必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Andorra

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.158.75.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39062
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.158.75.39.			IN	A

;; AUTHORITY SECTION:
.			468	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 20:38:39 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
39.75.158.194.in-addr.arpa domain name pointer m194-158-75-39.andorpac.ad.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
39.75.158.194.in-addr.arpa	name = m194-158-75-39.andorpac.ad.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.104.255.2 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2019-06-27/07-29]7pkt,1pt.(tcp)
2019-07-30 14:02:34
183.82.104.43 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2019-06-24/07-29]8pkt,1pt.(tcp)
2019-07-30 13:44:31
45.112.22.168 attackbots
SMB Server BruteForce Attack
2019-07-30 14:07:57
198.27.81.223 attackbots
Jul 30 00:30:35 aat-srv002 sshd[31356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.27.81.223
Jul 30 00:30:37 aat-srv002 sshd[31356]: Failed password for invalid user claire from 198.27.81.223 port 34234 ssh2
Jul 30 00:35:08 aat-srv002 sshd[31429]: Failed password for root from 198.27.81.223 port 57824 ssh2
...
2019-07-30 14:14:06
49.69.175.232 attackbots
Automatic report - Port Scan Attack
2019-07-30 14:35:18
153.36.242.143 attack
2019-07-30T12:40:00.147251enmeeting.mahidol.ac.th sshd\[21334\]: User root from 153.36.242.143 not allowed because not listed in AllowUsers
2019-07-30T12:40:03.330504enmeeting.mahidol.ac.th sshd\[21334\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.143  user=root
2019-07-30T12:40:13.972732enmeeting.mahidol.ac.th sshd\[21344\]: User root from 153.36.242.143 not allowed because not listed in AllowUsers
...
2019-07-30 13:50:23
104.148.64.135 attackspam
Jul 30 04:21:07 mxgate1 postfix/postscreen[8687]: CONNECT from [104.148.64.135]:60088 to [176.31.12.44]:25
Jul 30 04:21:07 mxgate1 postfix/dnsblog[8958]: addr 104.148.64.135 listed by domain zen.spamhaus.org as 127.0.0.3
Jul 30 04:21:13 mxgate1 postfix/postscreen[8687]: DNSBL rank 2 for [104.148.64.135]:60088
Jul x@x
Jul 30 04:21:14 mxgate1 postfix/postscreen[8687]: DISCONNECT [104.148.64.135]:60088


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=104.148.64.135
2019-07-30 13:41:40
105.96.40.88 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-06-11/07-29]4pkt,1pt.(tcp)
2019-07-30 14:12:51
183.60.200.160 attackbots
Jul 30 06:19:00 microserver sshd[31956]: Invalid user teamcity from 183.60.200.160 port 54593
Jul 30 06:19:00 microserver sshd[31956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.60.200.160
Jul 30 06:19:02 microserver sshd[31956]: Failed password for invalid user teamcity from 183.60.200.160 port 54593 ssh2
Jul 30 06:23:40 microserver sshd[32617]: Invalid user oracle from 183.60.200.160 port 48308
Jul 30 06:23:40 microserver sshd[32617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.60.200.160
Jul 30 06:52:07 microserver sshd[36693]: Invalid user ooooo from 183.60.200.160 port 38795
Jul 30 06:52:07 microserver sshd[36693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.60.200.160
Jul 30 06:52:09 microserver sshd[36693]: Failed password for invalid user ooooo from 183.60.200.160 port 38795 ssh2
Jul 30 06:56:44 microserver sshd[37337]: pam_unix(sshd:auth): authentication fai
2019-07-30 14:38:25
221.148.162.110 attackspambots
21/tcp 21/tcp 21/tcp...
[2019-07-10/29]6pkt,1pt.(tcp)
2019-07-30 14:35:38
210.211.101.200 attackspam
445/tcp 445/tcp 445/tcp...
[2019-06-05/07-29]22pkt,1pt.(tcp)
2019-07-30 14:23:06
69.10.47.176 attackbots
445/tcp 445/tcp 445/tcp...
[2019-05-30/07-29]11pkt,1pt.(tcp)
2019-07-30 14:16:44
106.13.144.8 attackspam
2019-07-30T06:12:53.886115abusebot-2.cloudsearch.cf sshd\[4847\]: Invalid user testuser from 106.13.144.8 port 58252
2019-07-30 14:23:38
183.131.82.99 attack
2019-07-30T06:28:45.766895abusebot-8.cloudsearch.cf sshd\[7315\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.131.82.99  user=root
2019-07-30 14:44:45
41.218.200.124 attack
Lines containing failures of 41.218.200.124
Jul 30 04:12:17 MAKserver05 sshd[27595]: Invalid user admin from 41.218.200.124 port 51392
Jul 30 04:12:17 MAKserver05 sshd[27595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.218.200.124 
Jul 30 04:12:20 MAKserver05 sshd[27595]: Failed password for invalid user admin from 41.218.200.124 port 51392 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=41.218.200.124
2019-07-30 14:10:16

最近上报的IP列表

39.186.28.18 36.42.234.247 111.92.75.180 177.249.169.4
177.53.68.98 201.156.219.241 104.152.52.57 58.82.128.41
178.212.51.158 125.71.82.185 113.56.149.96 66.249.73.114
121.40.91.169 103.60.24.169 200.12.31.216 116.98.157.91
178.244.212.222 51.211.172.195 186.37.205.231 124.41.213.201