必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Bogotá

省份(region): Bogota D.C.

国家(country): Colombia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Telmex Colombia S.A.

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
181.57.140.114 attack
Unauthorized connection attempt from IP address 181.57.140.114 on Port 445(SMB)
2020-09-29 00:33:48
181.57.140.114 attack
20/9/27@17:51:12: FAIL: Alarm-Network address from=181.57.140.114
...
2020-09-28 16:35:50
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 181.57.140.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36807
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;181.57.140.113.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060100 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 01 21:19:21 CST 2019
;; MSG SIZE  rcvd: 118

HOST信息:
113.140.57.181.in-addr.arpa domain name pointer static-ip-18157140113.cable.net.co.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
113.140.57.181.in-addr.arpa	name = static-ip-18157140113.cable.net.co.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
118.113.137.183 attack
Sep 19 14:27:58 lnxweb62 sshd[18340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.113.137.183
2019-09-19 22:28:34
51.254.123.131 attackspam
Sep 19 16:10:16 rpi sshd[10240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.123.131 
Sep 19 16:10:17 rpi sshd[10240]: Failed password for invalid user notebook from 51.254.123.131 port 52562 ssh2
2019-09-19 22:32:46
132.232.47.41 attack
Sep 19 16:13:45 vps647732 sshd[2154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.47.41
Sep 19 16:13:47 vps647732 sshd[2154]: Failed password for invalid user odroid from 132.232.47.41 port 34135 ssh2
...
2019-09-19 22:26:52
154.66.219.20 attack
Sep 19 05:01:49 hpm sshd\[18820\]: Invalid user test from 154.66.219.20
Sep 19 05:01:49 hpm sshd\[18820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.66.219.20
Sep 19 05:01:52 hpm sshd\[18820\]: Failed password for invalid user test from 154.66.219.20 port 37124 ssh2
Sep 19 05:07:26 hpm sshd\[19335\]: Invalid user drughut from 154.66.219.20
Sep 19 05:07:26 hpm sshd\[19335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.66.219.20
2019-09-19 23:09:47
121.138.213.2 attackspam
Sep 19 10:56:32 TORMINT sshd\[31829\]: Invalid user ghm from 121.138.213.2
Sep 19 10:56:32 TORMINT sshd\[31829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.138.213.2
Sep 19 10:56:34 TORMINT sshd\[31829\]: Failed password for invalid user ghm from 121.138.213.2 port 50554 ssh2
...
2019-09-19 23:11:00
104.131.37.34 attack
Sep 19 04:43:55 web1 sshd\[12728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.37.34  user=ftp
Sep 19 04:43:56 web1 sshd\[12728\]: Failed password for ftp from 104.131.37.34 port 39573 ssh2
Sep 19 04:49:00 web1 sshd\[13217\]: Invalid user sama from 104.131.37.34
Sep 19 04:49:00 web1 sshd\[13217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.37.34
Sep 19 04:49:02 web1 sshd\[13217\]: Failed password for invalid user sama from 104.131.37.34 port 60929 ssh2
2019-09-19 22:58:38
69.12.84.164 attack
Sep 19 13:02:13 mxgate1 postfix/postscreen[14538]: CONNECT from [69.12.84.164]:54619 to [176.31.12.44]:25
Sep 19 13:02:13 mxgate1 postfix/dnsblog[14542]: addr 69.12.84.164 listed by domain zen.spamhaus.org as 127.0.0.3
Sep 19 13:02:19 mxgate1 postfix/postscreen[14538]: DNSBL rank 2 for [69.12.84.164]:54619
Sep 19 13:02:19 mxgate1 postfix/tlsproxy[14671]: CONNECT from [69.12.84.164]:54619
Sep x@x
Sep 19 13:02:20 mxgate1 postfix/postscreen[14538]: DISCONNECT [69.12.84.164]:54619
Sep 19 13:02:20 mxgate1 postfix/tlsproxy[14671]: DISCONNECT [69.12.84.164]:54619


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=69.12.84.164
2019-09-19 23:02:00
139.59.18.205 attackbots
leo_www
2019-09-19 22:38:27
192.42.116.14 attack
Sep 19 14:43:39 thevastnessof sshd[12483]: Failed password for root from 192.42.116.14 port 51540 ssh2
...
2019-09-19 22:53:57
58.65.136.170 attackspam
Reported by AbuseIPDB proxy server.
2019-09-19 22:20:41
96.9.251.251 attackspam
Looking for resource vulnerabilities
2019-09-19 23:00:49
133.130.117.173 attack
Sep 19 12:53:38 cp sshd[21915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.117.173
2019-09-19 22:39:24
78.156.226.162 attack
Unauthorized connection attempt from IP address 78.156.226.162 on Port 445(SMB)
2019-09-19 23:01:39
112.85.42.72 attackbots
Sep 19 10:35:27 xentho sshd[9477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.72  user=root
Sep 19 10:35:29 xentho sshd[9477]: Failed password for root from 112.85.42.72 port 33308 ssh2
Sep 19 10:35:32 xentho sshd[9477]: Failed password for root from 112.85.42.72 port 33308 ssh2
Sep 19 10:35:27 xentho sshd[9477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.72  user=root
Sep 19 10:35:29 xentho sshd[9477]: Failed password for root from 112.85.42.72 port 33308 ssh2
Sep 19 10:35:32 xentho sshd[9477]: Failed password for root from 112.85.42.72 port 33308 ssh2
Sep 19 10:35:27 xentho sshd[9477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.72  user=root
Sep 19 10:35:29 xentho sshd[9477]: Failed password for root from 112.85.42.72 port 33308 ssh2
Sep 19 10:35:32 xentho sshd[9477]: Failed password for root from 112.85.42.72 port 33308 
...
2019-09-19 22:41:07
104.236.2.45 attackbots
$f2bV_matches
2019-09-19 22:41:29

最近上报的IP列表

114.205.76.185 184.105.170.39 184.99.26.23 40.248.57.95
218.214.184.73 89.46.108.203 170.24.63.173 99.2.119.27
78.31.71.111 162.221.160.85 212.108.148.22 57.35.247.106
75.25.64.38 175.28.6.13 216.72.226.218 204.38.71.73
217.46.19.151 213.140.60.184 90.45.62.84 89.163.139.27