必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.83.150.226
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39283
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.83.150.226.			IN	A

;; AUTHORITY SECTION:
.			574	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:23:21 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
b'Host 226.150.83.146.in-addr.arpa. not found: 3(NXDOMAIN)
'
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 226.150.83.146.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.4.163.146 attackbots
Dec  6 14:25:47 nextcloud sshd\[20975\]: Invalid user FUWUQInet! from 218.4.163.146
Dec  6 14:25:47 nextcloud sshd\[20975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.4.163.146
Dec  6 14:25:49 nextcloud sshd\[20975\]: Failed password for invalid user FUWUQInet! from 218.4.163.146 port 56610 ssh2
...
2019-12-06 21:33:59
13.79.145.36 attackbots
Lines containing failures of 13.79.145.36
Dec  4 09:08:31 shared03 sshd[30767]: Invalid user magaletchimy from 13.79.145.36 port 35808
Dec  4 09:08:31 shared03 sshd[30767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.79.145.36
Dec  4 09:08:33 shared03 sshd[30767]: Failed password for invalid user magaletchimy from 13.79.145.36 port 35808 ssh2
Dec  4 09:08:33 shared03 sshd[30767]: Received disconnect from 13.79.145.36 port 35808:11: Bye Bye [preauth]
Dec  4 09:08:33 shared03 sshd[30767]: Disconnected from invalid user magaletchimy 13.79.145.36 port 35808 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=13.79.145.36
2019-12-06 21:41:52
80.82.65.60 attackbotsspam
12/06/2019-04:16:28.990726 80.82.65.60 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-06 21:06:50
183.13.120.237 attack
Dec  6 12:10:12 w sshd[10278]: Invalid user inhofe from 183.13.120.237
Dec  6 12:10:12 w sshd[10278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.13.120.237 
Dec  6 12:10:14 w sshd[10278]: Failed password for invalid user inhofe from 183.13.120.237 port 61606 ssh2
Dec  6 12:10:14 w sshd[10278]: Received disconnect from 183.13.120.237: 11: Bye Bye [preauth]
Dec  6 13:26:36 w sshd[10974]: Invalid user frieda from 183.13.120.237
Dec  6 13:26:36 w sshd[10974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.13.120.237 
Dec  6 13:26:39 w sshd[10974]: Failed password for invalid user frieda from 183.13.120.237 port 61965 ssh2
Dec  6 13:26:39 w sshd[10974]: Received disconnect from 183.13.120.237: 11: Bye Bye [preauth]
Dec  6 13:57:04 w sshd[11258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.13.120.237  user=r.r
Dec  6 13:57:06 w sshd[112........
-------------------------------
2019-12-06 21:27:11
110.9.136.19 attackspam
2019-12-06T07:44:01.215042abusebot-5.cloudsearch.cf sshd\[23317\]: Invalid user pi from 110.9.136.19 port 51242
2019-12-06 21:08:55
106.13.140.110 attack
Dec  6 01:26:33 auw2 sshd\[3358\]: Invalid user steene from 106.13.140.110
Dec  6 01:26:33 auw2 sshd\[3358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.140.110
Dec  6 01:26:35 auw2 sshd\[3358\]: Failed password for invalid user steene from 106.13.140.110 port 50632 ssh2
Dec  6 01:33:27 auw2 sshd\[4010\]: Invalid user veale from 106.13.140.110
Dec  6 01:33:27 auw2 sshd\[4010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.140.110
2019-12-06 21:27:34
118.25.18.30 attackbotsspam
Dec  6 08:37:12 jane sshd[24816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.18.30 
Dec  6 08:37:14 jane sshd[24816]: Failed password for invalid user web from 118.25.18.30 port 42808 ssh2
...
2019-12-06 21:30:14
192.241.143.162 attack
