必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.144.81.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3499
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.144.81.116.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 11:33:24 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 116.81.144.148.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 116.81.144.148.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.175.202 attackspam
Dec 24 00:31:59 ns3110291 sshd\[6961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202  user=root
Dec 24 00:32:01 ns3110291 sshd\[6961\]: Failed password for root from 222.186.175.202 port 41622 ssh2
Dec 24 00:32:04 ns3110291 sshd\[6961\]: Failed password for root from 222.186.175.202 port 41622 ssh2
Dec 24 00:32:07 ns3110291 sshd\[6961\]: Failed password for root from 222.186.175.202 port 41622 ssh2
Dec 24 00:32:10 ns3110291 sshd\[6961\]: Failed password for root from 222.186.175.202 port 41622 ssh2
...
2019-12-24 07:40:38
72.143.15.82 attack
Automatic report - Banned IP Access
2019-12-24 07:42:51
20.188.4.3 attack
Dec 24 00:21:20 legacy sshd[5064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.188.4.3
Dec 24 00:21:22 legacy sshd[5064]: Failed password for invalid user ytterborg from 20.188.4.3 port 37818 ssh2
Dec 24 00:27:44 legacy sshd[5429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.188.4.3
...
2019-12-24 07:32:09
206.189.142.10 attackspam
Dec 24 00:39:49 silence02 sshd[3365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.142.10
Dec 24 00:39:51 silence02 sshd[3365]: Failed password for invalid user chedy from 206.189.142.10 port 57898 ssh2
Dec 24 00:41:34 silence02 sshd[4240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.142.10
2019-12-24 07:54:55
142.93.128.73 attack
Dec 23 23:14:02 zeus sshd[5583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.128.73 
Dec 23 23:14:04 zeus sshd[5583]: Failed password for invalid user logon from 142.93.128.73 port 55414 ssh2
Dec 23 23:17:03 zeus sshd[5708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.128.73 
Dec 23 23:17:06 zeus sshd[5708]: Failed password for invalid user 55555 from 142.93.128.73 port 56094 ssh2
2019-12-24 07:39:21
117.131.60.38 attackbotsspam
Dec 23 23:36:31 www_kotimaassa_fi sshd[9997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.131.60.38
Dec 23 23:36:33 www_kotimaassa_fi sshd[9997]: Failed password for invalid user hokland from 117.131.60.38 port 2755 ssh2
...
2019-12-24 07:51:11
46.38.144.117 attackspam
Dec 24 00:32:10 webserver postfix/smtpd\[17544\]: warning: unknown\[46.38.144.117\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 24 00:33:43 webserver postfix/smtpd\[17544\]: warning: unknown\[46.38.144.117\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 24 00:35:24 webserver postfix/smtpd\[17544\]: warning: unknown\[46.38.144.117\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 24 00:37:05 webserver postfix/smtpd\[17544\]: warning: unknown\[46.38.144.117\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 24 00:38:45 webserver postfix/smtpd\[17544\]: warning: unknown\[46.38.144.117\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-12-24 07:48:08
91.134.116.166 attackspambots
Dec 23 23:24:11 h2040555 sshd[3503]: Invalid user cxxxxxxx6 from 91.134.116.166
Dec 23 23:24:13 h2040555 sshd[3503]: Failed password for invalid user cxxxxxxx6 from 91.134.116.166 port 57094 ssh2
Dec 23 23:24:13 h2040555 sshd[3503]: Received disconnect from 91.134.116.166: 11: Bye Bye [preauth]
Dec 23 23:37:46 h2040555 sshd[3679]: Invalid user dpisklo from 91.134.116.166
Dec 23 23:37:48 h2040555 sshd[3679]: Failed password for invalid user dpisklo from 91.134.116.166 port 54308 ssh2
Dec 23 23:37:48 h2040555 sshd[3679]: Received disconnect from 91.134.116.166: 11: Bye Bye [preauth]
Dec 23 23:40:09 h2040555 sshd[3820]: Invalid user jaine from 91.134.116.166


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=91.134.116.166
2019-12-24 07:52:14
51.15.77.156 attackbotsspam
Dec 24 00:38:36 vps691689 sshd[4354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.77.156
Dec 24 00:38:38 vps691689 sshd[4354]: Failed password for invalid user brownlow from 51.15.77.156 port 60344 ssh2
...
2019-12-24 08:05:39
94.142.139.229 attack
Dec 24 00:19:24 srv1 sshd[24138]: Invalid user kordich from 94.142.139.229
Dec 24 00:19:26 srv1 sshd[24138]: Failed password for invalid user kordich from 94.142.139.229 port 39416 ssh2
Dec 24 00:19:26 srv1 sshd[24139]: Received disconnect from 94.142.139.229: 11: Bye Bye


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=94.142.139.229
2019-12-24 07:47:21
148.217.94.19 attack
Brute force SSH attack
2019-12-24 07:41:03
186.103.223.10 attackspambots
Dec 23 23:48:18 mout sshd[15480]: Invalid user prokaziuk from 186.103.223.10 port 42740
2019-12-24 07:32:23
27.147.217.194 attack
2019-12-23 16:48:20 H=(tprcoa.com) [27.147.217.194]:58912 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-12-23 16:48:21 H=(tprcoa.com) [27.147.217.194]:58912 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-12-23 16:48:21 H=(tprcoa.com) [27.147.217.194]:58912 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/sbl/query/SBLCSS)
...
2019-12-24 07:35:40
115.43.112.254 attackbots
SMB Server BruteForce Attack
2019-12-24 07:48:24
49.88.112.62 attackbotsspam
2019-12-23T23:46:00.652483abusebot-5.cloudsearch.cf sshd[13597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.62  user=root
2019-12-23T23:46:02.589915abusebot-5.cloudsearch.cf sshd[13597]: Failed password for root from 49.88.112.62 port 64255 ssh2
2019-12-23T23:46:05.482609abusebot-5.cloudsearch.cf sshd[13597]: Failed password for root from 49.88.112.62 port 64255 ssh2
2019-12-23T23:46:00.652483abusebot-5.cloudsearch.cf sshd[13597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.62  user=root
2019-12-23T23:46:02.589915abusebot-5.cloudsearch.cf sshd[13597]: Failed password for root from 49.88.112.62 port 64255 ssh2
2019-12-23T23:46:05.482609abusebot-5.cloudsearch.cf sshd[13597]: Failed password for root from 49.88.112.62 port 64255 ssh2
2019-12-23T23:46:00.652483abusebot-5.cloudsearch.cf sshd[13597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rho
...
2019-12-24 07:48:59

最近上报的IP列表

129.207.143.70 129.228.20.19 34.63.34.190 34.96.100.207
228.41.146.98 201.216.200.89 247.194.135.67 195.109.77.186
118.159.163.11 56.43.12.83 16.211.162.74 62.197.86.116
131.157.65.139 46.153.109.93 197.91.6.57 72.152.108.178
131.109.180.69 133.181.210.154 210.162.167.158 135.103.141.156