必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Linares

省份(region): Maule Region

国家(country): Chile

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.20.157.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60702
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;190.20.157.193.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040202 1800 900 604800 86400

;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 05:37:27 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
193.157.20.190.in-addr.arpa domain name pointer 190-20-157-193.baf.movistar.cl.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
193.157.20.190.in-addr.arpa	name = 190-20-157-193.baf.movistar.cl.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
206.189.165.94 attack
Dec  6 23:43:15 hanapaa sshd\[14259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.165.94  user=root
Dec  6 23:43:17 hanapaa sshd\[14259\]: Failed password for root from 206.189.165.94 port 47348 ssh2
Dec  6 23:49:18 hanapaa sshd\[14770\]: Invalid user whelan from 206.189.165.94
Dec  6 23:49:19 hanapaa sshd\[14770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.165.94
Dec  6 23:49:20 hanapaa sshd\[14770\]: Failed password for invalid user whelan from 206.189.165.94 port 40218 ssh2
2019-12-07 18:05:59
91.134.248.230 attack
91.134.248.230 - - \[07/Dec/2019:07:27:23 +0100\] "POST /wp-login.php HTTP/1.0" 200 7656 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
91.134.248.230 - - \[07/Dec/2019:07:27:24 +0100\] "POST /wp-login.php HTTP/1.0" 200 7486 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
91.134.248.230 - - \[07/Dec/2019:07:27:25 +0100\] "POST /wp-login.php HTTP/1.0" 200 7480 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-12-07 18:27:09
223.97.28.220 attackbots
UTC: 2019-12-06 pkts: 2 port: 23/tcp
2019-12-07 18:27:40
112.85.42.178 attackbotsspam
Dec  7 11:46:55 server sshd\[29583\]: User root from 112.85.42.178 not allowed because listed in DenyUsers
Dec  7 11:46:56 server sshd\[29583\]: Failed none for invalid user root from 112.85.42.178 port 34240 ssh2
Dec  7 11:46:57 server sshd\[29583\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.178  user=root
Dec  7 11:46:58 server sshd\[29583\]: Failed password for invalid user root from 112.85.42.178 port 34240 ssh2
Dec  7 11:47:01 server sshd\[29583\]: Failed password for invalid user root from 112.85.42.178 port 34240 ssh2
2019-12-07 17:55:17
222.186.175.154 attackspam
Dec  7 11:15:33 vpn01 sshd[25933]: Failed password for root from 222.186.175.154 port 19172 ssh2
Dec  7 11:15:49 vpn01 sshd[25933]: error: maximum authentication attempts exceeded for root from 222.186.175.154 port 19172 ssh2 [preauth]
...
2019-12-07 18:25:42
167.172.203.211 attackbotsspam
2019-12-07T10:06:03.637566shield sshd\[792\]: Invalid user kfserver from 167.172.203.211 port 44014
2019-12-07T10:06:03.644228shield sshd\[792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.203.211
2019-12-07T10:06:05.912784shield sshd\[792\]: Failed password for invalid user kfserver from 167.172.203.211 port 44014 ssh2
2019-12-07T10:06:38.420646shield sshd\[833\]: Invalid user kfserver from 167.172.203.211 port 42230
2019-12-07T10:06:38.426129shield sshd\[833\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.203.211
2019-12-07 18:12:10
68.34.15.8 attackspam
Dec  7 04:47:48 TORMINT sshd\[25750\]: Invalid user jorgensen from 68.34.15.8
Dec  7 04:47:48 TORMINT sshd\[25750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.34.15.8
Dec  7 04:47:50 TORMINT sshd\[25750\]: Failed password for invalid user jorgensen from 68.34.15.8 port 44272 ssh2
...
2019-12-07 17:54:01
