必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom of Great Britain and Northern Ireland (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.159.52.190
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24531
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.159.52.190.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 12:34:16 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
190.52.159.194.in-addr.arpa domain name pointer no-dns-yet.demon.co.uk.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
190.52.159.194.in-addr.arpa	name = no-dns-yet.demon.co.uk.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
191.205.244.126 attackspambots
Unauthorized connection attempt from IP address 191.205.244.126 on Port 445(SMB)
2019-10-02 23:19:30
97.117.124.204 attackspam
Honeypot attack, port: 23, PTR: 97-117-124-204.slkc.qwest.net.
2019-10-02 22:44:43
112.175.120.223 attackspambots
3389BruteforceFW23
2019-10-02 22:50:23
132.232.19.122 attackspambots
Oct  2 14:34:13 lnxded63 sshd[15811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.19.122
2019-10-02 22:52:39
223.220.159.78 attackspam
Oct  2 15:32:58 vps691689 sshd[2185]: Failed password for root from 223.220.159.78 port 41982 ssh2
Oct  2 15:37:39 vps691689 sshd[2277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.220.159.78
...
2019-10-02 22:47:21
222.186.175.212 attackbotsspam
Oct  2 14:34:40 ip-172-31-1-72 sshd\[7146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.212  user=root
Oct  2 14:34:42 ip-172-31-1-72 sshd\[7146\]: Failed password for root from 222.186.175.212 port 1732 ssh2
Oct  2 14:35:04 ip-172-31-1-72 sshd\[7158\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.212  user=root
Oct  2 14:35:06 ip-172-31-1-72 sshd\[7158\]: Failed password for root from 222.186.175.212 port 41872 ssh2
Oct  2 14:35:24 ip-172-31-1-72 sshd\[7158\]: Failed password for root from 222.186.175.212 port 41872 ssh2
2019-10-02 22:39:56
27.105.251.13 attackspam
Honeypot attack, port: 23, PTR: 27-105-251-13-adsl-TPE.dynamic.so-net.net.tw.
2019-10-02 22:48:08
27.92.118.95 attackbotsspam
2019-10-02T15:34:33.688187  sshd[27762]: Invalid user kpuser from 27.92.118.95 port 53700
2019-10-02T15:34:33.701168  sshd[27762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.92.118.95
2019-10-02T15:34:33.688187  sshd[27762]: Invalid user kpuser from 27.92.118.95 port 53700
2019-10-02T15:34:35.171925  sshd[27762]: Failed password for invalid user kpuser from 27.92.118.95 port 53700 ssh2
2019-10-02T15:39:10.910540  sshd[27816]: Invalid user nt from 27.92.118.95 port 45539
...
2019-10-02 22:39:34
211.253.25.21 attack
Oct  2 16:44:20 dedicated sshd[11807]: Invalid user ftpuser from 211.253.25.21 port 45820
2019-10-02 22:47:43
177.103.163.253 attack
Unauthorized connection attempt from IP address 177.103.163.253 on Port 445(SMB)
2019-10-02 23:16:15
198.71.235.62 attack
xmlrpc attack
2019-10-02 23:05:43
46.232.250.120 attackspambots
Oct  1 13:23:57 svapp01 sshd[10798]: Failed password for invalid user r.r_user from 46.232.250.120 port 36688 ssh2
Oct  1 13:23:57 svapp01 sshd[10798]: Received disconnect from 46.232.250.120: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=46.232.250.120
2019-10-02 22:46:31
92.222.79.7 attackspam
Oct  2 15:37:03 saschabauer sshd[4326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.79.7
Oct  2 15:37:05 saschabauer sshd[4326]: Failed password for invalid user astrogildo from 92.222.79.7 port 37822 ssh2
2019-10-02 23:17:15
169.255.31.244 attackspam
Oct  2 13:35:55 ip-172-31-62-245 sshd\[23017\]: Invalid user camera from 169.255.31.244\
Oct  2 13:35:57 ip-172-31-62-245 sshd\[23017\]: Failed password for invalid user camera from 169.255.31.244 port 34830 ssh2\
Oct  2 13:40:54 ip-172-31-62-245 sshd\[23123\]: Invalid user kk from 169.255.31.244\
Oct  2 13:40:56 ip-172-31-62-245 sshd\[23123\]: Failed password for invalid user kk from 169.255.31.244 port 48234 ssh2\
Oct  2 13:45:45 ip-172-31-62-245 sshd\[23164\]: Invalid user lisa4 from 169.255.31.244\
2019-10-02 23:25:45
125.213.150.6 attackspambots
Oct  2 14:53:04 web8 sshd\[22513\]: Invalid user dropbox from 125.213.150.6
Oct  2 14:53:04 web8 sshd\[22513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.213.150.6
Oct  2 14:53:06 web8 sshd\[22513\]: Failed password for invalid user dropbox from 125.213.150.6 port 22218 ssh2
Oct  2 14:58:24 web8 sshd\[25156\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.213.150.6  user=sync
Oct  2 14:58:26 web8 sshd\[25156\]: Failed password for sync from 125.213.150.6 port 62136 ssh2
2019-10-02 23:10:43

最近上报的IP列表

30.53.166.50 30.135.173.150 116.180.89.15 70.123.34.119
60.124.238.39 250.165.202.89 5.19.249.31 172.90.181.34
172.159.163.254 56.178.171.53 195.61.77.98 70.156.26.76
146.155.144.254 196.246.22.224 219.38.123.127 51.231.101.188
41.4.240.180 124.122.201.167 208.255.39.31 146.210.54.41