必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 182.140.100.59
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24850
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;182.140.100.59.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 20:45:21 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 59.100.140.182.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 59.100.140.182.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
92.118.38.53 attackbots
2019-10-10T22:06:40.251488server postfix/smtps/smtpd\[26299\]: warning: unknown\[92.118.38.53\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-10T22:09:58.219406server postfix/smtps/smtpd\[26327\]: warning: unknown\[92.118.38.53\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-10T22:12:54.376433server postfix/smtps/smtpd\[26370\]: warning: unknown\[92.118.38.53\]: SASL LOGIN authentication failed: VXNlcm5hbWU6
2019-10-10T22:16:10.369039server postfix/smtps/smtpd\[26431\]: warning: unknown\[92.118.38.53\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-10T22:19:18.355541server postfix/smtps/smtpd\[26455\]: warning: unknown\[92.118.38.53\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-10-11 05:27:05
222.186.175.167 attackbotsspam
Oct 10 23:35:57 dcd-gentoo sshd[13125]: User root from 222.186.175.167 not allowed because none of user's groups are listed in AllowGroups
Oct 10 23:36:02 dcd-gentoo sshd[13125]: error: PAM: Authentication failure for illegal user root from 222.186.175.167
Oct 10 23:35:57 dcd-gentoo sshd[13125]: User root from 222.186.175.167 not allowed because none of user's groups are listed in AllowGroups
Oct 10 23:36:02 dcd-gentoo sshd[13125]: error: PAM: Authentication failure for illegal user root from 222.186.175.167
Oct 10 23:35:57 dcd-gentoo sshd[13125]: User root from 222.186.175.167 not allowed because none of user's groups are listed in AllowGroups
Oct 10 23:36:02 dcd-gentoo sshd[13125]: error: PAM: Authentication failure for illegal user root from 222.186.175.167
Oct 10 23:36:02 dcd-gentoo sshd[13125]: Failed keyboard-interactive/pam for invalid user root from 222.186.175.167 port 5166 ssh2
...
2019-10-11 05:46:23
121.67.246.142 attack
Oct 10 23:13:57 * sshd[19808]: Failed password for root from 121.67.246.142 port 33768 ssh2
2019-10-11 05:33:47
52.32.116.196 attackspambots
10/10/2019-23:10:12.279884 52.32.116.196 Protocol: 6 SURICATA TLS invalid record/traffic
2019-10-11 05:29:09
49.232.23.127 attack
Oct 10 21:15:14 localhost sshd\[17305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.23.127  user=root
Oct 10 21:15:15 localhost sshd\[17305\]: Failed password for root from 49.232.23.127 port 49614 ssh2
Oct 10 21:18:33 localhost sshd\[17407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.23.127  user=root
Oct 10 21:18:35 localhost sshd\[17407\]: Failed password for root from 49.232.23.127 port 45544 ssh2
Oct 10 21:21:59 localhost sshd\[17481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.23.127  user=root
...
2019-10-11 05:34:50
217.69.5.90 attack
Chat Spam
2019-10-11 05:39:37
222.68.173.10 attackbots
Oct 10 11:39:41 hpm sshd\[14861\]: Invalid user admin from 222.68.173.10
Oct 10 11:39:41 hpm sshd\[14861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.68.173.10
Oct 10 11:39:43 hpm sshd\[14861\]: Failed password for invalid user admin from 222.68.173.10 port 39182 ssh2
Oct 10 11:43:40 hpm sshd\[15225\]: Invalid user user from 222.68.173.10
Oct 10 11:43:40 hpm sshd\[15225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.68.173.10
2019-10-11 05:44:51
173.241.21.82 attack
Oct 10 10:34:49 web9 sshd\[32069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.241.21.82  user=root
Oct 10 10:34:52 web9 sshd\[32069\]: Failed password for root from 173.241.21.82 port 43878 ssh2
Oct 10 10:38:32 web9 sshd\[32608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.241.21.82  user=root
Oct 10 10:38:34 web9 sshd\[32608\]: Failed password for root from 173.241.21.82 port 55396 ssh2
Oct 10 10:42:04 web9 sshd\[630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.241.21.82  user=root
2019-10-11 05:09:01
180.101.125.162 attackbots
Oct 10 21:43:19 mail sshd[25114]: Failed password for root from 180.101.125.162 port 60472 ssh2
...
2019-10-11 05:18:43
113.121.77.23 attackbotsspam
Oct 10 16:03:43 esmtp postfix/smtpd[354]: lost connection after AUTH from unknown[113.121.77.23]
Oct 10 16:03:46 esmtp postfix/smtpd[334]: lost connection after AUTH from unknown[113.121.77.23]
Oct 10 16:03:49 esmtp postfix/smtpd[336]: lost connection after AUTH from unknown[113.121.77.23]
Oct 10 16:03:51 esmtp postfix/smtpd[336]: lost connection after AUTH from unknown[113.121.77.23]
Oct 10 16:03:53 esmtp postfix/smtpd[336]: lost connection after AUTH from unknown[113.121.77.23]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.121.77.23
2019-10-11 05:36:16
178.62.12.192 attack
2019-10-10T23:06:10.269720tmaserv sshd\[22915\]: Invalid user xSw@zAq! from 178.62.12.192 port 48718
2019-10-10T23:06:10.274367tmaserv sshd\[22915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.12.192
2019-10-10T23:06:11.862782tmaserv sshd\[22915\]: Failed password for invalid user xSw@zAq! from 178.62.12.192 port 48718 ssh2
2019-10-10T23:10:05.751536tmaserv sshd\[22962\]: Invalid user ROOT@2017 from 178.62.12.192 port 60634
2019-10-10T23:10:05.756977tmaserv sshd\[22962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.12.192
2019-10-10T23:10:08.271966tmaserv sshd\[22962\]: Failed password for invalid user ROOT@2017 from 178.62.12.192 port 60634 ssh2
...
2019-10-11 05:02:34
122.53.62.83 attackspambots
Oct 10 11:33:22 kapalua sshd\[29945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.53.62.83  user=root
Oct 10 11:33:24 kapalua sshd\[29945\]: Failed password for root from 122.53.62.83 port 18579 ssh2
Oct 10 11:38:06 kapalua sshd\[30354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.53.62.83  user=root
Oct 10 11:38:08 kapalua sshd\[30354\]: Failed password for root from 122.53.62.83 port 28956 ssh2
Oct 10 11:42:57 kapalua sshd\[30916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.53.62.83  user=root
2019-10-11 05:45:16
106.12.68.235 attackbots
ssh failed login
2019-10-11 05:44:00
61.163.229.226 attackspam
Dovecot Brute-Force
2019-10-11 05:28:36
106.12.205.227 attack
Oct 10 10:44:49 hpm sshd\[9722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.205.227  user=root
Oct 10 10:44:51 hpm sshd\[9722\]: Failed password for root from 106.12.205.227 port 59954 ssh2
Oct 10 10:49:08 hpm sshd\[10103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.205.227  user=root
Oct 10 10:49:11 hpm sshd\[10103\]: Failed password for root from 106.12.205.227 port 38642 ssh2
Oct 10 10:53:28 hpm sshd\[10475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.205.227  user=root
2019-10-11 05:09:47

最近上报的IP列表

237.114.246.137 189.246.108.228 145.189.201.34 173.30.148.218
227.191.226.49 148.249.89.124 68.204.121.50 122.130.26.51
60.219.4.67 147.82.8.145 200.140.41.207 221.109.29.50
189.78.40.210 149.218.115.168 196.192.73.190 20.73.75.64
179.69.66.14 20.167.99.252 135.52.53.121 219.152.240.146