必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Austria

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 188.21.68.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31095
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;188.21.68.133.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 17:48:43 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 133.68.21.188.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 133.68.21.188.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
152.136.50.26 attackbotsspam
Nov  6 23:41:47 v22019058497090703 sshd[7626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.50.26
Nov  6 23:41:48 v22019058497090703 sshd[7626]: Failed password for invalid user jie from 152.136.50.26 port 57848 ssh2
Nov  6 23:46:06 v22019058497090703 sshd[7927]: Failed password for root from 152.136.50.26 port 39718 ssh2
...
2019-11-07 07:14:24
106.75.148.95 attackbotsspam
Automatic report - Banned IP Access
2019-11-07 07:10:05
183.88.41.114 attackbots
Unauthorised access (Nov  7) SRC=183.88.41.114 LEN=60 TTL=48 ID=31457 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-07 07:32:38
197.231.255.162 attack
Nov  6 12:58:02 web1 sshd\[26298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.231.255.162  user=root
Nov  6 12:58:04 web1 sshd\[26298\]: Failed password for root from 197.231.255.162 port 42260 ssh2
Nov  6 13:05:41 web1 sshd\[26962\]: Invalid user db2inst1 from 197.231.255.162
Nov  6 13:05:41 web1 sshd\[26962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.231.255.162
Nov  6 13:05:43 web1 sshd\[26962\]: Failed password for invalid user db2inst1 from 197.231.255.162 port 51764 ssh2
2019-11-07 07:28:07
114.67.73.66 attack
RDPBruteElK
2019-11-07 07:42:27
188.166.77.159 attack
2019-11-06T23:03:34.911910abusebot-6.cloudsearch.cf sshd\[28453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.77.159  user=root
2019-11-07 07:16:47
180.168.36.86 attackspambots
Nov  7 00:05:39 dedicated sshd[10898]: Invalid user hcf from 180.168.36.86 port 2822
2019-11-07 07:34:26
46.101.43.224 attackbotsspam
$f2bV_matches
2019-11-07 07:17:25
182.151.214.104 attackspam
2019-11-06T23:32:30.410569shield sshd\[8090\]: Invalid user pa@123 from 182.151.214.104 port 8213
2019-11-06T23:32:30.415064shield sshd\[8090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.151.214.104
2019-11-06T23:32:32.704855shield sshd\[8090\]: Failed password for invalid user pa@123 from 182.151.214.104 port 8213 ssh2
2019-11-06T23:37:09.934860shield sshd\[8483\]: Invalid user newone from 182.151.214.104 port 8215
2019-11-06T23:37:09.939112shield sshd\[8483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.151.214.104
2019-11-07 07:40:25
222.186.173.180 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180  user=root
Failed password for root from 222.186.173.180 port 14236 ssh2
Failed password for root from 222.186.173.180 port 14236 ssh2
Failed password for root from 222.186.173.180 port 14236 ssh2
Failed password for root from 222.186.173.180 port 14236 ssh2
2019-11-07 07:31:07
51.38.186.47 attackbots
Nov  7 00:39:55 server sshd\[15532\]: Invalid user git4 from 51.38.186.47 port 47096
Nov  7 00:39:55 server sshd\[15532\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.47
Nov  7 00:39:58 server sshd\[15532\]: Failed password for invalid user git4 from 51.38.186.47 port 47096 ssh2
Nov  7 00:43:26 server sshd\[26447\]: User root from 51.38.186.47 not allowed because listed in DenyUsers
Nov  7 00:43:26 server sshd\[26447\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.47  user=root
2019-11-07 07:30:16
212.200.118.98 attackbotsspam
postfix
2019-11-07 07:12:34
62.75.230.4 attackspambots
Nov  6 23:44:13 andromeda sshd\[14074\]: Invalid user admin from 62.75.230.4 port 60879
Nov  6 23:44:13 andromeda sshd\[14074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.75.230.4
Nov  6 23:44:15 andromeda sshd\[14074\]: Failed password for invalid user admin from 62.75.230.4 port 60879 ssh2
2019-11-07 07:41:23
106.13.199.128 attackspambots
Nov  7 01:25:37 server sshd\[13840\]: Invalid user admin from 106.13.199.128
Nov  7 01:25:37 server sshd\[13840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.199.128 
Nov  7 01:25:39 server sshd\[13840\]: Failed password for invalid user admin from 106.13.199.128 port 50838 ssh2
Nov  7 01:43:33 server sshd\[18228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.199.128  user=root
Nov  7 01:43:35 server sshd\[18228\]: Failed password for root from 106.13.199.128 port 33446 ssh2
...
2019-11-07 07:17:11
187.75.7.142 attackspambots
May 24 04:38:20 vbuntu sshd[14425]: warning: /etc/hosts.allow, line 11: can't verify hostname: getaddrinfo(187-75-7-142.dsl.telesp.net.br, AF_INET) failed
May 24 04:38:20 vbuntu sshd[14425]: refused connect from 187.75.7.142 (187.75.7.142)
May 24 04:43:07 vbuntu sshd[14579]: warning: /etc/hosts.allow, line 11: can't verify hostname: getaddrinfo(187-75-7-142.dsl.telesp.net.br, AF_INET) failed
May 24 04:43:07 vbuntu sshd[14579]: refused connect from 187.75.7.142 (187.75.7.142)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=187.75.7.142
2019-11-07 07:09:46

最近上报的IP列表

224.219.166.149 220.33.182.120 127.162.205.235 164.167.99.203
148.105.20.213 41.97.110.141 120.34.33.144 233.24.230.63
202.43.41.137 117.164.135.226 137.251.128.193 97.89.54.205
127.110.155.135 154.92.160.231 115.115.95.255 49.107.189.11
246.35.183.193 215.177.4.86 239.49.145.44 254.93.115.99