必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Jakarta

省份(region): Jakarta Raya

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
139.192.59.25 attack
TCP Port: 25 _    invalid blocked abuseat-org zen-spamhaus _  _  _ _ (770)
2019-09-08 20:19:04
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.192.5.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34546
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.192.5.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 18:44:49 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 145.5.192.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.5.192.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
52.187.149.158 attackbotsspam
28.11.2019 07:28:45 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2019-11-28 16:10:32
222.186.173.226 attack
Nov 28 12:42:25 gw1 sshd[21257]: Failed password for root from 222.186.173.226 port 61424 ssh2
Nov 28 12:42:37 gw1 sshd[21257]: error: maximum authentication attempts exceeded for root from 222.186.173.226 port 61424 ssh2 [preauth]
...
2019-11-28 15:48:27
183.136.179.83 botsattack
七牛云暴力爬取啊。。刚设置了cdn就以每秒钟十几条的速度爬取同一个网址
180.163.190.214 - - [28/Nov/2019:15:54:50 +0800] "GET /check-ip/127.0.0.1 HTTP/1.1" 200 96836 "-" "Q-uc-client"
183.136.179.83 - - [28/Nov/2019:15:54:50 +0800] "GET /check-ip/127.0.0.1 HTTP/1.1" 200 96601 "-" "Q-uc-client"
180.163.190.193 - - [28/Nov/2019:15:54:50 +0800] "GET /check-ip/127.0.0.1 HTTP/1.1" 200 94116 "-" "Q-uc-client"
180.163.190.236 - - [28/Nov/2019:15:54:50 +0800] "GET /check-ip/127.0.0.1 HTTP/1.1" 200 96704 "-" "Fusion-fuc-client"
180.163.190.236 - - [28/Nov/2019:15:54:51 +0800] "GET /check-ip/127.0.0.1 HTTP/1.1" 200 89865 "-" "Q-uc-client"
183.136.179.87 - - [28/Nov/2019:15:54:51 +0800] "GET /check-ip/127.0.0.1 HTTP/1.1" 200 94388 "-" "Fusion-fuc-client"
183.136.179.81 - - [28/Nov/2019:15:54:51 +0800] "GET /check-ip/127.0.0.1 HTTP/1.1" 200 96824 "-" "Q-uc-client"
183.136.179.77 - - [28/Nov/2019:15:54:51 +0800] "GET /check-ip/127.0.0.1 HTTP/1.1" 200 95687 "-" "Q-uc-client"
183.136.179.87 - - [28/Nov/2019:15:54:51 +0800] "GET /check-ip/127.0.0.1 HTTP/1.1" 200 96255 "-" "Q-uc-client"
183.136.179.87 - - [28/Nov/2019:15:54:52 +0800] "GET /check-ip/127.0.0.1 HTTP/1.1" 200 95982 "-" "Q-uc-client"
180.163.190.214 - - [28/Nov/2019:15:54:53 +0800] "GET /check-ip/127.0.0.1 HTTP/1.1" 200 93070 "-" "Q-uc-client"
183.136.179.73 - - [28/Nov/2019:15:54:53 +0800] "GET /check-ip/127.0.0.1 HTTP/1.1" 200 57097 "-" "Q-uc-client"
183.136.179.70 - - [28/Nov/2019:15:54:53 +0800] "GET /check-ip/127.0.0.1 HTTP/1.1" 200 44809 "-" "Q-uc-client"
2019-11-28 15:56:30
61.133.133.207 attackbots
Invalid user sks from 61.133.133.207 port 52943
2019-11-28 16:12:25
175.211.116.230 attackspam
Nov 28 04:48:18 vps46666688 sshd[11055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.211.116.230
Nov 28 04:48:19 vps46666688 sshd[11055]: Failed password for invalid user ftpuser from 175.211.116.230 port 40202 ssh2
...
2019-11-28 16:03:16
113.183.132.155 attack
Unauthorised access (Nov 28) SRC=113.183.132.155 LEN=52 TTL=119 ID=9509 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov 28) SRC=113.183.132.155 LEN=52 TTL=119 ID=14788 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-28 16:14:37
201.171.157.214 attackbotsspam
Automatic report - Port Scan Attack
2019-11-28 15:52:51
27.64.96.178 attack
2019-11-03 03:12:53,143 fail2ban.actions        [818]: NOTICE  [sshd] Ban 27.64.96.178
2019-11-04 08:20:10,355 fail2ban.actions        [818]: NOTICE  [sshd] Ban 27.64.96.178
2019-11-05 08:37:26,817 fail2ban.actions        [818]: NOTICE  [sshd] Ban 27.64.96.178
...
2019-11-28 15:52:09
182.61.50.189 attackbotsspam
Nov 28 08:57:31 vps666546 sshd\[6171\]: Invalid user rebecca from 182.61.50.189 port 39166
Nov 28 08:57:31 vps666546 sshd\[6171\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.50.189
Nov 28 08:57:33 vps666546 sshd\[6171\]: Failed password for invalid user rebecca from 182.61.50.189 port 39166 ssh2
Nov 28 09:05:47 vps666546 sshd\[6270\]: Invalid user hailstone from 182.61.50.189 port 46384
Nov 28 09:05:47 vps666546 sshd\[6270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.50.189
...
2019-11-28 16:18:36
218.92.0.141 attackbots
SSH Bruteforce attempt
2019-11-28 16:16:04
193.112.164.113 attackbots
Nov 28 10:08:45 sauna sshd[66485]: Failed password for root from 193.112.164.113 port 53758 ssh2
Nov 28 10:15:54 sauna sshd[66663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.164.113
...
2019-11-28 16:24:38
59.149.237.145 attackbots
Nov 28 09:02:50 vps647732 sshd[10058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.149.237.145
Nov 28 09:02:52 vps647732 sshd[10058]: Failed password for invalid user verville from 59.149.237.145 port 35445 ssh2
...
2019-11-28 16:17:09
181.164.1.17 attackspam
$f2bV_matches
2019-11-28 15:53:26
3.94.138.106 attackspam
Nov 28 08:18:38 thevastnessof sshd[12173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.94.138.106
...
2019-11-28 16:23:12
125.89.64.157 attack
scan z
2019-11-28 16:25:08

最近上报的IP列表

19.236.191.179 24.36.115.33 254.181.37.24 253.214.29.145
49.60.245.58 16.138.64.146 228.4.88.245 9.36.238.248
201.61.142.135 144.114.250.7 168.155.157.98 188.48.98.172
207.223.123.10 223.125.215.11 17.108.100.44 39.94.115.60
132.84.166.88 123.108.87.48 6.66.117.184 187.74.106.87