必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom of Great Britain and Northern Ireland

运营商(isp): Oracle Svenska AB

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attackbots
Unauthorized SSH login attempts
2020-07-04 11:00:00
attackbots
May  7 10:37:08 debian sshd[9969]: Unable to negotiate with 144.21.67.43 port 53513: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth]
May  7 13:18:17 debian sshd[17540]: Unable to negotiate with 144.21.67.43 port 53513: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth]
...
2020-05-08 05:34:05
attackbots
Trying ports that it shouldn't be.
2020-05-07 16:36:36
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.21.67.43
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52673
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;144.21.67.43.			IN	A

;; AUTHORITY SECTION:
.			246	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020050700 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 07 16:36:31 CST 2020
;; MSG SIZE  rcvd: 116
HOST信息:
43.67.21.144.in-addr.arpa domain name pointer oc-144-21-67-43.compute.oraclecloud.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
43.67.21.144.in-addr.arpa	name = oc-144-21-67-43.compute.oraclecloud.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
206.189.127.18 attackspam
Sep 20 20:30:30 s64-1 sshd[7232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.127.18
Sep 20 20:30:31 s64-1 sshd[7232]: Failed password for invalid user musikbot from 206.189.127.18 port 53450 ssh2
Sep 20 20:34:52 s64-1 sshd[7337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.127.18
...
2019-09-21 06:13:47
149.56.251.168 attackspam
Sep 21 00:13:16 SilenceServices sshd[22531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.251.168
Sep 21 00:13:17 SilenceServices sshd[22531]: Failed password for invalid user rpc from 149.56.251.168 port 38208 ssh2
Sep 21 00:17:12 SilenceServices sshd[25036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.251.168
2019-09-21 06:18:29
167.99.83.237 attackspam
$f2bV_matches
2019-09-21 06:14:09
47.103.35.67 attackspam
(Sep 20)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=40070 TCP DPT=8080 WINDOW=3397 SYN 
 (Sep 20)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=61293 TCP DPT=8080 WINDOW=59496 SYN 
 (Sep 20)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=6180 TCP DPT=8080 WINDOW=59496 SYN 
 (Sep 20)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=19359 TCP DPT=8080 WINDOW=8558 SYN 
 (Sep 19)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=36061 TCP DPT=8080 WINDOW=59496 SYN 
 (Sep 18)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=48279 TCP DPT=8080 WINDOW=59496 SYN 
 (Sep 18)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=7029 TCP DPT=8080 WINDOW=59496 SYN 
 (Sep 17)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=27116 TCP DPT=8080 WINDOW=8558 SYN 
 (Sep 17)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=11376 TCP DPT=8080 WINDOW=34510 SYN 
 (Sep 17)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=58213 TCP DPT=8080 WINDOW=8558 SYN 
 (Sep 16)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=4780 TCP DPT=8080 WINDOW=3397 SYN 
 (Sep 15)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=43521 TCP DPT=8080 WINDOW=8558 SYN 
 ...
2019-09-21 06:02:00
138.197.129.38 attack
Sep 20 11:49:41 wbs sshd\[8190\]: Invalid user 123456 from 138.197.129.38
Sep 20 11:49:41 wbs sshd\[8190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.129.38
Sep 20 11:49:43 wbs sshd\[8190\]: Failed password for invalid user 123456 from 138.197.129.38 port 53044 ssh2
Sep 20 11:53:58 wbs sshd\[8720\]: Invalid user hostmaster from 138.197.129.38
Sep 20 11:53:58 wbs sshd\[8720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.129.38
2019-09-21 06:09:48
210.21.226.2 attackbots
Sep 20 08:46:21 tdfoods sshd\[30663\]: Invalid user foster from 210.21.226.2
Sep 20 08:46:21 tdfoods sshd\[30663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.21.226.2
Sep 20 08:46:23 tdfoods sshd\[30663\]: Failed password for invalid user foster from 210.21.226.2 port 60767 ssh2
Sep 20 08:49:33 tdfoods sshd\[30954\]: Invalid user xuan from 210.21.226.2
Sep 20 08:49:33 tdfoods sshd\[30954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.21.226.2
2019-09-21 06:27:06
51.83.78.56 attackspam
Sep 20 23:56:31 localhost sshd\[661\]: Invalid user yanny from 51.83.78.56 port 35612
Sep 20 23:56:31 localhost sshd\[661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.78.56
Sep 20 23:56:33 localhost sshd\[661\]: Failed password for invalid user yanny from 51.83.78.56 port 35612 ssh2
2019-09-21 06:02:36
119.60.255.90 attack
Unauthorized SSH login attempts
2019-09-21 06:00:50
139.5.223.41 attack
19/9/20@14:18:13: FAIL: IoT-Telnet address from=139.5.223.41
...
2019-09-21 05:52:15
71.236.106.96 attackspambots
port scan and connect, tcp 23 (telnet)
2019-09-21 06:22:05
81.133.73.161 attackbotsspam
Sep 20 15:01:24 TORMINT sshd\[21321\]: Invalid user nu123 from 81.133.73.161
Sep 20 15:01:24 TORMINT sshd\[21321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.133.73.161
Sep 20 15:01:26 TORMINT sshd\[21321\]: Failed password for invalid user nu123 from 81.133.73.161 port 33855 ssh2
...
2019-09-21 06:08:55
46.38.144.32 attackbotsspam
Sep 20 23:55:32 webserver postfix/smtpd\[12297\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 20 23:57:57 webserver postfix/smtpd\[14339\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 21 00:00:21 webserver postfix/smtpd\[13286\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 21 00:02:45 webserver postfix/smtpd\[13286\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 21 00:05:10 webserver postfix/smtpd\[13286\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-09-21 06:15:40
189.50.130.82 attack
...
2019-09-21 05:54:07
45.142.195.5 attackbots
Sep 20 23:51:31 web1 postfix/smtpd\[1756\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 20 23:52:32 web1 postfix/smtpd\[1756\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 20 23:53:32 web1 postfix/smtpd\[1756\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-09-21 05:53:44
121.157.82.202 attackbots
Automatic report - Banned IP Access
2019-09-21 06:17:41

最近上报的IP列表

106.152.56.239 18.213.144.138 90.56.110.210 232.49.152.234
54.109.165.129 202.237.103.161 157.230.127.63 6.149.126.136
232.249.121.52 70.158.196.179 183.117.108.40 65.49.20.73
175.8.179.108 5.202.45.205 218.2.220.254 57.20.54.113
62.30.195.169 66.27.57.170 117.70.156.50 193.176.241.34