49.222 port 49810 ssh2
Jun  7 19:46:29 nbi-636 sshd[24429]: Received disconnect from 13.82.49.222 port 49810:11: Bye Bye [preauth]
Jun  7 19:46:29 nbi-636 sshd[24429]: Disconnected from invalid user r.r 13.82.49.222 port 49810 [preauth]
Jun  7 19:54:47 nbi-636 sshd[26359]: User r.r from 13.82.49.222 not allowed because not listed in AllowUsers
Jun  7 19:54:47 nbi-636 sshd[26359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.82.49.222  user=r.r
Jun  7 19:54:49 nbi-636 sshd[26359]: Failed password for invalid user r.r from 13.82.49.222 port 56344 ssh2
Jun  7 19:54:51 nbi-636 sshd[26359]: Rec........
-------------------------------
2020-06-08 07:44:55
37.49.226.173 attack
(sshd) Failed SSH login from 37.49.226.173 (NL/Netherlands/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun  8 00:59:20 ubnt-55d23 sshd[30852]: Did not receive identification string from 37.49.226.173 port 50204
Jun  8 00:59:30 ubnt-55d23 sshd[30853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.226.173  user=root
2020-06-08 07:34:39
83.159.194.187 attack
Jun  7 23:28:09 xeon sshd[37826]: Failed password for root from 83.159.194.187 port 37499 ssh2
2020-06-08 07:40:53
122.228.19.80 attackspam
Jun  7 23:29:17 debian-2gb-nbg1-2 kernel: \[13824099.767180\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=122.228.19.80 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=111 ID=37679 PROTO=TCP SPT=5741 DPT=1026 WINDOW=29200 RES=0x00 SYN URGP=0
2020-06-08 07:32:49
103.130.214.153 attack
20 attempts against mh-ssh on echoip
2020-06-08 07:11:20
175.6.148.219 attack
SSH bruteforce
2020-06-08 07:08:04
177.185.141.100 attack
Jun  7 23:25:01 buvik sshd[13111]: Failed password for root from 177.185.141.100 port 60072 ssh2
Jun  7 23:27:16 buvik sshd[13444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.185.141.100  user=root
Jun  7 23:27:19 buvik sshd[13444]: Failed password for root from 177.185.141.100 port 35210 ssh2
...
2020-06-08 07:44:40
192.42.116.14 attackbotsspam
Jun  8 01:06:04 [Censored Hostname] sshd[19424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.42.116.14 
Jun  8 01:06:06 [Censored Hostname] sshd[19424]: Failed password for invalid user bichongxing from 192.42.116.14 port 51914 ssh2[...]
2020-06-08 07:35:09
195.54.160.243 attackspambots
Multiport scan : 174 ports scanned 863 1016 1186 1807 2314 2568 4190 4283 4462 4632 4641 4823 5538 5817 5996 6336 6350 6506 6699 7030 7406 7722 8062 8714 8893 8977 9063 9147 9191 9663 11018 11095 11339 12033 13049 13676 13855 14093 16595 16706 17937 18488 18864 19263 19503 20796 21150 21500 21509 21552 21840 21877 21886 22056 22116 22317 22496 22657 22836 22868 23517 23687 23857 24281 24878 26943 27380 27623 27631 27636 27720 27801 .....
2020-06-08 07:07:25
168.90.89.35 attack
Jun  7 23:14:39 ift sshd\[17655\]: Failed password for root from 168.90.89.35 port 55918 ssh2Jun  7 23:17:05 ift sshd\[18242\]: Failed password for root from 168.90.89.35 port 45006 ssh2Jun  7 23:19:22 ift sshd\[18577\]: Failed password for root from 168.90.89.35 port 34051 ssh2Jun  7 23:21:46 ift sshd\[19058\]: Failed password for root from 168.90.89.35 port 51344 ssh2Jun  7 23:24:13 ift sshd\[19315\]: Failed password for root from 168.90.89.35 port 40417 ssh2
...
2020-06-08 07:33:20

最近上报的IP列表

118.172.80.161 133.18.55.151 133.18.55.154 133.18.55.159
133.18.55.172 118.172.80.171 133.18.55.168 133.18.55.176
133.18.55.183 133.18.55.167 133.18.55.185 133.18.55.195
133.18.55.205 118.172.80.173 133.18.57.173 133.18.55.38
133.18.55.242 133.18.55.212 133.18.58.185 118.172.80.185