必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.91.129.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47124
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;141.91.129.119.			IN	A

;; AUTHORITY SECTION:
.			135	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020701 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 08 08:26:04 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
Host 119.129.91.141.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 119.129.91.141.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
23.129.64.153 attack
Oct 18 00:23:11 rotator sshd\[3555\]: Failed password for root from 23.129.64.153 port 45050 ssh2Oct 18 00:23:14 rotator sshd\[3555\]: Failed password for root from 23.129.64.153 port 45050 ssh2Oct 18 00:23:17 rotator sshd\[3555\]: Failed password for root from 23.129.64.153 port 45050 ssh2Oct 18 00:23:20 rotator sshd\[3555\]: Failed password for root from 23.129.64.153 port 45050 ssh2Oct 18 00:23:23 rotator sshd\[3555\]: Failed password for root from 23.129.64.153 port 45050 ssh2Oct 18 00:23:26 rotator sshd\[3555\]: Failed password for root from 23.129.64.153 port 45050 ssh2
...
2019-10-18 06:39:16
201.174.184.2 attackspambots
Nov 20 17:46:48 odroid64 sshd\[17383\]: Invalid user afirouz from 201.174.184.2
Nov 20 17:46:48 odroid64 sshd\[17383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.174.184.2
Nov 20 17:46:49 odroid64 sshd\[17383\]: Failed password for invalid user afirouz from 201.174.184.2 port 48885 ssh2
...
2019-10-18 06:42:51
201.182.221.252 attackbots
Apr  2 13:37:36 odroid64 sshd\[8537\]: User root from 201.182.221.252 not allowed because not listed in AllowUsers
Apr  2 13:37:36 odroid64 sshd\[8537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.182.221.252  user=root
Apr  2 13:37:38 odroid64 sshd\[8537\]: Failed password for invalid user root from 201.182.221.252 port 48014 ssh2
...
2019-10-18 06:33:20
201.20.104.231 attack
Jan 20 16:51:25 odroid64 sshd\[30217\]: Invalid user newadmin from 201.20.104.231
Jan 20 16:51:25 odroid64 sshd\[30217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.20.104.231
Jan 20 16:51:27 odroid64 sshd\[30217\]: Failed password for invalid user newadmin from 201.20.104.231 port 33790 ssh2
Jan 23 00:55:59 odroid64 sshd\[4828\]: Invalid user sunny from 201.20.104.231
Jan 23 00:55:59 odroid64 sshd\[4828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.20.104.231
Jan 23 00:56:01 odroid64 sshd\[4828\]: Failed password for invalid user sunny from 201.20.104.231 port 39286 ssh2
...
2019-10-18 06:19:35
85.167.58.102 attackspam
Oct 17 12:36:42 hanapaa sshd\[7195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ti0020a400-2140.bb.online.no  user=root
Oct 17 12:36:45 hanapaa sshd\[7195\]: Failed password for root from 85.167.58.102 port 43364 ssh2
Oct 17 12:43:43 hanapaa sshd\[7877\]: Invalid user deploy from 85.167.58.102
Oct 17 12:43:43 hanapaa sshd\[7877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ti0020a400-2140.bb.online.no
Oct 17 12:43:45 hanapaa sshd\[7877\]: Failed password for invalid user deploy from 85.167.58.102 port 54936 ssh2
2019-10-18 06:55:39
64.17.42.224 attack
Lines containing failures of 64.17.42.224
Oct 17 21:40:45 server01 postfix/smtpd[4735]: connect from emv31.eistnesieu.com[64.17.42.224]
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct 17 21:40:46 server01 postfix/smtpd[4735]: disconnect from emv31.eistnesieu.com[64.17.42.224]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=64.17.42.224
2019-10-18 06:39:35
92.242.240.17 attack
Oct 17 21:50:47 vpn01 sshd[30484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.242.240.17
Oct 17 21:50:49 vpn01 sshd[30484]: Failed password for invalid user webdata from 92.242.240.17 port 51052 ssh2
...
2019-10-18 06:24:53
58.227.42.80 attackbots
Oct 14 17:43:56 newdogma sshd[9079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.227.42.80  user=r.r
Oct 14 17:43:58 newdogma sshd[9079]: Failed password for r.r from 58.227.42.80 port 50834 ssh2
Oct 14 17:43:58 newdogma sshd[9079]: Received disconnect from 58.227.42.80 port 50834:11: Bye Bye [preauth]
Oct 14 17:43:58 newdogma sshd[9079]: Disconnected from 58.227.42.80 port 50834 [preauth]
