必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 19.181.68.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61148
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;19.181.68.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 18:04:33 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 139.68.181.19.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.68.181.19.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
5.189.151.184 attackbots
Oct 16 07:49:02 server sshd[30103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.189.151.184  user=r.r
Oct 16 07:49:02 server sshd[30102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.189.151.184  user=r.r
Oct 16 07:49:04 server sshd[30102]: Failed password for r.r from 5.189.151.184 port 44470 ssh2
Oct 16 07:49:04 server sshd[30103]: Failed password for r.r from 5.189.151.184 port 44486 ssh2
Oct 16 07:49:04 server sshd[30102]: Connection closed by 5.189.151.184 [preauth]
Oct 16 07:49:04 server sshd[30103]: Connection closed by 5.189.151.184 [preauth]
Oct 16 07:49:10 server sshd[30111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.189.151.184  user=r.r
Oct 16 07:49:10 server sshd[30113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.189.151.184  user=r.r
Oct 16 07:49:10 server sshd[30117]: pam_........
-------------------------------
2019-10-20 19:12:26
91.196.103.162 attackbots
20.10.2019 05:46:21 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2019-10-20 19:06:07
190.144.135.118 attackbots
Oct 20 07:53:12 ArkNodeAT sshd\[29514\]: Invalid user loyd from 190.144.135.118
Oct 20 07:53:12 ArkNodeAT sshd\[29514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.144.135.118
Oct 20 07:53:14 ArkNodeAT sshd\[29514\]: Failed password for invalid user loyd from 190.144.135.118 port 42855 ssh2
2019-10-20 19:12:54
171.97.35.175 attack
SS1,DEF GET /admin/build/modules
2019-10-20 18:57:13
167.71.228.9 attack
2019-10-20T06:50:40.0578301495-001 sshd\[19866\]: Invalid user teamspeak from 167.71.228.9 port 42602
2019-10-20T06:50:40.0671691495-001 sshd\[19866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.228.9
2019-10-20T06:50:42.1812771495-001 sshd\[19866\]: Failed password for invalid user teamspeak from 167.71.228.9 port 42602 ssh2
2019-10-20T06:54:55.3889241495-001 sshd\[20006\]: Invalid user business from 167.71.228.9 port 54010
2019-10-20T06:54:55.3959511495-001 sshd\[20006\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.228.9
2019-10-20T06:54:56.8486991495-001 sshd\[20006\]: Failed password for invalid user business from 167.71.228.9 port 54010 ssh2
...
2019-10-20 19:11:47
128.199.212.82 attack
Oct 20 00:41:56 ny01 sshd[27134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.212.82
Oct 20 00:41:58 ny01 sshd[27134]: Failed password for invalid user tmp from 128.199.212.82 port 38589 ssh2
Oct 20 00:46:39 ny01 sshd[27560]: Failed password for root from 128.199.212.82 port 57915 ssh2
2019-10-20 18:49:23
206.189.30.73 attack
2019-10-20T05:34:31.3301931495-001 sshd\[17189\]: Failed password for root from 206.189.30.73 port 55890 ssh2
2019-10-20T06:37:49.4159171495-001 sshd\[19412\]: Invalid user 123Qwerty from 206.189.30.73 port 33896
2019-10-20T06:37:49.4229261495-001 sshd\[19412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.30.73
2019-10-20T06:37:51.6925071495-001 sshd\[19412\]: Failed password for invalid user 123Qwerty from 206.189.30.73 port 33896 ssh2
2019-10-20T06:41:02.9627061495-001 sshd\[19487\]: Invalid user Pass@123456 from 206.189.30.73 port 44620
2019-10-20T06:41:02.9713571495-001 sshd\[19487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.30.73
...
