必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.21.235.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65375
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.21.235.141.			IN	A

;; AUTHORITY SECTION:
.			331	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040200 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 02 22:00:30 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 141.235.21.148.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 141.235.21.148.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
31.206.195.229 attackbots
Sep 14 20:00:41 toyboy sshd[23832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.206.195.229  user=r.r
Sep 14 20:00:43 toyboy sshd[23832]: Failed password for r.r from 31.206.195.229 port 23221 ssh2
Sep 14 20:00:45 toyboy sshd[23832]: Failed password for r.r from 31.206.195.229 port 23221 ssh2
Sep 14 20:00:48 toyboy sshd[23832]: Failed password for r.r from 31.206.195.229 port 23221 ssh2
Sep 14 20:00:49 toyboy sshd[23832]: Failed password for r.r from 31.206.195.229 port 23221 ssh2
Sep 14 20:00:51 toyboy sshd[23832]: Failed password for r.r from 31.206.195.229 port 23221 ssh2
Sep 14 20:00:53 toyboy sshd[23832]: Failed password for r.r from 31.206.195.229 port 23221 ssh2
Sep 14 20:00:53 toyboy sshd[23832]: Disconnecting: Too many authentication failures for r.r from 31.206.195.229 port 23221 ssh2 [preauth]
Sep 14 20:00:53 toyboy sshd[23832]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.206........
-------------------------------
2019-09-15 09:50:34
95.58.194.141 attackbotsspam
Sep 15 03:47:24 XXX sshd[61941]: Invalid user ofsaa from 95.58.194.141 port 45766
2019-09-15 10:07:30
159.65.157.194 attackbots
Sep 15 02:41:42 vps691689 sshd[22883]: Failed password for root from 159.65.157.194 port 40662 ssh2
Sep 15 02:46:29 vps691689 sshd[22960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.157.194
...
2019-09-15 10:01:00
52.51.236.249 attack
Sep 14 19:18:55 xb3 sshd[8700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-52-51-236-249.eu-west-1.compute.amazonaws.com
Sep 14 19:18:57 xb3 sshd[8700]: Failed password for invalid user mv from 52.51.236.249 port 57908 ssh2
Sep 14 19:18:57 xb3 sshd[8700]: Received disconnect from 52.51.236.249: 11: Bye Bye [preauth]
Sep 14 19:30:13 xb3 sshd[25885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-52-51-236-249.eu-west-1.compute.amazonaws.com
Sep 14 19:30:15 xb3 sshd[25885]: Failed password for invalid user swadmin from 52.51.236.249 port 51096 ssh2
Sep 14 19:30:15 xb3 sshd[25885]: Received disconnect from 52.51.236.249: 11: Bye Bye [preauth]
Sep 14 19:33:48 xb3 sshd[8991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-52-51-236-249.eu-west-1.compute.amazonaws.com
Sep 14 19:33:51 xb3 sshd[8991]: Failed password for invalid user vx from........
-------------------------------
2019-09-15 09:52:25
178.62.103.95 attackbots
Sep 14 21:50:58 web8 sshd\[870\]: Invalid user server from 178.62.103.95
Sep 14 21:50:58 web8 sshd\[870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.103.95
Sep 14 21:51:01 web8 sshd\[870\]: Failed password for invalid user server from 178.62.103.95 port 36563 ssh2
Sep 14 21:56:21 web8 sshd\[4077\]: Invalid user nigga from 178.62.103.95
Sep 14 21:56:21 web8 sshd\[4077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.103.95
2019-09-15 10:10:17
119.79.234.12 attack
