必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Sweden

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.194.168.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39601
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.194.168.145.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 19:35:29 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 145.168.194.159.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 145.168.194.159.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
132.232.43.115 attackspambots
$f2bV_matches
2019-08-24 22:43:17
216.108.227.58 attack
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=216.108.227.58
2019-08-24 22:31:16
222.136.60.215 attackbotsspam
Aug 24 13:08:40 m3061 sshd[1882]: reveeclipse mapping checking getaddrinfo for hn.kd.ny.adsl [222.136.60.215] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug 24 13:08:40 m3061 sshd[1882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.136.60.215  user=r.r
Aug 24 13:08:42 m3061 sshd[1882]: Failed password for r.r from 222.136.60.215 port 43938 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=222.136.60.215
2019-08-24 21:53:10
104.211.224.177 attackbotsspam
Aug 24 15:38:15 root sshd[26774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.224.177 
Aug 24 15:38:17 root sshd[26774]: Failed password for invalid user tiffany from 104.211.224.177 port 45708 ssh2
Aug 24 15:43:12 root sshd[26839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.224.177 
...
2019-08-24 21:57:59
211.75.205.44 attack
" "
2019-08-24 22:17:27
62.159.228.138 attack
Aug 24 16:20:47 intra sshd\[12237\]: Invalid user rock from 62.159.228.138Aug 24 16:20:48 intra sshd\[12237\]: Failed password for invalid user rock from 62.159.228.138 port 7081 ssh2Aug 24 16:24:41 intra sshd\[12268\]: Invalid user javed from 62.159.228.138Aug 24 16:24:42 intra sshd\[12268\]: Failed password for invalid user javed from 62.159.228.138 port 43226 ssh2Aug 24 16:28:41 intra sshd\[12325\]: Invalid user raspberrypi from 62.159.228.138Aug 24 16:28:43 intra sshd\[12325\]: Failed password for invalid user raspberrypi from 62.159.228.138 port 29929 ssh2
...
2019-08-24 21:41:45
163.172.59.60 attack
Aug 24 09:16:55 aat-srv002 sshd[16891]: Failed password for root from 163.172.59.60 port 33702 ssh2
Aug 24 09:22:52 aat-srv002 sshd[17038]: Failed password for root from 163.172.59.60 port 50362 ssh2
Aug 24 09:28:44 aat-srv002 sshd[17178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.59.60
...
2019-08-24 22:50:09
107.175.56.183 attackbotsspam
Invalid user out from 107.175.56.183 port 51438
2019-08-24 22:44:24
192.99.12.24 attack
Aug 24 07:28:38 aat-srv002 sshd[13817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.12.24
Aug 24 07:28:41 aat-srv002 sshd[13817]: Failed password for invalid user guan from 192.99.12.24 port 50184 ssh2
Aug 24 07:32:35 aat-srv002 sshd[13920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.12.24
Aug 24 07:32:37 aat-srv002 sshd[13920]: Failed password for invalid user maustin from 192.99.12.24 port 38868 ssh2
...
2019-08-24 21:55:08
79.117.145.235 attackbotsspam
19/8/24@07:28:54: FAIL: IoT-Telnet address from=79.117.145.235
...
2019-08-24 21:40:06
46.166.151.47 attackspam
\[2019-08-24 09:44:51\] SECURITY\[1837\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-24T09:44:51.869-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0981046462607509",SessionID="0x7f7b3054a0b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/54132",ACLName="no_extension_match"
\[2019-08-24 09:46:26\] SECURITY\[1837\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-24T09:46:26.997-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00981046462607509",SessionID="0x7f7b302170b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/54277",ACLName="no_extension_match"
\[2019-08-24 09:47:54\] SECURITY\[1837\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-24T09:47:54.578-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="71046462607509",SessionID="0x7f7b3054a0b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/59417",ACLName="no_e
2019-08-24 21:54:15
206.81.8.14 attack
Aug 24 03:36:02 sachi sshd\[8473\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.8.14  user=root
Aug 24 03:36:04 sachi sshd\[8473\]: Failed password for root from 206.81.8.14 port 50030 ssh2
Aug 24 03:40:16 sachi sshd\[8951\]: Invalid user ftp2 from 206.81.8.14
Aug 24 03:40:16 sachi sshd\[8951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.8.14
Aug 24 03:40:18 sachi sshd\[8951\]: Failed password for invalid user ftp2 from 206.81.8.14 port 44362 ssh2
2019-08-24 21:50:07
187.16.47.14 attack
Aug 24 01:23:13 auw2 sshd\[11965\]: Invalid user display from 187.16.47.14
Aug 24 01:23:13 auw2 sshd\[11965\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.16.47.14
Aug 24 01:23:15 auw2 sshd\[11965\]: Failed password for invalid user display from 187.16.47.14 port 51512 ssh2
Aug 24 01:28:31 auw2 sshd\[12501\]: Invalid user amin from 187.16.47.14
Aug 24 01:28:31 auw2 sshd\[12501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.16.47.14
2019-08-24 22:01:14
208.90.180.55 attackspam
Aug 24 11:27:48 *** sshd[6454]: Did not receive identification string from 208.90.180.55
2019-08-24 22:37:56
114.236.159.49 attack
Aug 24 13:02:10 web1 sshd[12583]: Invalid user service from 114.236.159.49
Aug 24 13:02:10 web1 sshd[12583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.236.159.49 
Aug 24 13:02:11 web1 sshd[12583]: Failed password for invalid user service from 114.236.159.49 port 60016 ssh2
Aug 24 13:02:14 web1 sshd[12583]: Failed password for invalid user service from 114.236.159.49 port 60016 ssh2
Aug 24 13:02:16 web1 sshd[12583]: Failed password for invalid user service from 114.236.159.49 port 60016 ssh2
Aug 24 13:02:18 web1 sshd[12583]: Failed password for invalid user service from 114.236.159.49 port 60016 ssh2
Aug 24 13:02:20 web1 sshd[12583]: Failed password for invalid user service from 114.236.159.49 port 60016 ssh2
Aug 24 13:02:22 web1 sshd[12583]: Failed password for invalid user service from 114.236.159.49 port 60016 ssh2
Aug 24 13:02:22 web1 sshd[12583]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser........
-------------------------------
2019-08-24 23:01:30

最近上报的IP列表

15.126.16.22 26.216.151.112 170.38.200.43 136.13.98.238
164.35.214.33 59.213.157.178 109.170.69.86 221.185.209.37
53.194.151.212 88.118.144.124 61.126.156.59 154.157.70.137
232.235.138.70 67.25.208.198 240.41.126.195 233.230.162.19
136.121.70.11 193.213.186.80 73.92.46.66 253.124.44.111