必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.108.143.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1331
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;158.108.143.128.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 10:17:42 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
128.143.108.158.in-addr.arpa has no PTR record
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 128.143.108.158.in-addr.arpa.: No answer

Authoritative answers can be found from:
108.158.in-addr.arpa
	origin = ns.ku.ac.th
	mail addr = abuse.ku.ac.th
	serial = 1739145233
	refresh = 1800
	retry = 600
	expire = 1209600
	minimum = 3600
相关IP信息:
最新评论:
IP 类型 评论内容 时间
84.101.59.202 attack
Nov  8 16:21:20 master sshd[23013]: Failed password for invalid user pi from 84.101.59.202 port 53662 ssh2
Nov  8 16:21:20 master sshd[23011]: Failed password for invalid user pi from 84.101.59.202 port 53656 ssh2
2019-11-09 02:10:31
181.48.225.126 attack
Lines containing failures of 181.48.225.126
Nov  8 10:46:10 jarvis sshd[9548]: Invalid user spark from 181.48.225.126 port 43860
Nov  8 10:46:10 jarvis sshd[9548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.225.126 
Nov  8 10:46:12 jarvis sshd[9548]: Failed password for invalid user spark from 181.48.225.126 port 43860 ssh2
Nov  8 10:46:14 jarvis sshd[9548]: Received disconnect from 181.48.225.126 port 43860:11: Bye Bye [preauth]
Nov  8 10:46:14 jarvis sshd[9548]: Disconnected from invalid user spark 181.48.225.126 port 43860 [preauth]
Nov  8 11:07:01 jarvis sshd[13815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.225.126  user=r.r
Nov  8 11:07:03 jarvis sshd[13815]: Failed password for r.r from 181.48.225.126 port 53654 ssh2
Nov  8 11:07:05 jarvis sshd[13815]: Received disconnect from 181.48.225.126 port 53654:11: Bye Bye [preauth]
Nov  8 11:07:05 jarvis sshd[13815]: D........
------------------------------
2019-11-09 02:42:31
121.66.252.158 attackspam
Failed password for invalid user app from 121.66.252.158 port 45558 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.66.252.158  user=root
Failed password for root from 121.66.252.158 port 55596 ssh2
Invalid user admin from 121.66.252.158 port 37400
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.66.252.158
2019-11-09 02:48:19
46.38.144.202 attackbots
2019-11-08T19:19:26.051081mail01 postfix/smtpd[29092]: warning: unknown[46.38.144.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-08T19:19:51.200515mail01 postfix/smtpd[27096]: warning: unknown[46.38.144.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-08T19:20:16.014622mail01 postfix/smtpd[27096]: warning: unknown[46.38.144.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-09 02:21:58
219.153.106.35 attackbots
Nov  8 16:42:22 MK-Soft-Root2 sshd[17848]: Failed password for root from 219.153.106.35 port 38950 ssh2
...
2019-11-09 02:44:14
138.68.136.152 attackbots
138.68.136.152 - - [08/Nov/2019:15:36:26 +0100] "GET /wp-login.php HTTP/1.1" 200 1238 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.136.152 - - [08/Nov/2019:15:36:26 +0100] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.136.152 - - [08/Nov/2019:15:36:26 +0100] "GET /wp-login.php HTTP/1.1" 200 1238 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.136.152 - - [08/Nov/2019:15:36:27 +0100] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.136.152 - - [08/Nov/2019:15:36:28 +0100] "GET /wp-login.php HTTP/1.1" 200 1238 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.136.152 - - [08/Nov/2019:15:36:30 +0100] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.
2019-11-09 02:24:02
222.186.175.212 attackbotsspam
2019-09-23 07:07:55,048 fail2ban.actions        [818]: NOTICE  [sshd] Ban 222.186.175.212
2019-09-23 21:33:17,723 fail2ban.actions        [818]: NOTICE  [sshd] Ban 222.186.175.212
