必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.168.132.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4062
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.168.132.21.			IN	A

;; AUTHORITY SECTION:
.			214	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 22:12:04 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
21.132.168.194.in-addr.arpa domain name pointer 21-132-168-194.static.virginm.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.132.168.194.in-addr.arpa	name = 21-132-168-194.static.virginm.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
162.241.37.220 attackspam
F2B jail: sshd. Time: 2019-11-15 08:44:42, Reported by: VKReport
2019-11-15 19:08:56
81.22.45.74 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 74 - port: 5902 proto: TCP cat: Misc Attack
2019-11-15 18:47:07
128.199.133.201 attackspambots
Nov 15 02:42:04 ny01 sshd[3502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.133.201
Nov 15 02:42:07 ny01 sshd[3502]: Failed password for invalid user ramsaran from 128.199.133.201 port 50913 ssh2
Nov 15 02:46:18 ny01 sshd[3863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.133.201
2019-11-15 18:54:36
124.232.163.91 attackbots
Nov 15 09:28:46 ns37 sshd[897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.232.163.91
2019-11-15 19:10:46
41.234.17.0 attack
Unauthorised access (Nov 15) SRC=41.234.17.0 LEN=52 TTL=52 ID=3635 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-15 18:39:25
185.43.209.215 attack
Nov 15 11:50:05 andromeda postfix/smtpd\[55118\]: warning: unknown\[185.43.209.215\]: SASL LOGIN authentication failed: authentication failure
Nov 15 11:50:06 andromeda postfix/smtpd\[55118\]: warning: unknown\[185.43.209.215\]: SASL LOGIN authentication failed: authentication failure
Nov 15 11:50:06 andromeda postfix/smtpd\[55118\]: warning: unknown\[185.43.209.215\]: SASL LOGIN authentication failed: authentication failure
Nov 15 11:50:06 andromeda postfix/smtpd\[55118\]: warning: unknown\[185.43.209.215\]: SASL LOGIN authentication failed: authentication failure
Nov 15 11:50:06 andromeda postfix/smtpd\[55118\]: warning: unknown\[185.43.209.215\]: SASL LOGIN authentication failed: authentication failure
2019-11-15 18:52:15
173.45.164.2 attack
Nov 15 07:17:03 meumeu sshd[15467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.45.164.2 
Nov 15 07:17:06 meumeu sshd[15467]: Failed password for invalid user aw from 173.45.164.2 port 38074 ssh2
Nov 15 07:23:30 meumeu sshd[16228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.45.164.2 
...
2019-11-15 19:08:30
171.239.194.242 attackbotsspam
Brute force SMTP login attempts.
2019-11-15 18:56:32
192.144.164.229 attack
Nov 15 11:39:59 SilenceServices sshd[2661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.164.229
Nov 15 11:40:02 SilenceServices sshd[2661]: Failed password for invalid user gdm from 192.144.164.229 port 47700 ssh2
Nov 15 11:44:38 SilenceServices sshd[4308]: Failed password for root from 192.144.164.229 port 57254 ssh2
2019-11-15 19:01:42
119.29.134.163 attackspambots
SSH Brute-Force attacks
2019-11-15 19:11:18
80.191.140.28 attackbots
jannisjulius.de 80.191.140.28 \[15/Nov/2019:07:24:17 +0100\] "POST /wp-login.php HTTP/1.1" 200 6658 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
jannisjulius.de 80.191.140.28 \[15/Nov/2019:07:24:19 +0100\] "POST /wp-login.php HTTP/1.1" 200 6621 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
jannisjulius.de 80.191.140.28 \[15/Nov/2019:07:24:20 +0100\] "POST /xmlrpc.php HTTP/1.1" 200 4093 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-15 18:38:03
84.92.108.4 attackspam
Fail2Ban Ban Triggered
2019-11-15 19:05:40
200.212.22.178 attack
Unauthorised access (Nov 15) SRC=200.212.22.178 LEN=52 PREC=0x20 TTL=107 ID=28760 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov 12) SRC=200.212.22.178 LEN=52 PREC=0x20 TTL=107 ID=28592 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-15 18:57:57
182.252.0.188 attackspambots
2019-11-15T09:00:01.866943abusebot.cloudsearch.cf sshd\[26575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.252.0.188  user=root
2019-11-15 19:01:14
177.191.101.221 attack
$f2bV_matches
2019-11-15 18:40:32

最近上报的IP列表

194.167.84.160 194.169.191.55 194.168.159.101 194.167.15.74
194.167.110.61 194.169.193.245 194.169.160.159 194.169.160.79
194.169.193.231 194.169.227.206 194.169.240.5 194.169.240.16
194.169.240.7 194.169.80.220 194.169.80.211 194.169.80.221
194.169.240.4 183.18.82.46 194.17.166.204 194.170.30.28