45.114.158.142 attack
Unauthorised access (Dec  7) SRC=45.114.158.142 LEN=40 TTL=47 ID=24301 TCP DPT=23 WINDOW=17777 SYN 
Unauthorised access (Dec  7) SRC=45.114.158.142 LEN=40 TTL=49 ID=64052 TCP DPT=23 WINDOW=29235 SYN
2019-12-07 18:09:08
121.156.223.232 attack
Dec  4 15:46:10 indra sshd[15214]: Invalid user dbus from 121.156.223.232
Dec  4 15:46:10 indra sshd[15214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.156.223.232 
Dec  4 15:46:11 indra sshd[15214]: Failed password for invalid user dbus from 121.156.223.232 port 41882 ssh2
Dec  4 15:46:13 indra sshd[15214]: Received disconnect from 121.156.223.232: 11: Bye Bye [preauth]
Dec  4 17:31:04 indra sshd[37153]: Invalid user biard from 121.156.223.232
Dec  4 17:31:04 indra sshd[37153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.156.223.232 
Dec  4 17:31:06 indra sshd[37153]: Failed password for invalid user biard from 121.156.223.232 port 44481 ssh2
Dec  4 17:31:06 indra sshd[37153]: Received disconnect from 121.156.223.232: 11: Bye Bye [preauth]
Dec  4 17:31:49 indra sshd[37307]: Invalid user walthers from 121.156.223.232
Dec  4 17:31:49 indra sshd[37307]: pam_unix(sshd:auth): au........
-------------------------------
2019-12-07 17:54:52
187.141.128.42 attackbotsspam
2019-12-07T10:11:32.418532abusebot-5.cloudsearch.cf sshd\[5309\]: Invalid user guest from 187.141.128.42 port 60572
2019-12-07 18:14:27
51.91.108.124 attackspam
Dec  7 11:48:28 server sshd\[9164\]: Invalid user info from 51.91.108.124
Dec  7 11:48:28 server sshd\[9164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.ip-51-91-108.eu 
Dec  7 11:48:30 server sshd\[9164\]: Failed password for invalid user info from 51.91.108.124 port 52226 ssh2
Dec  7 11:54:19 server sshd\[10552\]: Invalid user ubnt from 51.91.108.124
Dec  7 11:54:19 server sshd\[10552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.ip-51-91-108.eu 
...
2019-12-07 17:56:08
176.115.100.201 attackspam
2019-12-07T09:01:27.881482abusebot-3.cloudsearch.cf sshd\[9320\]: Invalid user rvillavicencio from 176.115.100.201 port 56884
2019-12-07 18:28:58
106.13.87.133 attackspambots
Dec  7 01:19:40 linuxvps sshd\[50250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.87.133  user=root
Dec  7 01:19:42 linuxvps sshd\[50250\]: Failed password for root from 106.13.87.133 port 44740 ssh2
Dec  7 01:27:31 linuxvps sshd\[54658\]: Invalid user traynor from 106.13.87.133
Dec  7 01:27:31 linuxvps sshd\[54658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.87.133
Dec  7 01:27:33 linuxvps sshd\[54658\]: Failed password for invalid user traynor from 106.13.87.133 port 45636 ssh2
2019-12-07 18:18:27
177.85.60.17 attack
Port Scan
2019-12-07 18:16:59
113.141.66.255 attackbots
Dec  7 10:37:01 Ubuntu-1404-trusty-64-minimal sshd\[18983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.141.66.255  user=root
Dec  7 10:37:03 Ubuntu-1404-trusty-64-minimal sshd\[18983\]: Failed password for root from 113.141.66.255 port 36835 ssh2
Dec  7 10:54:40 Ubuntu-1404-trusty-64-minimal sshd\[31254\]: Invalid user dacasin from 113.141.66.255
Dec  7 10:54:40 Ubuntu-1404-trusty-64-minimal sshd\[31254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.141.66.255
Dec  7 10:54:43 Ubuntu-1404-trusty-64-minimal sshd\[31254\]: Failed password for invalid user dacasin from 113.141.66.255 port 59923 ssh2
2019-12-07 18:31:45

最近上报的IP列表

37.49.226.140 43.121.66.248 116.26.211.66 80.159.218.90
202.157.231.133 218.95.37.3 95.68.135.140 39.44.127.95
65.224.20.217 71.140.220.79 47.133.21.230 125.227.79.91
54.234.47.254 71.164.100.224 110.84.19.205 52.81.201.144
143.105.42.41 152.201.21.157 197.72.136.148 23.111.191.51