Oct 14 18:07:20 newdogma sshd[9237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.227.42.80  user=r.r
Oct 14 18:07:22 newdogma sshd[9237]: Failed password for r.r from 58.227.42.80 port 39628 ssh2
Oct 14 18:07:22 newdogma sshd[9237]: Received disconnect from 58.227.42.80 port 39628:11: Bye Bye [preauth]
Oct 14 18:07:22 newdogma sshd[9237]: Disconnected from 58.227.42.80 port 39628 [preauth]
Oct 14 18:13:02 newdogma sshd[9333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ........
-------------------------------
2019-10-18 06:44:32
201.166.145.140 attackspam
May 11 11:05:36 odroid64 sshd\[16842\]: Invalid user guest from 201.166.145.140
May 11 11:05:36 odroid64 sshd\[16842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.166.145.140
May 11 11:05:38 odroid64 sshd\[16842\]: Failed password for invalid user guest from 201.166.145.140 port 23560 ssh2
Jun  7 16:09:42 odroid64 sshd\[28304\]: User root from 201.166.145.140 not allowed because not listed in AllowUsers
Jun  7 16:09:42 odroid64 sshd\[28304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.166.145.140  user=root
Jun  7 16:09:45 odroid64 sshd\[28304\]: Failed password for invalid user root from 201.166.145.140 port 13576 ssh2
...
2019-10-18 06:52:17
217.182.172.204 attack
Oct 18 04:55:26 webhost01 sshd[11979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.172.204
Oct 18 04:55:28 webhost01 sshd[11979]: Failed password for invalid user aleksander from 217.182.172.204 port 47638 ssh2
...
2019-10-18 06:18:38
49.88.112.116 attackspambots
SSH-BruteForce
2019-10-18 06:40:47
222.186.190.2 attackspam
Oct 18 01:34:27 server sshd\[24959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
Oct 18 01:34:28 server sshd\[24966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
Oct 18 01:34:29 server sshd\[24959\]: Failed password for root from 222.186.190.2 port 35746 ssh2
Oct 18 01:34:29 server sshd\[24964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
Oct 18 01:34:29 server sshd\[24966\]: Failed password for root from 222.186.190.2 port 42422 ssh2
...
2019-10-18 06:51:54
201.176.27.160 attack
May 20 01:35:30 odroid64 sshd\[8758\]: User root from 201.176.27.160 not allowed because not listed in AllowUsers
May 20 01:35:30 odroid64 sshd\[8758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.176.27.160  user=root
May 20 01:35:32 odroid64 sshd\[8758\]: Failed password for invalid user root from 201.176.27.160 port 56636 ssh2
...
2019-10-18 06:40:06
117.50.43.236 attackbotsspam
Lines containing failures of 117.50.43.236
Oct 17 20:43:38 *** sshd[124781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.43.236  user=r.r
Oct 17 20:43:41 *** sshd[124781]: Failed password for r.r from 117.50.43.236 port 38146 ssh2
Oct 17 20:43:41 *** sshd[124781]: Received disconnect from 117.50.43.236 port 38146:11: Bye Bye [preauth]
Oct 17 20:43:41 *** sshd[124781]: Disconnected from authenticating user r.r 117.50.43.236 port 38146 [preauth]
Oct 17 21:09:43 *** sshd[126580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.43.236  user=r.r
Oct 17 21:09:46 *** sshd[126580]: Failed password for r.r from 117.50.43.236 port 48554 ssh2
Oct 17 21:09:46 *** sshd[126580]: Received disconnect from 117.50.43.236 port 48554:11: Bye Bye [preauth]
Oct 17 21:09:46 *** sshd[126580]: Disconnected from authenticating user r.r 117.50.43.236 port 48554 [preauth]
Oct 17 21:15:00 *** sshd[12682........
------------------------------
2019-10-18 06:16:11
64.88.145.152 attack
Lines containing failures of 64.88.145.152
Oct 17 21:40:48 server01 postfix/smtpd[4735]: connect from emv13.ilifinousy.com[64.88.145.152]
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct 17 21:40:49 server01 postfix/smtpd[4735]: disconnect from emv13.ilifinousy.com[64.88.145.152]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=64.88.145.152
2019-10-18 06:36:17

最近上报的IP列表

133.153.50.122 209.51.75.186 37.81.69.150 215.226.154.11
203.118.117.33 229.83.69.152 60.82.58.249 152.96.176.15
155.2.228.0 195.30.166.214 184.130.115.242 212.110.184.210
97.198.3.12 49.36.54.136 124.221.242.134 53.54.67.151
148.8.143.99 188.49.248.28 61.129.70.156 183.158.9.37