必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Jakarta

省份(region): Jakarta Raya

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
139.192.59.25 attack
TCP Port: 25 _    invalid blocked abuseat-org zen-spamhaus _  _  _ _ (770)
2019-09-08 20:19:04
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.192.5.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34546
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.192.5.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 18:44:49 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 145.5.192.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.5.192.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
80.244.179.6 attack
Nov 13 09:02:39 server sshd\[27702\]: Invalid user swenja from 80.244.179.6 port 42726
Nov 13 09:02:39 server sshd\[27702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.244.179.6
Nov 13 09:02:41 server sshd\[27702\]: Failed password for invalid user swenja from 80.244.179.6 port 42726 ssh2
Nov 13 09:06:58 server sshd\[7432\]: Invalid user panu from 80.244.179.6 port 48014
Nov 13 09:06:58 server sshd\[7432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.244.179.6
2019-11-13 16:22:02
185.116.254.18 attackspam
postfix (unknown user, SPF fail or relay access denied)
2019-11-13 16:56:57
171.224.177.214 attackspam
Postfix RBL failed
2019-11-13 16:42:27
177.2.57.42 attackspambots
Automatic report - Port Scan Attack
2019-11-13 16:59:27
123.16.22.51 attackspam
Lines containing failures of 123.16.22.51
Oct 17 17:37:25 server-name sshd[5970]: Invalid user accept from 123.16.22.51 port 50840
Oct 17 17:37:25 server-name sshd[5970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.16.22.51 
Oct 17 17:37:28 server-name sshd[5970]: Failed password for invalid user accept from 123.16.22.51 port 50840 ssh2
Oct 17 17:37:30 server-name sshd[5970]: Connection closed by invalid user accept 123.16.22.51 port 50840 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=123.16.22.51
2019-11-13 16:33:35
197.210.114.42 attackbots
Lines containing failures of 197.210.114.42
Oct 17 17:36:01 server-name sshd[5815]: Invalid user admin from 197.210.114.42 port 39552
Oct 17 17:36:02 server-name sshd[5815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.210.114.42 
Oct 17 17:36:04 server-name sshd[5815]: Failed password for invalid user admin from 197.210.114.42 port 39552 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=197.210.114.42
2019-11-13 16:29:30
111.199.20.36 attackbotsspam
Lines containing failures of 111.199.20.36
Oct  1 13:54:06 server-name sshd[9266]: Invalid user wnn from 111.199.20.36 port 43622
Oct  1 13:54:06 server-name sshd[9266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.199.20.36 
Oct  1 13:54:09 server-name sshd[9266]: Failed password for invalid user wnn from 111.199.20.36 port 43622 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=111.199.20.36
2019-11-13 16:25:07
77.232.128.87 attack
Nov 12 22:03:57 kapalua sshd\[24342\]: Invalid user cyril from 77.232.128.87
Nov 12 22:03:57 kapalua sshd\[24342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=voip.bks-tv.ru
Nov 12 22:03:59 kapalua sshd\[24342\]: Failed password for invalid user cyril from 77.232.128.87 port 37926 ssh2
Nov 12 22:13:47 kapalua sshd\[25191\]: Invalid user www from 77.232.128.87
Nov 12 22:13:47 kapalua sshd\[25191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=voip.bks-tv.ru
2019-11-13 16:56:42
200.205.202.35 attack
Nov 13 12:37:05 gw1 sshd[9163]: Failed password for root from 200.205.202.35 port 38996 ssh2
...
2019-11-13 16:26:13
60.54.114.211 attackbots
Unauthorised access (Nov 13) SRC=60.54.114.211 LEN=44 TTL=53 ID=11548 TCP DPT=23 WINDOW=13748 SYN
2019-11-13 16:42:50
14.231.216.73 attack
Lines containing failures of 14.231.216.73
Oct 17 17:27:42 server-name sshd[4856]: User r.r from 14.231.216.73 not allowed because not listed in AllowUsers
Oct 17 17:27:43 server-name sshd[4856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.231.216.73  user=r.r
Oct 17 17:27:45 server-name sshd[4856]: Failed password for invalid user r.r from 14.231.216.73 port 63350 ssh2
Oct 17 17:27:47 server-name sshd[4856]: Connection closed by invalid user r.r 14.231.216.73 port 63350 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.231.216.73
2019-11-13 16:26:59
111.231.89.162 attackbots
2019-11-13T03:27:58.5134791495-001 sshd\[34936\]: Invalid user govier from 111.231.89.162 port 49270
2019-11-13T03:27:58.5237501495-001 sshd\[34936\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.89.162
2019-11-13T03:28:00.3852801495-001 sshd\[34936\]: Failed password for invalid user govier from 111.231.89.162 port 49270 ssh2
2019-11-13T03:32:28.8566731495-001 sshd\[35113\]: Invalid user node from 111.231.89.162 port 57094
2019-11-13T03:32:28.8651911495-001 sshd\[35113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.89.162
2019-11-13T03:32:30.4605381495-001 sshd\[35113\]: Failed password for invalid user node from 111.231.89.162 port 57094 ssh2
...
2019-11-13 16:51:34
61.133.232.249 attackbotsspam
2019-11-13T06:27:36.643867abusebot-5.cloudsearch.cf sshd\[22614\]: Invalid user home from 61.133.232.249 port 12406
2019-11-13 16:34:22
106.54.221.148 attack
*Port Scan* detected from 106.54.221.148 (CN/China/-). 7 hits in the last 126 seconds
2019-11-13 16:36:55
177.149.86.228 attackspam
" "
2019-11-13 16:57:17

最近上报的IP列表

19.236.191.179 24.36.115.33 254.181.37.24 253.214.29.145
49.60.245.58 16.138.64.146 228.4.88.245 9.36.238.248
201.61.142.135 144.114.250.7 168.155.157.98 188.48.98.172
207.223.123.10 223.125.215.11 17.108.100.44 39.94.115.60
132.84.166.88 123.108.87.48 6.66.117.184 187.74.106.87