必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.242.58.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56560
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;133.242.58.20.			IN	A

;; AUTHORITY SECTION:
.			157	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 18:06:16 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 20.58.242.133.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.58.242.133.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
37.212.223.232 attackspambots
Lines containing failures of 37.212.223.232
Sep 20 20:18:56 dns01 sshd[22734]: Invalid user admin from 37.212.223.232 port 38075
Sep 20 20:18:56 dns01 sshd[22734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.212.223.232
Sep 20 20:18:59 dns01 sshd[22734]: Failed password for invalid user admin from 37.212.223.232 port 38075 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=37.212.223.232
2019-09-21 03:36:09
218.92.0.155 attackspam
Sep 20 20:59:19 MK-Soft-Root2 sshd\[17723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.155  user=root
Sep 20 20:59:21 MK-Soft-Root2 sshd\[17723\]: Failed password for root from 218.92.0.155 port 3039 ssh2
Sep 20 20:59:24 MK-Soft-Root2 sshd\[17723\]: Failed password for root from 218.92.0.155 port 3039 ssh2
...
2019-09-21 03:33:33
117.84.56.89 attackbots
Sep 20 14:16:33 esmtp postfix/smtpd[20023]: lost connection after AUTH from unknown[117.84.56.89]
Sep 20 14:16:34 esmtp postfix/smtpd[20023]: lost connection after AUTH from unknown[117.84.56.89]
Sep 20 14:16:35 esmtp postfix/smtpd[20023]: lost connection after AUTH from unknown[117.84.56.89]
Sep 20 14:16:37 esmtp postfix/smtpd[20019]: lost connection after AUTH from unknown[117.84.56.89]
Sep 20 14:16:38 esmtp postfix/smtpd[20023]: lost connection after AUTH from unknown[117.84.56.89]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=117.84.56.89
2019-09-21 03:23:46
41.105.83.86 attackbotsspam
Sep 20 20:18:30 nirvana postfix/smtpd[8308]: connect from unknown[41.105.83.86]
Sep 20 20:18:31 nirvana postfix/smtpd[8308]: warning: unknown[41.105.83.86]: SASL CRAM-MD5 authentication failed: authentication failure
Sep 20 20:18:32 nirvana postfix/smtpd[8308]: warning: unknown[41.105.83.86]: SASL PLAIN authentication failed: authentication failure
Sep 20 20:18:32 nirvana postfix/smtpd[8308]: warning: unknown[41.105.83.86]: SASL LOGIN authentication failed: authentication failure
Sep 20 20:18:32 nirvana postfix/smtpd[8308]: lost connection after AUTH from unknown[41.105.83.86]
Sep 20 20:18:32 nirvana postfix/smtpd[8308]: disconnect from unknown[41.105.83.86]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=41.105.83.86
2019-09-21 03:34:58
45.70.3.2 attackspam
Sep 21 00:35:42 areeb-Workstation sshd[24424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.70.3.2
Sep 21 00:35:43 areeb-Workstation sshd[24424]: Failed password for invalid user ie from 45.70.3.2 port 50398 ssh2
...
2019-09-21 03:10:58
14.63.194.162 attack
2019-09-20T20:17:10.565630lon01.zurich-datacenter.net sshd\[1685\]: Invalid user jet from 14.63.194.162 port 57813
2019-09-20T20:17:10.571424lon01.zurich-datacenter.net sshd\[1685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.194.162
2019-09-20T20:17:13.359970lon01.zurich-datacenter.net sshd\[1685\]: Failed password for invalid user jet from 14.63.194.162 port 57813 ssh2
2019-09-20T20:22:07.910355lon01.zurich-datacenter.net sshd\[1781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.194.162  user=root
2019-09-20T20:22:09.806495lon01.zurich-datacenter.net sshd\[1781\]: Failed password for root from 14.63.194.162 port 44620 ssh2
...
2019-09-21 03:08:12
70.37.49.155 attackbotsspam
2019-09-20T19:26:09.847209abusebot-5.cloudsearch.cf sshd\[16835\]: Invalid user stanphill from 70.37.49.155 port 38126
2019-09-21 03:43:28
139.219.137.246 attackspam
Sep 20 20:21:34 [snip] sshd[26177]: Invalid user radio from 139.219.137.246 port 34552
Sep 20 20:21:34 [snip] sshd[26177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.137.246
Sep 20 20:21:37 [snip] sshd[26177]: Failed password for invalid user radio from 139.219.137.246 port 34552 ssh2[...]
2019-09-21 03:32:10
222.186.31.144 attack
2019-09-21T02:17:36.625329enmeeting.mahidol.ac.th sshd\[26022\]: User root from 222.186.31.144 not allowed because not listed in AllowUsers
2019-09-21T02:17:36.978110enmeeting.mahidol.ac.th sshd\[26022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.144  user=root
2019-09-21T02:17:38.553729enmeeting.mahidol.ac.th sshd\[26022\]: Failed password for invalid user root from 222.186.31.144 port 60298 ssh2
...
2019-09-21 03:18:30
150.95.186.200 attackbotsspam
Sep 20 09:06:05 sachi sshd\[1887\]: Invalid user liang from 150.95.186.200
Sep 20 09:06:05 sachi sshd\[1887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v150-95-186-200.a0ed.g.tyo1.static.cnode.io
Sep 20 09:06:07 sachi sshd\[1887\]: Failed password for invalid user liang from 150.95.186.200 port 44980 ssh2
Sep 20 09:10:10 sachi sshd\[2363\]: Invalid user user3 from 150.95.186.200
Sep 20 09:10:10 sachi sshd\[2363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v150-95-186-200.a0ed.g.tyo1.static.cnode.io
2019-09-21 03:20:13
221.227.248.68 attackspam
2019-09-20 21:02:03 dovecot_login authenticator failed for (ofpnPJ) [221.227.248.68]:4120: 535 Incorrect authentication data (set_id=rs)
2019-09-20 21:02:27 dovecot_login authenticator failed for (afAr9Ni) [221.227.248.68]:3518: 535 Incorrect authentication data (set_id=rs)
2019-09-20 21:02:51 dovecot_login authenticator failed for (cmA5eWwvk) [221.227.248.68]:3683: 535 Incorrect authentication data (set_id=rs)
2019-09-20 21:03:19 dovecot_login authenticator failed for (slhiNa) [221.227.248.68]:4734: 535 Incorrect authentication data (set_id=rs)
2019-09-20 21:03:42 dovecot_login authenticator failed for (fhzJDS) [221.227.248.68]:1886: 535 Incorrect authentication data (set_id=rs)
2019-09-20 x@x
2019-09-20 x@x
2019-09-20 x@x
2019-09-20 x@x
2019-09-20 x@x
2019-09-20 x@x
2019-09-20 x@x
2019-09-20 x@x
2019-09-20 x@x
2019-09-20 x@x
2019-09-20 x@x
2019-09-20 x@x
2019-09-20 x@x
2019-09-20 x@x
2019-09-20 x@x

