必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.16.194.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59099
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.16.194.64.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 11:48:43 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 64.194.16.141.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 141.16.194.64.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
68.183.136.244 attackbotsspam
2019-07-23T10:23:22.491526abusebot-6.cloudsearch.cf sshd\[2099\]: Invalid user colin from 68.183.136.244 port 46622
2019-07-23 18:42:43
178.62.251.11 attackbots
Jul 23 11:54:13 OPSO sshd\[29364\]: Invalid user py from 178.62.251.11 port 42874
Jul 23 11:54:13 OPSO sshd\[29364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.251.11
Jul 23 11:54:15 OPSO sshd\[29364\]: Failed password for invalid user py from 178.62.251.11 port 42874 ssh2
Jul 23 11:58:40 OPSO sshd\[30131\]: Invalid user c from 178.62.251.11 port 39362
Jul 23 11:58:40 OPSO sshd\[30131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.251.11
2019-07-23 17:59:56
68.183.207.50 attackspambots
Jul 23 09:19:03 localhost sshd\[129643\]: Invalid user rg from 68.183.207.50 port 54892
Jul 23 09:19:03 localhost sshd\[129643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.207.50
Jul 23 09:19:06 localhost sshd\[129643\]: Failed password for invalid user rg from 68.183.207.50 port 54892 ssh2
Jul 23 09:23:36 localhost sshd\[129771\]: Invalid user webserver from 68.183.207.50 port 51558
Jul 23 09:23:36 localhost sshd\[129771\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.207.50
...
2019-07-23 17:40:15
115.84.121.80 attackbotsspam
Jul 23 12:12:55 meumeu sshd[27763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.84.121.80 
Jul 23 12:12:57 meumeu sshd[27763]: Failed password for invalid user dbms from 115.84.121.80 port 35184 ssh2
Jul 23 12:17:37 meumeu sshd[10097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.84.121.80 
...
2019-07-23 18:17:52
185.211.245.198 attack
Jul 23 11:28:24 relay postfix/smtpd\[7730\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 23 11:33:05 relay postfix/smtpd\[9211\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 23 11:33:15 relay postfix/smtpd\[7730\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 23 11:36:31 relay postfix/smtpd\[7730\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 23 11:36:46 relay postfix/smtpd\[9211\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-07-23 17:49:05
94.197.65.180 attack
illegal hidden networks/verizon/8000 series/ mtu 16384
	options=1203
	inet 127.0.0.1 netmask 0xff000000 
	inet6 ::1 prefixlen 128 
	inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1 
	nd6 options=201
gif0: flags=8010 mtu 1280
stf0: flags=0<> mtu 1280
en0: flags=8863 mtu 1500
	ether 7c:04:d0:bb:dc:a6 
	inet6 fe80::1455:1d61:99fb:9eb1%en0 prefixlen 64 secured scopeid 0x4 
	inet 192.168.8.100 netmask 0xffffff00 broadcast 192.168.8.255
	nd6 options=201
	media: autoselect
	status: active
en1: flags=863 mtu 1500
	options=60
	ether 9a:00:0c:64:90:40 
	media: autoselect 
	status: inactive
p2p0: flags=8843 mtu 2304
	ether 0e:04:d0:bb:dc:a6 
	media: autoselect
	status: inactive
awdl0: flags=8943
2019-07-23 18:15:39
112.95.220.235 attackbotsspam
Jul 23 12:16:16 vps691689 sshd[27382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.95.220.235
Jul 23 12:16:18 vps691689 sshd[27382]: Failed password for invalid user raissa from 112.95.220.235 port 56550 ssh2
Jul 23 12:19:12 vps691689 sshd[27390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.95.220.235
...
2019-07-23 18:39:13
35.163.172.93 attackspam
xmlrpc attack
2019-07-23 18:10:20
145.239.76.62 attackbots
Jul 23 12:09:40 SilenceServices sshd[19218]: Failed password for sinusbot from 145.239.76.62 port 38214 ssh2
Jul 23 12:10:19 SilenceServices sshd[19674]: Failed password for sinusbot from 145.239.76.62 port 33748 ssh2
2019-07-23 18:26:55
131.100.219.3 attackspam
Jul 23 11:55:04 rpi sshd[19538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.100.219.3 
Jul 23 11:55:06 rpi sshd[19538]: Failed password for invalid user alfresco from 131.100.219.3 port 42354 ssh2
2019-07-23 18:27:56
211.253.25.21 attackbotsspam
Jul 23 14:54:10 vibhu-HP-Z238-Microtower-Workstation sshd\[3901\]: Invalid user soporte from 211.253.25.21
Jul 23 14:54:10 vibhu-HP-Z238-Microtower-Workstation sshd\[3901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.253.25.21
Jul 23 14:54:12 vibhu-HP-Z238-Microtower-Workstation sshd\[3901\]: Failed password for invalid user soporte from 211.253.25.21 port 39190 ssh2
Jul 23 14:59:25 vibhu-HP-Z238-Microtower-Workstation sshd\[4038\]: Invalid user user from 211.253.25.21
Jul 23 14:59:25 vibhu-HP-Z238-Microtower-Workstation sshd\[4038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.253.25.21
...
2019-07-23 17:43:40
52.201.168.7 attackspambots
Wordpress attack via xmlrpc
2019-07-23 17:50:21
159.65.92.3 attackbots
Jul 23 12:19:13 yabzik sshd[13994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.92.3
Jul 23 12:19:15 yabzik sshd[13994]: Failed password for invalid user tester from 159.65.92.3 port 38074 ssh2
Jul 23 12:23:35 yabzik sshd[15386]: Failed password for root from 159.65.92.3 port 33972 ssh2
2019-07-23 17:41:21
61.161.237.38 attackbotsspam
Jul 23 11:11:36 debian sshd\[25122\]: Invalid user temp1 from 61.161.237.38 port 35236
Jul 23 11:11:36 debian sshd\[25122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.161.237.38
...
2019-07-23 18:22:11
193.70.109.193 attackspambots
Jul 23 05:37:40 vps200512 sshd\[25496\]: Invalid user mxuser from 193.70.109.193
Jul 23 05:37:40 vps200512 sshd\[25496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.109.193
Jul 23 05:37:43 vps200512 sshd\[25496\]: Failed password for invalid user mxuser from 193.70.109.193 port 41794 ssh2
Jul 23 05:44:55 vps200512 sshd\[25765\]: Invalid user frida from 193.70.109.193
Jul 23 05:44:55 vps200512 sshd\[25765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.109.193
2019-07-23 17:50:42

最近上报的IP列表

176.228.148.91 37.234.28.210 32.241.153.7 227.193.60.60
174.241.8.90 139.112.6.247 88.1.138.177 156.64.61.159
107.69.100.177 225.149.111.84 171.184.97.254 8.59.226.150
213.208.242.93 141.13.157.41 40.10.19.238 128.96.145.208
69.242.194.199 238.68.246.138 141.250.15.67 162.51.49.119