必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): SURFnet bv

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.231.195.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2811
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;136.231.195.132.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082100 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Aug 22 00:11:31 CST 2019
;; MSG SIZE  rcvd: 119
HOST信息:
Host 132.195.231.136.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 132.195.231.136.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.175.163 attackspam
Feb  1 00:03:27 MK-Soft-VM7 sshd[1376]: Failed password for root from 222.186.175.163 port 5380 ssh2
Feb  1 00:03:32 MK-Soft-VM7 sshd[1376]: Failed password for root from 222.186.175.163 port 5380 ssh2
...
2020-02-01 07:06:44
190.107.246.6 attackspam
Automatic report - Port Scan Attack
2020-02-01 06:40:37
51.77.212.179 attackspambots
Invalid user takeuchi from 51.77.212.179 port 39662
2020-02-01 07:11:33
125.91.112.127 attackspam
Unauthorized connection attempt detected from IP address 125.91.112.127 to port 2220 [J]
2020-02-01 07:01:00
185.143.223.168 attackbotsspam
Jan 31 22:34:29 grey postfix/smtpd\[15561\]: NOQUEUE: reject: RCPT from unknown\[185.143.223.168\]: 554 5.7.1 Service unavailable\; Client host \[185.143.223.168\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[185.143.223.168\]\; from=\ to=\ proto=ESMTP helo=\<\[185.143.223.160\]\>Jan 31 22:34:29 grey postfix/smtpd\[15561\]: NOQUEUE: reject: RCPT from unknown\[185.143.223.168\]: 554 5.7.1 Service unavailable\; Client host \[185.143.223.168\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[185.143.223.168\]\; from=\ to=\ proto=ESMTP helo=\<\[185.143.223.160\]\>Jan 31 22:34:29 grey postfix/smtpd\[15561\]: NOQUEUE: reject: RCPT from unknown\[185.143.223.168\]: 554 5.7.1 Service unavailable\; Client host \[185.143.223.168\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[185.143.223.168\]\; from=\
2020-02-01 06:51:53
200.109.6.142 attackspambots
1433/tcp 1433/tcp
[2020-01-31]2pkt
2020-02-01 07:08:54
162.243.129.111 attack
Fail2Ban Ban Triggered
2020-02-01 07:19:19
59.152.196.154 attack
Jan 31 23:50:59 OPSO sshd\[29908\]: Invalid user testuser from 59.152.196.154 port 37785
Jan 31 23:50:59 OPSO sshd\[29908\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.152.196.154
Jan 31 23:51:00 OPSO sshd\[29908\]: Failed password for invalid user testuser from 59.152.196.154 port 37785 ssh2
Jan 31 23:54:08 OPSO sshd\[30178\]: Invalid user postgres from 59.152.196.154 port 46741
Jan 31 23:54:08 OPSO sshd\[30178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.152.196.154
2020-02-01 07:08:01
124.156.62.116 attack
1935/tcp 2376/tcp 1001/tcp...
[2020-01-12/31]6pkt,6pt.(tcp)
2020-02-01 06:55:02
178.211.51.222 attackbots
Trying ports that it shouldn't be.
2020-02-01 06:49:06
106.12.34.56 attackspam
Jan 31 19:37:46 firewall sshd[12148]: Invalid user 123asd from 106.12.34.56
Jan 31 19:37:49 firewall sshd[12148]: Failed password for invalid user 123asd from 106.12.34.56 port 34884 ssh2
Jan 31 19:41:20 firewall sshd[12358]: Invalid user user1 from 106.12.34.56
...
2020-02-01 06:52:52
110.249.192.37 attackbots
1433/tcp
[2020-01-31]1pkt
2020-02-01 07:05:20
92.118.38.56 attack
2020-01-31 23:46:24 dovecot_login authenticator failed for \(User\) \[92.118.38.56\]: 535 Incorrect authentication data
2020-01-31 23:51:55 dovecot_login authenticator failed for \(User\) \[92.118.38.56\]: 535 Incorrect authentication data \(set_id=memcahe@no-server.de\)
2020-01-31 23:51:56 dovecot_login authenticator failed for \(User\) \[92.118.38.56\]: 535 Incorrect authentication data \(set_id=memcahe@no-server.de\)
2020-01-31 23:52:01 dovecot_login authenticator failed for \(User\) \[92.118.38.56\]: 535 Incorrect authentication data \(set_id=memcahe@no-server.de\)
2020-01-31 23:52:04 dovecot_login authenticator failed for \(User\) \[92.118.38.56\]: 535 Incorrect authentication data \(set_id=memcahe@no-server.de\)
...
2020-02-01 06:59:55
112.85.42.174 attack
Jan 31 12:51:01 php1 sshd\[28078\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
Jan 31 12:51:03 php1 sshd\[28078\]: Failed password for root from 112.85.42.174 port 25125 ssh2
Jan 31 12:51:19 php1 sshd\[28113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
Jan 31 12:51:20 php1 sshd\[28113\]: Failed password for root from 112.85.42.174 port 55505 ssh2
Jan 31 12:51:41 php1 sshd\[28136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
2020-02-01 07:04:53
161.129.66.236 attackspam
0,37-14/08 [bc01/m08] PostRequest-Spammer scoring: brussels
2020-02-01 07:09:22

最近上报的IP列表

178.183.132.169 165.194.238.229 76.233.223.179 84.255.112.96
57.13.52.7 188.251.9.136 189.17.247.76 80.25.15.52
188.36.156.14 203.241.254.2 214.172.111.167 129.130.199.201
89.130.158.174 196.184.80.201 14.102.126.65 187.133.138.65
3.134.196.213 109.232.177.235 138.26.18.8 142.136.50.91