2019-09-24 12:06:23,634 fail2ban.actions        [818]: NOTICE  [sshd] Ban 222.186.175.212
...
2019-11-09 02:31:22
188.254.0.197 attackbotsspam
Nov  8 18:19:41 localhost sshd\[23812\]: Invalid user tznv2903 from 188.254.0.197 port 56434
Nov  8 18:19:41 localhost sshd\[23812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.197
Nov  8 18:19:43 localhost sshd\[23812\]: Failed password for invalid user tznv2903 from 188.254.0.197 port 56434 ssh2
2019-11-09 02:43:17
85.208.96.68 attackbots
[119:7:1] http_inspect: IIS UNICODE CODEPOINT ENCODING
2019-11-09 02:38:27
107.172.108.142 attackbotsspam
Nov  8 15:05:00 spandau postfix/smtpd[7513]: warning: hostname yellowpages.com does not resolve to address 107.172.108.142
Nov  8 15:05:00 spandau postfix/smtpd[7513]: connect from unknown[107.172.108.142]
Nov x@x
Nov  8 15:05:02 spandau postfix/smtpd[7513]: disconnect from unknown[107.172.108.142]
Nov  8 15:34:10 spandau postfix/smtpd[8165]: warning: hostname yellowpages.com does not resolve to address 107.172.108.142
Nov  8 15:34:10 spandau postfix/smtpd[8165]: connect from unknown[107.172.108.142]
Nov x@x
Nov  8 15:34:12 spandau postfix/smtpd[8165]: disconnect from unknown[107.172.108.142]
Nov  8 15:36:57 spandau postfix/smtpd[9300]: warning: hostname yellowpages.com does not resolve to address 107.172.108.142
Nov  8 15:36:57 spandau postfix/smtpd[9300]: connect from unknown[107.172.108.142]
Nov x@x
Nov  8 15:36:58 spandau postfix/smtpd[9300]: disconnect from unknown[107.172.108.142]
Nov  8 15:39:34 spandau postfix/smtpd[9463]: warning: hostname yellowpages.com does ........
-------------------------------
2019-11-09 02:17:58
144.217.83.201 attackspam
Nov  8 18:54:39 lnxded63 sshd[24707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.83.201
Nov  8 18:54:41 lnxded63 sshd[24707]: Failed password for invalid user ts from 144.217.83.201 port 33600 ssh2
Nov  8 19:03:44 lnxded63 sshd[25796]: Failed password for root from 144.217.83.201 port 43810 ssh2
2019-11-09 02:17:26
59.126.69.60 attackbots
Nov  8 17:13:21 server sshd\[31914\]: Invalid user ftpuser from 59.126.69.60
Nov  8 17:13:21 server sshd\[31914\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59-126-69-60.hinet-ip.hinet.net 
Nov  8 17:13:23 server sshd\[31914\]: Failed password for invalid user ftpuser from 59.126.69.60 port 54540 ssh2
Nov  8 17:35:54 server sshd\[5343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59-126-69-60.hinet-ip.hinet.net  user=root
Nov  8 17:35:56 server sshd\[5343\]: Failed password for root from 59.126.69.60 port 44976 ssh2
...
2019-11-09 02:40:44
46.38.144.17 attackspambots
Nov  8 19:35:51 relay postfix/smtpd\[12753\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  8 19:36:09 relay postfix/smtpd\[14566\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  8 19:36:28 relay postfix/smtpd\[12753\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  8 19:36:48 relay postfix/smtpd\[20839\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  8 19:37:05 relay postfix/smtpd\[12663\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-09 02:37:19
85.185.18.70 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.185.18.70
Failed password for invalid user sodapop from 85.185.18.70 port 48372 ssh2
Invalid user 123456 from 85.185.18.70 port 46920
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.185.18.70
Failed password for invalid user 123456 from 85.185.18.70 port 46920 ssh2
2019-11-09 02:10:43
45.81.233.36 attack
$f2bV_matches
2019-11-09 02:47:21

最近上报的IP列表

181.25.39.73 142.167.4.111 57.199.154.209 65.95.33.22
101.101.6.49 146.2.150.19 231.48.41.187 160.95.217.45
56.81.134.75 224.64.145.0 29.170.111.246 168.200.119.147
45.34.53.153 33.219.98.246 6.145.112.168 142.136.153.95
245.0.6.58 165.244.2.200 143.237.152.138 180.138.105.24