必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.83.220.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23809
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.83.220.215.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 22:53:36 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
b'Host 215.220.83.136.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 136.83.220.215.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
177.207.251.18 attack
May 25 13:23:39 *** sshd[5687]: User root from 177.207.251.18 not allowed because not listed in AllowUsers
2020-05-25 23:14:18
150.109.34.190 attackspambots
odoo8
...
2020-05-25 22:41:43
51.254.114.105 attackbots
May 25 13:26:47 game-panel sshd[29951]: Failed password for root from 51.254.114.105 port 34887 ssh2
May 25 13:31:04 game-panel sshd[30143]: Failed password for root from 51.254.114.105 port 54829 ssh2
2020-05-25 22:36:31
112.85.42.172 attackspambots
May 25 17:13:06 * sshd[22467]: Failed password for root from 112.85.42.172 port 63666 ssh2
May 25 17:13:10 * sshd[22467]: Failed password for root from 112.85.42.172 port 63666 ssh2
2020-05-25 23:14:59
190.205.34.229 attackspam
serveres are UTC -0400
Lines containing failures of 190.205.34.229
May 25 09:57:22 tux2 sshd[24310]: Invalid user katharina from 190.205.34.229 port 38760
May 25 09:57:22 tux2 sshd[24310]: Failed password for invalid user katharina from 190.205.34.229 port 38760 ssh2
May 25 09:57:22 tux2 sshd[24310]: Received disconnect from 190.205.34.229 port 38760:11: Bye Bye [preauth]
May 25 09:57:22 tux2 sshd[24310]: Disconnected from invalid user katharina 190.205.34.229 port 38760 [preauth]
May 25 10:04:53 tux2 sshd[24796]: Failed password for r.r from 190.205.34.229 port 58234 ssh2
May 25 10:04:53 tux2 sshd[24796]: Received disconnect from 190.205.34.229 port 58234:11: Bye Bye [preauth]
May 25 10:04:53 tux2 sshd[24796]: Disconnected from authenticating user r.r 190.205.34.229 port 58234 [preauth]
May 25 10:08:57 tux2 sshd[25048]: Failed password for r.r from 190.205.34.229 port 59081 ssh2
May 25 10:08:57 tux2 sshd[25048]: Received disconnect from 190.205.34.229 port 59081:11: Bye........
------------------------------
2020-05-25 22:38:35
212.129.242.171 attackspam
May 25 14:15:30 PorscheCustomer sshd[20574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.242.171
May 25 14:15:32 PorscheCustomer sshd[20574]: Failed password for invalid user esbee from 212.129.242.171 port 55056 ssh2
May 25 14:20:00 PorscheCustomer sshd[20671]: Failed password for root from 212.129.242.171 port 52658 ssh2
...
2020-05-25 23:02:37
123.206.30.76 attack
2020-05-25T14:31:17.654282homeassistant sshd[17113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.30.76  user=root
2020-05-25T14:31:19.557094homeassistant sshd[17113]: Failed password for root from 123.206.30.76 port 55268 ssh2
...
2020-05-25 22:37:55
142.93.235.47 attack
Failed password for invalid user svn from 142.93.235.47 port 40852 ssh2
2020-05-25 22:59:47
77.87.100.22 attackspam
 TCP (SYN) 77.87.100.22:50940 -> port 445, len 52
2020-05-25 22:42:03
141.98.9.137 attack
May 25 12:03:56 firewall sshd[20621]: Invalid user operator from 141.98.9.137
May 25 12:03:58 firewall sshd[20621]: Failed password for invalid user operator from 141.98.9.137 port 54316 ssh2
May 25 12:04:31 firewall sshd[20704]: Invalid user support from 141.98.9.137
...
2020-05-25 23:11:57
151.21.141.184 attackbots
Unauthorized connection attempt from IP address 151.21.141.184 on Port 445(SMB)
2020-05-25 23:08:43
188.128.39.113 attack
May 25 08:32:58 ny01 sshd[25985]: Failed password for root from 188.128.39.113 port 41614 ssh2
May 25 08:37:10 ny01 sshd[26492]: Failed password for root from 188.128.39.113 port 47390 ssh2
2020-05-25 23:04:21
42.81.160.213 attackspam
May 25 16:53:17 ift sshd\[56185\]: Failed password for root from 42.81.160.213 port 57460 ssh2May 25 16:57:21 ift sshd\[56670\]: Invalid user sshuser from 42.81.160.213May 25 16:57:22 ift sshd\[56670\]: Failed password for invalid user sshuser from 42.81.160.213 port 48158 ssh2May 25 17:01:38 ift sshd\[57491\]: Invalid user tom from 42.81.160.213May 25 17:01:39 ift sshd\[57491\]: Failed password for invalid user tom from 42.81.160.213 port 38880 ssh2
...
2020-05-25 23:03:30
159.89.171.121 attackbotsspam
May 25 17:46:06 lukav-desktop sshd\[11932\]: Invalid user infinity from 159.89.171.121
May 25 17:46:06 lukav-desktop sshd\[11932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.171.121
May 25 17:46:08 lukav-desktop sshd\[11932\]: Failed password for invalid user infinity from 159.89.171.121 port 42960 ssh2
May 25 17:49:21 lukav-desktop sshd\[11975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.171.121  user=root
May 25 17:49:23 lukav-desktop sshd\[11975\]: Failed password for root from 159.89.171.121 port 33404 ssh2
2020-05-25 22:56:09
36.108.168.81 attackbotsspam
May 25 13:58:46 MainVPS sshd[19417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.108.168.81  user=root
May 25 13:58:48 MainVPS sshd[19417]: Failed password for root from 36.108.168.81 port 11757 ssh2
May 25 14:01:58 MainVPS sshd[21832]: Invalid user fog from 36.108.168.81 port 55493
May 25 14:01:58 MainVPS sshd[21832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.108.168.81
May 25 14:01:58 MainVPS sshd[21832]: Invalid user fog from 36.108.168.81 port 55493
May 25 14:02:00 MainVPS sshd[21832]: Failed password for invalid user fog from 36.108.168.81 port 55493 ssh2
...
2020-05-25 23:01:12

最近上报的IP列表

117.252.135.157 154.178.214.102 135.91.246.216 81.65.155.155
178.138.241.87 62.84.33.230 39.128.139.215 236.26.35.107
199.134.251.206 198.5.11.79 125.125.174.97 34.47.113.77
151.101.248.70 117.244.174.169 166.30.120.215 244.201.209.46
146.136.194.131 67.184.143.111 186.23.181.89 32.241.28.110