[munged]::80 119.79.234.12 - - [14/Sep/2019:20:12:34 +0200] "POST /[munged]: HTTP/1.1" 200 4214 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 119.79.234.12 - - [14/Sep/2019:20:12:35 +0200] "POST /[munged]: HTTP/1.1" 200 4213 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 119.79.234.12 - - [14/Sep/2019:20:12:37 +0200] "POST /[munged]: HTTP/1.1" 200 4213 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 119.79.234.12 - - [14/Sep/2019:20:12:38 +0200] "POST /[munged]: HTTP/1.1" 200 4213 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 119.79.234.12 - - [14/Sep/2019:20:12:39 +0200] "POST /[munged]: HTTP/1.1" 200 4213 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 119.79.234.12 - - [14/Sep/2019:20:12:41 +0200]
2019-09-15 09:43:29
114.32.153.15 attackspambots
Sep 15 00:00:01 core sshd[12975]: Invalid user pe from 114.32.153.15 port 39052
Sep 15 00:00:03 core sshd[12975]: Failed password for invalid user pe from 114.32.153.15 port 39052 ssh2
...
2019-09-15 10:19:24
165.22.76.39 attackspambots
Sep 15 01:46:14 hcbbdb sshd\[13433\]: Invalid user zf from 165.22.76.39
Sep 15 01:46:14 hcbbdb sshd\[13433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.76.39
Sep 15 01:46:16 hcbbdb sshd\[13433\]: Failed password for invalid user zf from 165.22.76.39 port 47050 ssh2
Sep 15 01:50:34 hcbbdb sshd\[14100\]: Invalid user gauthier from 165.22.76.39
Sep 15 01:50:34 hcbbdb sshd\[14100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.76.39
2019-09-15 09:50:59
203.113.66.151 attackspambots
2019-09-15T01:58:24.529279abusebot-3.cloudsearch.cf sshd\[13987\]: Invalid user ENGFO from 203.113.66.151 port 55129
2019-09-15 10:25:47
104.206.128.62 attackspam
Port scan
2019-09-15 09:50:10
198.23.189.18 attack
Sep 15 00:23:02 MK-Soft-VM6 sshd\[26729\]: Invalid user admin123 from 198.23.189.18 port 55122
Sep 15 00:23:02 MK-Soft-VM6 sshd\[26729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.23.189.18
Sep 15 00:23:04 MK-Soft-VM6 sshd\[26729\]: Failed password for invalid user admin123 from 198.23.189.18 port 55122 ssh2
...
2019-09-15 10:33:29
46.101.63.219 attack
Automatic report - Banned IP Access
2019-09-15 09:46:59
95.10.37.17 attackbotsspam
Automatic report - Port Scan Attack
2019-09-15 10:30:38
61.68.242.195 attackspambots
Sep 14 19:49:19 isowiki sshd[16887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.68.242.195  user=r.r
Sep 14 19:49:20 isowiki sshd[16887]: Failed password for r.r from 61.68.242.195 port 51229 ssh2
Sep 14 19:49:23 isowiki sshd[16887]: Failed password for r.r from 61.68.242.195 port 51229 ssh2
Sep 14 19:49:26 isowiki sshd[16887]: Failed password for r.r from 61.68.242.195 port 51229 ssh2
Sep 14 19:49:28 isowiki sshd[16887]: Failed password for r.r from 61.68.242.195 port 51229 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=61.68.242.195
2019-09-15 10:26:21
218.87.254.235 attack
[munged]::443 218.87.254.235 - - [14/Sep/2019:20:11:52 +0200] "POST /[munged]: HTTP/1.1" 200 10029 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 218.87.254.235 - - [14/Sep/2019:20:11:57 +0200] "POST /[munged]: HTTP/1.1" 200 6180 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 218.87.254.235 - - [14/Sep/2019:20:12:00 +0200] "POST /[munged]: HTTP/1.1" 200 6180 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 218.87.254.235 - - [14/Sep/2019:20:12:04 +0200] "POST /[munged]: HTTP/1.1" 200 6180 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 218.87.254.235 - - [14/Sep/2019:20:12:07 +0200] "POST /[munged]: HTTP/1.1" 200 6180 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 218.87.254.235 - - [14/Sep/2019:20
2019-09-15 09:54:30

最近上报的IP列表

158.247.197.85 186.94.130.44 55.68.134.83 181.64.193.188
121.147.77.133 218.166.17.143 170.185.156.140 100.64.133.42
0.12.215.14 129.185.26.189 9.188.224.104 29.3.66.56
221.155.249.30 231.148.136.14 150.122.48.222 234.34.191.27
114.130.161.197 50.73.24.81 45.65.154.75 191.164.111.35