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=221.227.248
2019-09-21 03:19:04
5.39.77.117 attackspambots
2019-09-20T15:07:49.5732691495-001 sshd\[36100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3262586.ip-5-39-77.eu
2019-09-20T15:07:51.0070151495-001 sshd\[36100\]: Failed password for invalid user km from 5.39.77.117 port 48512 ssh2
2019-09-20T15:20:42.2316601495-001 sshd\[36931\]: Invalid user minerva from 5.39.77.117 port 55740
2019-09-20T15:20:42.2390571495-001 sshd\[36931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3262586.ip-5-39-77.eu
2019-09-20T15:20:44.1210371495-001 sshd\[36931\]: Failed password for invalid user minerva from 5.39.77.117 port 55740 ssh2
2019-09-20T15:25:07.7526401495-001 sshd\[37292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3262586.ip-5-39-77.eu  user=root
...
2019-09-21 03:36:45
176.31.211.55 attackbots
Sep 20 21:17:22 SilenceServices sshd[22807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.211.55
Sep 20 21:17:24 SilenceServices sshd[22807]: Failed password for invalid user bodiesel from 176.31.211.55 port 39596 ssh2
Sep 20 21:21:23 SilenceServices sshd[25402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.211.55
2019-09-21 03:34:05
222.186.175.6 attack
Tried sshing with brute force.
2019-09-21 03:07:11
122.252.239.5 attack
Sep 21 00:50:09 areeb-Workstation sshd[25306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.239.5
Sep 21 00:50:11 areeb-Workstation sshd[25306]: Failed password for invalid user landon from 122.252.239.5 port 39308 ssh2
...
2019-09-21 03:32:37

最近上报的IP列表

29.254.41.205 222.137.101.85 118.212.95.24 89.106.98.202
87.245.210.90 70.121.98.242 177.92.132.131 189.210.48.133
23.48.248.245 88.103.227.108 109.165.132.218 58.53.45.241
80.216.149.170 207.130.28.229 52.193.234.143 175.152.108.155
45.190.149.252 103.87.168.205 110.52.195.4 115.97.142.86