必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.168.4.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58792
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.168.4.53.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 21:00:19 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 53.4.168.137.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 53.4.168.137.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
49.149.99.98 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 18-02-2020 13:25:11.
2020-02-18 23:42:54
190.82.102.222 attackspam
Port probing on unauthorized port 445
2020-02-18 23:21:22
49.234.124.167 attackspambots
Lines containing failures of 49.234.124.167
Feb 18 13:55:46 shared04 sshd[14669]: Invalid user ftpuser from 49.234.124.167 port 49078
Feb 18 13:55:46 shared04 sshd[14669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.124.167
Feb 18 13:55:48 shared04 sshd[14669]: Failed password for invalid user ftpuser from 49.234.124.167 port 49078 ssh2
Feb 18 13:55:49 shared04 sshd[14669]: Received disconnect from 49.234.124.167 port 49078:11: Bye Bye [preauth]
Feb 18 13:55:49 shared04 sshd[14669]: Disconnected from invalid user ftpuser 49.234.124.167 port 49078 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.234.124.167
2020-02-18 23:30:38
185.200.118.72 attack
firewall-block, port(s): 1723/tcp
2020-02-18 23:22:54
188.124.36.4 attack
Brute forcing RDP port 3389
2020-02-18 23:58:55
79.32.207.93 attackspambots
Feb 18 04:07:58 tdfoods sshd\[14029\]: Invalid user topic from 79.32.207.93
Feb 18 04:07:58 tdfoods sshd\[14029\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host93-207-dynamic.32-79-r.retail.telecomitalia.it
Feb 18 04:08:00 tdfoods sshd\[14029\]: Failed password for invalid user topic from 79.32.207.93 port 36660 ssh2
Feb 18 04:11:58 tdfoods sshd\[14436\]: Invalid user nagios from 79.32.207.93
Feb 18 04:11:58 tdfoods sshd\[14436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host93-207-dynamic.32-79-r.retail.telecomitalia.it
2020-02-19 00:07:49
222.186.180.223 attack
Feb 18 10:34:27 NPSTNNYC01T sshd[27954]: Failed password for root from 222.186.180.223 port 57640 ssh2
Feb 18 10:34:41 NPSTNNYC01T sshd[27954]: error: maximum authentication attempts exceeded for root from 222.186.180.223 port 57640 ssh2 [preauth]
Feb 18 10:34:49 NPSTNNYC01T sshd[27959]: Failed password for root from 222.186.180.223 port 62316 ssh2
...
2020-02-18 23:35:39
124.29.236.163 attack
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.29.236.163 
Failed password for invalid user fluffy from 124.29.236.163 port 34602 ssh2
Failed password for root from 124.29.236.163 port 49326 ssh2
2020-02-18 23:55:18
5.188.41.113 attackspam
Feb 17 23:18:21 server sshd\[17693\]: Invalid user petru from 5.188.41.113
Feb 17 23:18:21 server sshd\[17693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.188.41.113 
Feb 17 23:18:24 server sshd\[17693\]: Failed password for invalid user petru from 5.188.41.113 port 59918 ssh2
Feb 18 17:44:13 server sshd\[3405\]: Invalid user ftpuser from 5.188.41.113
Feb 18 17:44:13 server sshd\[3405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.188.41.113 
...
2020-02-18 23:34:40
177.23.107.26 attackspam
Port probing on unauthorized port 26
2020-02-18 23:33:50
103.117.153.16 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 23:29:47
117.3.46.25 attack
117.3.46.25 - - [18/Feb/2020:13:25:00 +0000] "POST /wp-login.php HTTP/1.1" 200 5722 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
117.3.46.25 - - [18/Feb/2020:13:25:10 +0000] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-02-18 23:42:14
179.162.130.17 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 18-02-2020 13:25:10.
2020-02-18 23:44:36
112.85.42.94 attackspam
Feb 18 15:10:03 game-panel sshd[32527]: Failed password for root from 112.85.42.94 port 59351 ssh2
Feb 18 15:10:06 game-panel sshd[32527]: Failed password for root from 112.85.42.94 port 59351 ssh2
Feb 18 15:10:08 game-panel sshd[32527]: Failed password for root from 112.85.42.94 port 59351 ssh2
2020-02-18 23:49:06
190.111.14.58 attack
Feb 18 14:49:03 Invalid user testuser from 190.111.14.58 port 29025
2020-02-19 00:01:46

最近上报的IP列表

65.221.215.140 116.62.174.136 7.107.149.221 178.40.73.33
192.217.196.20 175.116.132.58 213.219.225.145 34.179.183.213
164.34.235.116 71.112.88.70 179.65.192.75 151.34.143.65
234.71.35.149 86.31.100.191 227.84.83.81 12.134.141.8
248.113.76.44 74.217.38.178 64.52.240.184 131.79.241.27