必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.242.80.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7136
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;133.242.80.136.			IN	A

;; AUTHORITY SECTION:
.			115	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 108 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 05:47:09 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 136.80.242.133.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 136.80.242.133.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.128.215.16 attackbotsspam
Nov  7 20:15:12 vibhu-HP-Z238-Microtower-Workstation sshd\[2404\]: Invalid user 123ben from 178.128.215.16
Nov  7 20:15:12 vibhu-HP-Z238-Microtower-Workstation sshd\[2404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.215.16
Nov  7 20:15:14 vibhu-HP-Z238-Microtower-Workstation sshd\[2404\]: Failed password for invalid user 123ben from 178.128.215.16 port 47304 ssh2
Nov  7 20:19:20 vibhu-HP-Z238-Microtower-Workstation sshd\[2722\]: Invalid user !QAZxsw2 from 178.128.215.16
Nov  7 20:19:20 vibhu-HP-Z238-Microtower-Workstation sshd\[2722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.215.16
...
2019-11-07 22:49:55
95.52.41.255 attack
Chat Spam
2019-11-07 23:09:15
5.189.162.164 attackspambots
masscan
2019-11-07 23:07:05
140.249.22.238 attackbots
Nov  7 15:48:34 vmanager6029 sshd\[9154\]: Invalid user com from 140.249.22.238 port 44880
Nov  7 15:48:34 vmanager6029 sshd\[9154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.22.238
Nov  7 15:48:36 vmanager6029 sshd\[9154\]: Failed password for invalid user com from 140.249.22.238 port 44880 ssh2
2019-11-07 23:22:03
14.161.16.62 attackspambots
Nov  7 05:01:03 php1 sshd\[1684\]: Invalid user stan from 14.161.16.62
Nov  7 05:01:03 php1 sshd\[1684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.16.62
Nov  7 05:01:05 php1 sshd\[1684\]: Failed password for invalid user stan from 14.161.16.62 port 54780 ssh2
Nov  7 05:05:27 php1 sshd\[2218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.16.62  user=root
Nov  7 05:05:30 php1 sshd\[2218\]: Failed password for root from 14.161.16.62 port 37576 ssh2
2019-11-07 23:25:08
207.180.211.108 attackbots
masscan
2019-11-07 22:44:26
45.125.66.26 attack
\[2019-11-07 09:48:25\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-07T09:48:25.420-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="4739601148236518001",SessionID="0x7fdf2c3f5928",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.26/50616",ACLName="no_extension_match"
\[2019-11-07 09:48:38\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-07T09:48:38.587-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="4405901148825681007",SessionID="0x7fdf2c19f8b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.26/58634",ACLName="no_extension_match"
\[2019-11-07 09:49:16\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-07T09:49:16.321-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="4074401148525260109",SessionID="0x7fdf2cae1298",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.26/58074",ACLNam
2019-11-07 22:53:39
115.159.65.195 attackbotsspam
(sshd) Failed SSH login from 115.159.65.195 (-): 5 in the last 3600 secs
2019-11-07 23:03:04
210.44.1.5 attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-11-07 22:37:07
201.150.5.14 attack
Nov  7 17:48:35 hosting sshd[27318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.150.5.14  user=root
Nov  7 17:48:37 hosting sshd[27318]: Failed password for root from 201.150.5.14 port 36702 ssh2
...
2019-11-07 23:21:47
115.231.231.3 attackbotsspam
Nov  7 15:43:42 srv01 sshd[32142]: Invalid user cp from 115.231.231.3
Nov  7 15:43:42 srv01 sshd[32142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.231.231.3
Nov  7 15:43:42 srv01 sshd[32142]: Invalid user cp from 115.231.231.3
Nov  7 15:43:44 srv01 sshd[32142]: Failed password for invalid user cp from 115.231.231.3 port 58932 ssh2
Nov  7 15:49:15 srv01 sshd[32486]: Invalid user ajketner from 115.231.231.3
...
2019-11-07 22:56:38
115.254.63.52 attackspam
2019-11-07T06:18:11.302507abusebot-6.cloudsearch.cf sshd\[29612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.254.63.52  user=root
2019-11-07 22:40:50
41.164.195.204 attackbots
Nov  7 07:13:15 markkoudstaal sshd[25861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.164.195.204
Nov  7 07:13:17 markkoudstaal sshd[25861]: Failed password for invalid user sanda from 41.164.195.204 port 57326 ssh2
Nov  7 07:18:01 markkoudstaal sshd[26262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.164.195.204
2019-11-07 22:47:13
85.73.105.144 attack
/phpmyadmin/
2019-11-07 22:45:49
119.160.128.54 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/119.160.128.54/ 
 
 BN - 1H : (1)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BN 
 NAME ASN : ASN10094 
 
 IP : 119.160.128.54 
 
 CIDR : 119.160.128.0/24 
 
 PREFIX COUNT : 135 
 
 UNIQUE IP COUNT : 117248 
 
 
 ATTACKS DETECTED ASN10094 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-07 07:18:13 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-07 22:38:01

最近上报的IP列表

118.172.94.175 133.242.83.190 188.43.45.174 133.242.9.26
133.242.81.115 133.242.82.51 133.242.81.144 133.242.82.171
133.242.83.152 133.242.81.80 133.245.227.209 133.242.98.44
118.172.94.202 133.243.243.92 133.254.5.231 133.242.97.233
133.242.98.104 133.28.52.119 133.250.173.162 133.25.90.134