必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 182.120.139.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42530
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;182.120.139.149.		IN	A

;; AUTHORITY SECTION:
.			451	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 10:09:30 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
149.139.120.182.in-addr.arpa domain name pointer hn.kd.ny.adsl.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.139.120.182.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
60.184.2.220 attack
May  3 14:28:43 h2779839 sshd[6567]: Invalid user administrator from 60.184.2.220 port 45960
May  3 14:28:43 h2779839 sshd[6567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.184.2.220
May  3 14:28:43 h2779839 sshd[6567]: Invalid user administrator from 60.184.2.220 port 45960
May  3 14:28:45 h2779839 sshd[6567]: Failed password for invalid user administrator from 60.184.2.220 port 45960 ssh2
May  3 14:32:20 h2779839 sshd[6622]: Invalid user terrariaserver from 60.184.2.220 port 40998
May  3 14:32:20 h2779839 sshd[6622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.184.2.220
May  3 14:32:20 h2779839 sshd[6622]: Invalid user terrariaserver from 60.184.2.220 port 40998
May  3 14:32:22 h2779839 sshd[6622]: Failed password for invalid user terrariaserver from 60.184.2.220 port 40998 ssh2
May  3 14:35:47 h2779839 sshd[6712]: Invalid user duke from 60.184.2.220 port 34658
...
2020-05-03 22:30:10
124.206.0.236 attackspambots
5x Failed Password
2020-05-03 22:34:37
82.207.41.98 attackspam
Unauthorized connection attempt detected from IP address 82.207.41.98 to port 22
2020-05-03 22:24:34
218.61.47.132 attack
May  3 14:45:18 srv-ubuntu-dev3 sshd[49527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.61.47.132  user=root
May  3 14:45:20 srv-ubuntu-dev3 sshd[49527]: Failed password for root from 218.61.47.132 port 54396 ssh2
May  3 14:48:11 srv-ubuntu-dev3 sshd[49981]: Invalid user dasusr1 from 218.61.47.132
May  3 14:48:11 srv-ubuntu-dev3 sshd[49981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.61.47.132
May  3 14:48:11 srv-ubuntu-dev3 sshd[49981]: Invalid user dasusr1 from 218.61.47.132
May  3 14:48:13 srv-ubuntu-dev3 sshd[49981]: Failed password for invalid user dasusr1 from 218.61.47.132 port 44774 ssh2
May  3 14:51:40 srv-ubuntu-dev3 sshd[50564]: Invalid user user from 218.61.47.132
May  3 14:51:40 srv-ubuntu-dev3 sshd[50564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.61.47.132
May  3 14:51:40 srv-ubuntu-dev3 sshd[50564]: Invalid user user from 21
...
2020-05-03 22:14:17
177.104.251.122 attackspam
May  3 15:58:24 vps647732 sshd[17843]: Failed password for root from 177.104.251.122 port 38460 ssh2
May  3 16:02:43 vps647732 sshd[17888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.104.251.122
...
2020-05-03 22:09:37
182.182.120.186 attack
Brute forcing RDP port 3389
2020-05-03 22:18:03
142.93.109.76 attack
Brute-force attempt banned
2020-05-03 22:08:19
107.150.99.76 attackbotsspam
May  3 16:19:42 tuxlinux sshd[48561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.150.99.76  user=root
May  3 16:19:44 tuxlinux sshd[48561]: Failed password for root from 107.150.99.76 port 37696 ssh2
May  3 16:19:42 tuxlinux sshd[48561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.150.99.76  user=root
May  3 16:19:44 tuxlinux sshd[48561]: Failed password for root from 107.150.99.76 port 37696 ssh2
...
2020-05-03 22:28:48
151.69.170.146 attackspambots
May  3 16:24:40 sip sshd[94710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.69.170.146 
May  3 16:24:40 sip sshd[94710]: Invalid user krodriguez from 151.69.170.146 port 53041
May  3 16:24:42 sip sshd[94710]: Failed password for invalid user krodriguez from 151.69.170.146 port 53041 ssh2
...
2020-05-03 22:25:15
64.225.114.156 attack
[Sun May 03 14:55:44 2020] - DDoS Attack From IP: 64.225.114.156 Port: 41685
2020-05-03 22:26:36
104.131.97.47 attackspambots
May  3 22:10:16 web1 sshd[20924]: Invalid user dst from 104.131.97.47 port 58430
May  3 22:10:16 web1 sshd[20924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.97.47
May  3 22:10:16 web1 sshd[20924]: Invalid user dst from 104.131.97.47 port 58430
May  3 22:10:18 web1 sshd[20924]: Failed password for invalid user dst from 104.131.97.47 port 58430 ssh2
May  3 22:19:49 web1 sshd[25351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.97.47  user=root
May  3 22:19:51 web1 sshd[25351]: Failed password for root from 104.131.97.47 port 59024 ssh2
May  3 22:27:00 web1 sshd[27141]: Invalid user jack from 104.131.97.47 port 42146
May  3 22:27:00 web1 sshd[27141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.97.47
May  3 22:27:00 web1 sshd[27141]: Invalid user jack from 104.131.97.47 port 42146
May  3 22:27:01 web1 sshd[27141]: Failed password for i
...
2020-05-03 22:04:00
45.162.246.220 attack
Automatic report - Port Scan Attack
2020-05-03 22:16:50
202.171.77.14 attackspambots
proto=tcp  .  spt=45415  .  dpt=993  .  src=202.171.77.14  .  dst=xx.xx.4.1  .     Found on   Blocklist de       (232)
2020-05-03 22:13:17
117.211.192.70 attackbots
May  3 12:08:49 124388 sshd[30752]: Failed password for root from 117.211.192.70 port 54304 ssh2
May  3 12:13:41 124388 sshd[30824]: Invalid user diego from 117.211.192.70 port 35770
May  3 12:13:41 124388 sshd[30824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.211.192.70
May  3 12:13:41 124388 sshd[30824]: Invalid user diego from 117.211.192.70 port 35770
May  3 12:13:43 124388 sshd[30824]: Failed password for invalid user diego from 117.211.192.70 port 35770 ssh2
2020-05-03 22:19:41
128.199.88.36 attackspam
May  3 15:03:11 OPSO sshd\[11568\]: Invalid user oracle from 128.199.88.36 port 19085
May  3 15:03:11 OPSO sshd\[11568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.88.36
May  3 15:03:14 OPSO sshd\[11568\]: Failed password for invalid user oracle from 128.199.88.36 port 19085 ssh2
May  3 15:09:00 OPSO sshd\[12394\]: Invalid user zn from 128.199.88.36 port 22601
May  3 15:09:00 OPSO sshd\[12394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.88.36
2020-05-03 22:38:10

最近上报的IP列表

185.32.66.61 103.147.163.12 23.83.81.72 177.249.170.192
31.59.171.147 50.114.128.29 223.95.50.183 100.14.184.81
52.79.103.10 213.196.127.194 179.133.85.5 151.242.192.211
162.158.91.201 45.233.139.7 103.76.188.169 116.87.26.184
94.97.63.123 187.95.210.88 46.139.252.3 59.47.72.33