必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Norway

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Ikt-kapasiteter

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.112.5.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20357
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;158.112.5.100.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061101 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 12 08:45:14 CST 2019
;; MSG SIZE  rcvd: 117

HOST信息:
Host 100.5.112.158.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 100.5.112.158.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.75.53.228 attackbots
Invalid user es from 106.75.53.228 port 48998
2020-06-14 08:18:28
124.89.35.68 attack
Port Scan detected!
...
2020-06-14 08:25:02
189.91.5.167 attackspambots
Jun 13 22:45:51 mail.srvfarm.net postfix/smtps/smtpd[1288544]: warning: unknown[189.91.5.167]: SASL PLAIN authentication failed: 
Jun 13 22:45:52 mail.srvfarm.net postfix/smtps/smtpd[1288544]: lost connection after AUTH from unknown[189.91.5.167]
Jun 13 22:46:09 mail.srvfarm.net postfix/smtps/smtpd[1293478]: warning: unknown[189.91.5.167]: SASL PLAIN authentication failed: 
Jun 13 22:46:10 mail.srvfarm.net postfix/smtps/smtpd[1293478]: lost connection after AUTH from unknown[189.91.5.167]
Jun 13 22:47:07 mail.srvfarm.net postfix/smtpd[1294829]: warning: unknown[189.91.5.167]: SASL PLAIN authentication failed:
2020-06-14 08:33:33
141.98.81.207 attack
Jun 13 05:47:54 XXX sshd[63091]: Invalid user admin from 141.98.81.207 port 11397
2020-06-14 08:09:44
139.162.72.191 attackbotsspam
SmallBizIT.US 1 packets to tcp(3127)
2020-06-14 08:28:53
113.172.179.235 attackbots
Unauthorized IMAP connection attempt
2020-06-14 08:04:02
180.76.136.81 attackspambots
Jun 14 01:54:58 pornomens sshd\[32220\]: Invalid user jboss from 180.76.136.81 port 48338
Jun 14 01:54:58 pornomens sshd\[32220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.136.81
Jun 14 01:55:00 pornomens sshd\[32220\]: Failed password for invalid user jboss from 180.76.136.81 port 48338 ssh2
...
2020-06-14 08:08:53
223.197.125.10 attackbotsspam
SSH brute-force: detected 18 distinct username(s) / 27 distinct password(s) within a 24-hour window.
2020-06-14 08:22:44
111.231.190.106 attackspam
Jun 14 01:36:42 Ubuntu-1404-trusty-64-minimal sshd\[5791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.190.106  user=root
Jun 14 01:36:45 Ubuntu-1404-trusty-64-minimal sshd\[5791\]: Failed password for root from 111.231.190.106 port 33544 ssh2
Jun 14 01:56:40 Ubuntu-1404-trusty-64-minimal sshd\[11871\]: Invalid user monitor from 111.231.190.106
Jun 14 01:56:40 Ubuntu-1404-trusty-64-minimal sshd\[11871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.190.106
Jun 14 01:56:41 Ubuntu-1404-trusty-64-minimal sshd\[11871\]: Failed password for invalid user monitor from 111.231.190.106 port 60710 ssh2
2020-06-14 08:15:22
46.101.151.52 attackbots
Jun 13 20:46:08 firewall sshd[25470]: Failed password for invalid user yp from 46.101.151.52 port 45500 ssh2
Jun 13 20:49:25 firewall sshd[25563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.151.52  user=root
Jun 13 20:49:27 firewall sshd[25563]: Failed password for root from 46.101.151.52 port 45564 ssh2
...
2020-06-14 08:28:22
111.229.109.26 attackspambots
2020-06-14T00:19:32+0200 Failed SSH Authentication/Brute Force Attack.(Server 2)
2020-06-14 08:06:17
111.230.226.124 attack
Jun 14 02:07:06 home sshd[19086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.226.124
Jun 14 02:07:08 home sshd[19086]: Failed password for invalid user dovecot from 111.230.226.124 port 53428 ssh2
Jun 14 02:08:33 home sshd[20161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.226.124
...
2020-06-14 08:15:40
87.246.7.70 attackbotsspam
Jun 14 02:03:23 mail postfix/smtpd\[5380\]: warning: unknown\[87.246.7.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun 14 02:04:11 mail postfix/smtpd\[3996\]: warning: unknown\[87.246.7.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun 14 02:04:55 mail postfix/smtpd\[3996\]: warning: unknown\[87.246.7.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun 14 02:35:05 mail postfix/smtpd\[6655\]: warning: unknown\[87.246.7.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-06-14 08:38:34
141.98.81.42 attackspam
Jun 14 01:40:40 debian64 sshd[19864]: Failed password for root from 141.98.81.42 port 22973 ssh2
Jun 14 01:41:01 debian64 sshd[19940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.42 
...
2020-06-14 07:57:57
141.98.81.208 attack
Jun 13 05:47:55 XXX sshd[63093]: Invalid user Administrator from 141.98.81.208 port 29273
2020-06-14 08:05:53

最近上报的IP列表

117.8.23.80 208.172.236.176 212.57.148.66 134.73.20.12
27.36.86.242 53.212.67.194 200.196.242.119 181.132.118.166
105.250.42.193 89.199.18.161 213.243.78.72 100.29.246.190
129.184.94.155 45.120.51.181 14.143.190.178 184.184.128.101
118.100.54.90 74.98.19.57 182.179.207.69 46.94.210.88