必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Zürich

省份(region): Zurich

国家(country): Switzerland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.41.132.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64515
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;192.41.132.1.			IN	A

;; AUTHORITY SECTION:
.			162	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051600 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 16 17:19:42 CST 2023
;; MSG SIZE  rcvd: 105
HOST信息:
1.132.41.192.in-addr.arpa domain name pointer nat-wlan-eduroam-192-41-132-001.uzh.ch.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
1.132.41.192.in-addr.arpa	name = nat-wlan-eduroam-192-41-132-001.uzh.ch.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.41.150.187 attackbots
Sep 20 08:23:05 OPSO sshd\[4981\]: Invalid user git from 46.41.150.187 port 37248
Sep 20 08:23:05 OPSO sshd\[4981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.41.150.187
Sep 20 08:23:07 OPSO sshd\[4981\]: Failed password for invalid user git from 46.41.150.187 port 37248 ssh2
Sep 20 08:27:12 OPSO sshd\[5778\]: Invalid user input from 46.41.150.187 port 48182
Sep 20 08:27:12 OPSO sshd\[5778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.41.150.187
2019-09-20 17:00:51
82.64.80.109 attackbotsspam
Automatic report - Banned IP Access
2019-09-20 16:50:41
222.186.180.19 attackbotsspam
Sep 20 08:30:41 ip-172-31-1-72 sshd\[22004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.19  user=root
Sep 20 08:30:42 ip-172-31-1-72 sshd\[22004\]: Failed password for root from 222.186.180.19 port 33936 ssh2
Sep 20 08:31:09 ip-172-31-1-72 sshd\[22011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.19  user=root
Sep 20 08:31:11 ip-172-31-1-72 sshd\[22011\]: Failed password for root from 222.186.180.19 port 4372 ssh2
Sep 20 08:31:43 ip-172-31-1-72 sshd\[22015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.19  user=root
2019-09-20 16:42:44
202.98.213.218 attackspambots
Sep 19 20:11:22 auw2 sshd\[12430\]: Invalid user lubdhaka from 202.98.213.218
Sep 19 20:11:22 auw2 sshd\[12430\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.98.213.218
Sep 19 20:11:25 auw2 sshd\[12430\]: Failed password for invalid user lubdhaka from 202.98.213.218 port 47321 ssh2
Sep 19 20:17:01 auw2 sshd\[12951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.98.213.218  user=root
Sep 19 20:17:03 auw2 sshd\[12951\]: Failed password for root from 202.98.213.218 port 31206 ssh2
2019-09-20 16:29:48
138.68.158.109 attack
$f2bV_matches
2019-09-20 16:46:26
119.28.222.88 attackspambots
Sep 20 05:25:36 fr01 sshd[9736]: Invalid user oj from 119.28.222.88
Sep 20 05:25:36 fr01 sshd[9736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.222.88
Sep 20 05:25:36 fr01 sshd[9736]: Invalid user oj from 119.28.222.88
Sep 20 05:25:38 fr01 sshd[9736]: Failed password for invalid user oj from 119.28.222.88 port 58268 ssh2
...
2019-09-20 16:48:11
222.186.175.8 attack
Sep 20 03:31:05 aat-srv002 sshd[5077]: Failed password for root from 222.186.175.8 port 51364 ssh2
Sep 20 03:31:21 aat-srv002 sshd[5077]: error: maximum authentication attempts exceeded for root from 222.186.175.8 port 51364 ssh2 [preauth]
Sep 20 03:31:38 aat-srv002 sshd[5087]: Failed password for root from 222.186.175.8 port 62236 ssh2
Sep 20 03:31:59 aat-srv002 sshd[5087]: Failed password for root from 222.186.175.8 port 62236 ssh2
Sep 20 03:31:59 aat-srv002 sshd[5087]: error: maximum authentication attempts exceeded for root from 222.186.175.8 port 62236 ssh2 [preauth]
...
2019-09-20 16:34:13
103.117.33.84 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/103.117.33.84/ 
 IN - 1H : (36)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : IN 
 NAME ASN : ASN137609 
 
 IP : 103.117.33.84 
 
 CIDR : 103.117.33.0/24 
 
 PREFIX COUNT : 4 
 
 UNIQUE IP COUNT : 1024 
 
 
 WYKRYTE ATAKI Z ASN137609 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery
2019-09-20 16:56:33
62.210.207.193 attackspambots
Sep 20 10:34:37 SilenceServices sshd[5399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.207.193
Sep 20 10:34:39 SilenceServices sshd[5399]: Failed password for invalid user noaccess from 62.210.207.193 port 52470 ssh2
Sep 20 10:38:22 SilenceServices sshd[6844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.207.193
2019-09-20 16:41:10
151.80.36.188 attackbots
Sep 19 20:01:25 sachi sshd\[25421\]: Invalid user support1 from 151.80.36.188
Sep 19 20:01:25 sachi sshd\[25421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3006809.ip-151-80-36.eu
Sep 19 20:01:27 sachi sshd\[25421\]: Failed password for invalid user support1 from 151.80.36.188 port 51034 ssh2
Sep 19 20:06:09 sachi sshd\[25841\]: Invalid user czpl from 151.80.36.188
Sep 19 20:06:09 sachi sshd\[25841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3006809.ip-151-80-36.eu
2019-09-20 16:47:45
81.171.98.183 attack
Admin Joomla Attack
2019-09-20 16:52:35
77.74.196.3 attackbots
19/9/20@04:31:27: FAIL: Alarm-Intrusion address from=77.74.196.3
...
2019-09-20 16:58:43
152.250.252.179 attack
Invalid user die from 152.250.252.179 port 47276
2019-09-20 16:44:38
101.71.2.111 attackspambots
SSH Brute-Force reported by Fail2Ban
2019-09-20 16:31:46
49.235.7.47 attack
Invalid user katharina from 49.235.7.47 port 44846
2019-09-20 16:20:01

最近上报的IP列表

140.113.89.175 129.215.149.112 140.125.35.9 138.204.113.85
199.17.220.177 140.116.245.219 156.99.18.77 140.116.54.232
193.140.151.160 140.116.138.3 140.116.219.44 133.9.4.19
130.245.42.142 140.116.102.100 140.116.38.131 150.254.42.193
140.116.132.75 181.236.162.69 114.9.214.42 163.15.159.99