2019-10-20 19:17:57
106.13.81.242 attack
Oct 20 08:05:38 Ubuntu-1404-trusty-64-minimal sshd\[14422\]: Invalid user santo from 106.13.81.242
Oct 20 08:05:38 Ubuntu-1404-trusty-64-minimal sshd\[14422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.81.242
Oct 20 08:05:40 Ubuntu-1404-trusty-64-minimal sshd\[14422\]: Failed password for invalid user santo from 106.13.81.242 port 46010 ssh2
Oct 20 08:23:02 Ubuntu-1404-trusty-64-minimal sshd\[29916\]: Invalid user ilanthirayan from 106.13.81.242
Oct 20 08:23:02 Ubuntu-1404-trusty-64-minimal sshd\[29916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.81.242
2019-10-20 19:00:11
185.112.249.9 attack
Oct 15 20:02:59 josie sshd[28252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.112.249.9  user=r.r
Oct 15 20:03:01 josie sshd[28252]: Failed password for r.r from 185.112.249.9 port 42082 ssh2
Oct 15 20:03:01 josie sshd[28254]: Received disconnect from 185.112.249.9: 11: Bye Bye
Oct 15 20:03:02 josie sshd[28275]: Invalid user admin from 185.112.249.9
Oct 15 20:03:02 josie sshd[28275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.112.249.9 
Oct 15 20:03:04 josie sshd[28275]: Failed password for invalid user admin from 185.112.249.9 port 52038 ssh2
Oct 15 20:03:05 josie sshd[28278]: Received disconnect from 185.112.249.9: 11: Bye Bye
Oct 15 20:03:05 josie sshd[28305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.112.249.9  user=r.r
Oct 15 20:03:08 josie sshd[28305]: Failed password for r.r from 185.112.249.9 port 34584 ssh2
Oct 15 2........
-------------------------------
2019-10-20 18:52:34
94.100.167.71 attackbotsspam
20.10.2019 05:46:41 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2019-10-20 18:47:48
112.186.77.118 attackspambots
2019-10-20T05:44:08.273853abusebot-5.cloudsearch.cf sshd\[16385\]: Invalid user bjorn from 112.186.77.118 port 40606
2019-10-20T05:44:08.278697abusebot-5.cloudsearch.cf sshd\[16385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.186.77.118
2019-10-20 19:22:38
113.125.26.101 attack
vps1:sshd-InvalidUser
2019-10-20 19:02:49
54.36.172.105 attackspambots
Invalid user audreym from 54.36.172.105 port 50576
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.172.105
Failed password for invalid user audreym from 54.36.172.105 port 50576 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.172.105  user=root
Failed password for root from 54.36.172.105 port 42016 ssh2
2019-10-20 19:15:07
83.249.145.81 attackspam
Oct 20 05:45:59 tux-35-217 sshd\[7668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.249.145.81  user=root
Oct 20 05:46:00 tux-35-217 sshd\[7668\]: Failed password for root from 83.249.145.81 port 52602 ssh2
Oct 20 05:46:02 tux-35-217 sshd\[7668\]: Failed password for root from 83.249.145.81 port 52602 ssh2
Oct 20 05:46:04 tux-35-217 sshd\[7668\]: Failed password for root from 83.249.145.81 port 52602 ssh2
...
2019-10-20 19:12:07
94.177.213.167 attackspam
Oct 20 06:23:13 unicornsoft sshd\[21581\]: User root from 94.177.213.167 not allowed because not listed in AllowUsers
Oct 20 06:23:13 unicornsoft sshd\[21581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.213.167  user=root
Oct 20 06:23:14 unicornsoft sshd\[21581\]: Failed password for invalid user root from 94.177.213.167 port 59314 ssh2
2019-10-20 19:23:58

最近上报的IP列表

190.89.245.17 121.189.180.228 188.161.237.29 213.210.54.181
130.108.117.64 5.191.217.82 242.158.103.69 219.156.126.161
104.25.68.79 9.125.128.152 210.192.194.131 233.251.222.243
98.12.116.94 240.141.35.250 95.238.156.19 208.49.6.231
104.255.242.183 227.198.6.236 147.35.227.93 168.230.177.182