必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.108.186.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53469
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.108.186.19.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 22:42:36 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 19.186.108.148.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 19.186.108.148.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
197.248.144.145 attackspam
Nov 20 22:37:32 pl2server sshd[1384]: reveeclipse mapping checking getaddrinfo for 197-248-144-145.safaricombusiness.co.ke [197.248.144.145] failed - POSSIBLE BREAK-IN ATTEMPT!
Nov 20 22:37:32 pl2server sshd[1384]: Invalid user admin from 197.248.144.145
Nov 20 22:37:32 pl2server sshd[1384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.144.145
Nov 20 22:37:34 pl2server sshd[1384]: Failed password for invalid user admin from 197.248.144.145 port 60219 ssh2
Nov 20 22:37:35 pl2server sshd[1384]: Connection closed by 197.248.144.145 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=197.248.144.145
2019-11-23 00:05:25
111.231.121.20 attackbotsspam
Nov 22 16:41:12 dedicated sshd[8874]: Invalid user dielle from 111.231.121.20 port 57607
2019-11-22 23:41:15
119.93.156.229 attackspam
Nov 22 05:18:50 wbs sshd\[16603\]: Invalid user megan from 119.93.156.229
Nov 22 05:18:50 wbs sshd\[16603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.93.156.229
Nov 22 05:18:52 wbs sshd\[16603\]: Failed password for invalid user megan from 119.93.156.229 port 54734 ssh2
Nov 22 05:23:14 wbs sshd\[16996\]: Invalid user hoerning from 119.93.156.229
Nov 22 05:23:14 wbs sshd\[16996\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.93.156.229
2019-11-22 23:39:08
142.93.238.162 attack
2019-11-22T14:47:27.122620hub.schaetter.us sshd\[12938\]: Invalid user clerke from 142.93.238.162 port 46798
2019-11-22T14:47:27.133542hub.schaetter.us sshd\[12938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.238.162
2019-11-22T14:47:28.720938hub.schaetter.us sshd\[12938\]: Failed password for invalid user clerke from 142.93.238.162 port 46798 ssh2
2019-11-22T14:51:06.737769hub.schaetter.us sshd\[12958\]: Invalid user nawer from 142.93.238.162 port 54266
2019-11-22T14:51:06.752699hub.schaetter.us sshd\[12958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.238.162
...
2019-11-23 00:18:17
159.65.109.148 attackspam
Nov 22 15:52:07 sso sshd[21405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.109.148
Nov 22 15:52:09 sso sshd[21405]: Failed password for invalid user postgres from 159.65.109.148 port 37040 ssh2
...
2019-11-22 23:37:17
71.78.236.19 attackbotsspam
Nov 22 10:34:01 hostnameis sshd[45469]: Invalid user zhangyan from 71.78.236.19
Nov 22 10:34:01 hostnameis sshd[45469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=rrcs-71-78-236-19.sw.biz.rr.com 
Nov 22 10:34:04 hostnameis sshd[45469]: Failed password for invalid user zhangyan from 71.78.236.19 port 25351 ssh2
Nov 22 10:34:04 hostnameis sshd[45469]: Received disconnect from 71.78.236.19: 11: Bye Bye [preauth]
Nov 22 10:34:05 hostnameis sshd[45471]: Invalid user dff from 71.78.236.19

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=71.78.236.19
2019-11-23 00:09:02
220.225.126.55 attackbotsspam
Nov 22 10:44:17 linuxvps sshd\[30059\]: Invalid user super from 220.225.126.55
Nov 22 10:44:17 linuxvps sshd\[30059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.225.126.55
Nov 22 10:44:19 linuxvps sshd\[30059\]: Failed password for invalid user super from 220.225.126.55 port 51642 ssh2
Nov 22 10:49:05 linuxvps sshd\[32699\]: Invalid user wwwrun from 220.225.126.55
Nov 22 10:49:05 linuxvps sshd\[32699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.225.126.55
2019-11-22 23:52:18
151.80.140.166 attack
Nov 22 16:52:27 MK-Soft-VM5 sshd[891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.140.166 
Nov 22 16:52:29 MK-Soft-VM5 sshd[891]: Failed password for invalid user banan from 151.80.140.166 port 32798 ssh2
...
2019-11-23 00:11:51
119.75.24.68 attackbotsspam
Nov 22 17:01:20 ArkNodeAT sshd\[16685\]: Invalid user dbus from 119.75.24.68
Nov 22 17:01:20 ArkNodeAT sshd\[16685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.75.24.68
Nov 22 17:01:22 ArkNodeAT sshd\[16685\]: Failed password for invalid user dbus from 119.75.24.68 port 50788 ssh2
2019-11-23 00:04:46
180.125.17.229 attack
badbot
2019-11-23 00:14:08
45.124.86.65 attack
Nov 22 22:24:42 webhost01 sshd[27981]: Failed password for root from 45.124.86.65 port 36420 ssh2
Nov 22 22:29:05 webhost01 sshd[27992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.124.86.65
...
2019-11-22 23:36:47
36.6.148.145 attackbotsspam
badbot
2019-11-23 00:12:37
220.246.26.9 attackspambots
Nov 22 12:11:43 server sshd\[10898\]: Invalid user admin from 220.246.26.9
Nov 22 12:11:43 server sshd\[10898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=n220246026009.netvigator.com 
Nov 22 12:11:44 server sshd\[10898\]: Failed password for invalid user admin from 220.246.26.9 port 47113 ssh2
Nov 22 17:51:36 server sshd\[30991\]: Invalid user admin from 220.246.26.9
Nov 22 17:51:36 server sshd\[30991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=n220246026009.netvigator.com 
...
2019-11-22 23:55:42
49.88.112.114 attack
Nov 22 05:37:38 kapalua sshd\[18541\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Nov 22 05:37:40 kapalua sshd\[18541\]: Failed password for root from 49.88.112.114 port 32041 ssh2
Nov 22 05:41:32 kapalua sshd\[19008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Nov 22 05:41:34 kapalua sshd\[19008\]: Failed password for root from 49.88.112.114 port 49499 ssh2
Nov 22 05:42:51 kapalua sshd\[19105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
2019-11-22 23:46:31
161.117.176.196 attack
2019-11-22T15:55:32.520118abusebot-8.cloudsearch.cf sshd\[13005\]: Invalid user pcap from 161.117.176.196 port 16132
2019-11-23 00:08:39

最近上报的IP列表

209.246.191.163 115.107.209.26 48.236.33.73 240.119.53.251
148.251.200.61 117.117.24.184 213.135.137.77 33.210.203.88
84.53.77.17 50.164.201.148 69.82.18.119 43.180.167.134
249.18.75.178 243.43.189.62 146.145.16.62 127.130.129.165
223.55.16.253 41.114.62.231 142.122.63.126 211.140.137.39