Dec  5 23:22:30 kapalua sshd\[27667\]: Invalid user stever from 192.241.143.162
Dec  5 23:22:30 kapalua sshd\[27667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.143.162
Dec  5 23:22:32 kapalua sshd\[27667\]: Failed password for invalid user stever from 192.241.143.162 port 57810 ssh2
Dec  5 23:28:11 kapalua sshd\[28307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.143.162  user=root
Dec  5 23:28:12 kapalua sshd\[28307\]: Failed password for root from 192.241.143.162 port 38502 ssh2
2019-12-06 21:13:12
198.12.149.33 attackbotsspam
198.12.149.33 - - \[06/Dec/2019:12:12:27 +0100\] "POST /wp-login.php HTTP/1.0" 200 7656 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
198.12.149.33 - - \[06/Dec/2019:12:12:28 +0100\] "POST /wp-login.php HTTP/1.0" 200 7486 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
198.12.149.33 - - \[06/Dec/2019:12:12:30 +0100\] "POST /wp-login.php HTTP/1.0" 200 7480 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-12-06 21:02:12
157.230.27.47 attackbots
Dec  6 13:47:07 legacy sshd[12726]: Failed password for root from 157.230.27.47 port 48888 ssh2
Dec  6 13:52:46 legacy sshd[12948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.27.47
Dec  6 13:52:48 legacy sshd[12948]: Failed password for invalid user gamaliel from 157.230.27.47 port 59712 ssh2
...
2019-12-06 21:00:48
36.22.187.34 attackbotsspam
Dec  6 14:38:38 nextcloud sshd\[10560\]: Invalid user arkserver from 36.22.187.34
Dec  6 14:38:38 nextcloud sshd\[10560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.22.187.34
Dec  6 14:38:40 nextcloud sshd\[10560\]: Failed password for invalid user arkserver from 36.22.187.34 port 34962 ssh2
...
2019-12-06 21:41:29
182.135.64.12 attack
Dec  6 13:02:42 Ubuntu-1404-trusty-64-minimal sshd\[15791\]: Invalid user endean from 182.135.64.12
Dec  6 13:02:42 Ubuntu-1404-trusty-64-minimal sshd\[15791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.135.64.12
Dec  6 13:02:44 Ubuntu-1404-trusty-64-minimal sshd\[15791\]: Failed password for invalid user endean from 182.135.64.12 port 49787 ssh2
Dec  6 13:20:56 Ubuntu-1404-trusty-64-minimal sshd\[29679\]: Invalid user christiane from 182.135.64.12
Dec  6 13:20:56 Ubuntu-1404-trusty-64-minimal sshd\[29679\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.135.64.12
2019-12-06 21:26:52
120.136.167.74 attackspam
Dec  6 13:17:19 icinga sshd[13184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.136.167.74
Dec  6 13:17:22 icinga sshd[13184]: Failed password for invalid user jackal from 120.136.167.74 port 53981 ssh2
...
2019-12-06 21:14:24
125.126.195.136 attack
Dec  6 01:10:35 esmtp postfix/smtpd[28080]: lost connection after AUTH from unknown[125.126.195.136]
Dec  6 01:10:38 esmtp postfix/smtpd[28121]: lost connection after AUTH from unknown[125.126.195.136]
Dec  6 01:10:42 esmtp postfix/smtpd[28080]: lost connection after AUTH from unknown[125.126.195.136]
Dec  6 01:10:52 esmtp postfix/smtpd[28121]: lost connection after AUTH from unknown[125.126.195.136]
Dec  6 01:10:57 esmtp postfix/smtpd[28080]: lost connection after AUTH from unknown[125.126.195.136]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=125.126.195.136
2019-12-06 21:19:54
185.176.27.54 attack
12/06/2019-07:45:13.560506 185.176.27.54 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-06 21:38:50

最近上报的IP列表

146.82.203.104 146.83.143.10 146.83.108.140 146.88.111.80
146.88.108.198 146.88.110.20 146.88.111.39 146.83.250.174
146.88.232.117 146.88.104.4 146.83.191.133 146.88.232.79
146.88.232.24 146.88.226.74 146.88.233.104 146.88.233.205
146.88.233.169 146.88.234.113 146.88.234.116 146.88.233.250