必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.51.166.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10389
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.51.166.136.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 14:23:05 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
136.166.51.141.in-addr.arpa domain name pointer dma-ps2.mathematik.uni-kassel.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
136.166.51.141.in-addr.arpa	name = dma-ps2.mathematik.uni-kassel.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
197.44.93.82 attackspambots
Unauthorized connection attempt from IP address 197.44.93.82 on Port 445(SMB)
2019-06-23 18:16:59
80.51.81.1 attack
NAME : AIR-NET-CONNECT CIDR : 80.51.81.0/24 DDoS attack Poland - block certain countries :) IP: 80.51.81.1  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-23 18:20:12
23.94.108.112 attackspam
NAME : CC-16 CIDR : 23.94.0.0/15 | STATUS : 200 ROBOT {Looking for resource vulnerabilities} DDoS Attack USA - New York - block certain countries :) IP: 23.94.108.112  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-23 18:43:10
202.79.167.44 attackspam
Unauthorized connection attempt from IP address 202.79.167.44 on Port 445(SMB)
2019-06-23 18:12:41
191.96.133.88 attack
Jun 23 12:01:45 s1 sshd\[14105\]: Invalid user nagios from 191.96.133.88 port 34264
Jun 23 12:01:45 s1 sshd\[14105\]: Failed password for invalid user nagios from 191.96.133.88 port 34264 ssh2
Jun 23 12:04:20 s1 sshd\[15264\]: Invalid user ankesh from 191.96.133.88 port 36388
Jun 23 12:04:20 s1 sshd\[15264\]: Failed password for invalid user ankesh from 191.96.133.88 port 36388 ssh2
Jun 23 12:05:23 s1 sshd\[16028\]: Invalid user njrat from 191.96.133.88 port 48622
Jun 23 12:05:23 s1 sshd\[16028\]: Failed password for invalid user njrat from 191.96.133.88 port 48622 ssh2
...
2019-06-23 18:17:19
201.174.46.234 attack
Jun 23 12:01:31 mail sshd\[26935\]: Invalid user oracle from 201.174.46.234
Jun 23 12:01:31 mail sshd\[26935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.174.46.234
Jun 23 12:01:33 mail sshd\[26935\]: Failed password for invalid user oracle from 201.174.46.234 port 37953 ssh2
Jun 23 12:05:10 mail sshd\[27128\]: Invalid user sshuser from 201.174.46.234
Jun 23 12:05:10 mail sshd\[27128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.174.46.234
2019-06-23 18:27:44
185.220.101.70 attackspambots
2019-06-23T10:04:28.330688abusebot-4.cloudsearch.cf sshd\[4410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.70  user=root
2019-06-23 18:18:25
77.246.188.101 attackspam
77.246.188.101 - - \[23/Jun/2019:12:04:18 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
77.246.188.101 - - \[23/Jun/2019:12:04:18 +0200\] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
77.246.188.101 - - \[23/Jun/2019:12:04:19 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
77.246.188.101 - - \[23/Jun/2019:12:04:19 +0200\] "POST /wp-login.php HTTP/1.1" 200 1607 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
77.246.188.101 - - \[23/Jun/2019:12:04:19 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
77.246.188.101 - - \[23/Jun/2019:12:04:20 +0200\] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:6
2019-06-23 18:40:46
54.38.47.28 attackbots
Invalid user attack from 54.38.47.28 port 42784
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.47.28
Failed password for invalid user attack from 54.38.47.28 port 42784 ssh2
Invalid user imperial from 54.38.47.28 port 52180
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.47.28
2019-06-23 18:22:03
139.199.89.117 attack
Jun 23 02:35:18 ncomp sshd[1693]: Invalid user ftpuser from 139.199.89.117
Jun 23 02:35:18 ncomp sshd[1693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.89.117
Jun 23 02:35:18 ncomp sshd[1693]: Invalid user ftpuser from 139.199.89.117
Jun 23 02:35:20 ncomp sshd[1693]: Failed password for invalid user ftpuser from 139.199.89.117 port 59844 ssh2
2019-06-23 17:58:14
178.33.52.5 attackspambots
178.33.52.5:36920 - - [22/Jun/2019:20:22:21 +0200] "GET //wp/wp-login.php HTTP/1.1" 404 297
2019-06-23 18:44:55
199.249.230.108 attack
2019-06-23T10:05:19.281133abusebot-4.cloudsearch.cf sshd\[4417\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor18.quintex.com  user=root
2019-06-23 18:10:38
51.75.90.236 attack
Automatic report - Web App Attack
2019-06-23 18:14:38
178.62.81.249 attackspam
Jun 23 12:02:23 s1 sshd\[14883\]: Invalid user ciserve from 178.62.81.249 port 45046
Jun 23 12:02:23 s1 sshd\[14883\]: Failed password for invalid user ciserve from 178.62.81.249 port 45046 ssh2
Jun 23 12:04:29 s1 sshd\[15266\]: Invalid user yy from 178.62.81.249 port 40804
Jun 23 12:04:29 s1 sshd\[15266\]: Failed password for invalid user yy from 178.62.81.249 port 40804 ssh2
Jun 23 12:05:39 s1 sshd\[16052\]: Invalid user sylvie from 178.62.81.249 port 54686
Jun 23 12:05:39 s1 sshd\[16052\]: Failed password for invalid user sylvie from 178.62.81.249 port 54686 ssh2
...
2019-06-23 18:13:37
35.237.32.44 attackbotsspam
35.237.32.44 - - \[23/Jun/2019:12:05:28 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
35.237.32.44 - - \[23/Jun/2019:12:05:28 +0200\] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
35.237.32.44 - - \[23/Jun/2019:12:05:29 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
35.237.32.44 - - \[23/Jun/2019:12:05:29 +0200\] "POST /wp-login.php HTTP/1.1" 200 1607 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
35.237.32.44 - - \[23/Jun/2019:12:05:30 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
35.237.32.44 - - \[23/Jun/2019:12:05:30 +0200\] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/
2019-06-23 18:22:27

最近上报的IP列表

97.149.244.153 39.42.216.126 100.26.175.117 212.10.47.188
238.54.123.225 3.169.46.6 230.139.141.200 80.99.187.195
93.89.58.116 26.199.7.4 76.2.37.1 44.157.146.233
29.231.234.104 190.125.234.28 197.134.238.170 214.208.180.15
128.114.119.222 151.192.203.185 251.183.30.100 217.103.50.165