必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Lelystad

省份(region): Flevoland

国家(country): The Netherlands

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
194.26.192.114 spambotsattack
Wordpress hack attempt
Automatic report - Banned IP Access
2023-02-18 15:54:58
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '194.26.192.0 - 194.26.192.255'

% Abuse contact for '194.26.192.0 - 194.26.192.255' is 'abuse@as210558.net'

inetnum:        194.26.192.0 - 194.26.192.255
netname:        DE-1337SERVICES-20211028
country:        NL
org:            ORG-SG394-RIPE
admin-c:        SN9633-RIPE
tech-c:         SN9633-RIPE
status:         ALLOCATED PA
mnt-by:         lir-de-1337services-1-MNT
mnt-by:         RIPE-NCC-HM-MNT
created:        2021-10-28T13:13:30Z
last-modified:  2025-04-12T17:15:48Z
source:         RIPE
descr:          1337 Services GmbH
geofeed:        https://rdp.sh/geofeed

organisation:   ORG-SG394-RIPE
org-name:       1337 Services GmbH
country:        DE
org-type:       LIR
address:        Ludwig-Erhard-Str. 18
address:        20459
address:        Hamburg
address:        GERMANY
phone:          +4941218302498
admin-c:        SN9633-RIPE
tech-c:         SN9633-RIPE
abuse-c:        AR65902-RIPE
mnt-ref:        lir-de-1337services-1-MNT
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         lir-de-1337services-1-MNT
created:        2021-10-27T09:01:37Z
last-modified:  2024-11-14T13:24:02Z
source:         RIPE # Filtered
mnt-ref:        SERVPERSO-MNT

role:           1337 Services NOC
address:        GERMANY
address:        Hamburg
address:        20459
address:        Ludwig-Erhard-Str. 18
phone:          +4941218302498
nic-hdl:        SN9633-RIPE
mnt-by:         lir-de-1337services-1-MNT
created:        2021-10-27T09:01:36Z
last-modified:  2023-08-02T16:50:34Z
source:         RIPE # Filtered

% Information related to '194.26.192.0/24AS210558'

route:          194.26.192.0/24
origin:         AS210558
mnt-by:         lir-de-1337services-1-MNT
mnt-by:         lir-de-1337services-1-MNT
created:        2022-03-10T11:04:17Z
last-modified:  2022-03-10T11:04:17Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.120 (ABERDEEN)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.26.192.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22080
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.26.192.19.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026022302 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 24 10:30:10 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
19.192.26.194.in-addr.arpa domain name pointer 194.26.192.19.powered.by.rdp.sh.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
19.192.26.194.in-addr.arpa	name = 194.26.192.19.powered.by.rdp.sh.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
201.17.93.79 attackspambots
Honeypot attack, port: 5555, PTR: c9115d4f.virtua.com.br.
2020-02-20 04:23:04
187.207.63.120 attack
port scan and connect, tcp 23 (telnet)
2020-02-20 04:15:14
185.81.99.206 attack
Feb 19 17:08:02 sip sshd[8011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.81.99.206
Feb 19 17:08:04 sip sshd[8011]: Failed password for invalid user dingwei from 185.81.99.206 port 44590 ssh2
Feb 19 17:27:16 sip sshd[12950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.81.99.206
2020-02-20 04:44:57
92.118.161.57 attackspam
trying to access non-authorized port
2020-02-20 04:35:22
217.128.185.234 attackbotsspam
Feb 19 14:29:26 rotator sshd\[22449\]: Invalid user deployer from 217.128.185.234Feb 19 14:29:28 rotator sshd\[22449\]: Failed password for invalid user deployer from 217.128.185.234 port 52582 ssh2Feb 19 14:30:13 rotator sshd\[22821\]: Invalid user www from 217.128.185.234Feb 19 14:30:15 rotator sshd\[22821\]: Failed password for invalid user www from 217.128.185.234 port 55048 ssh2Feb 19 14:31:07 rotator sshd\[23201\]: Failed password for list from 217.128.185.234 port 57762 ssh2Feb 19 14:31:55 rotator sshd\[23206\]: Invalid user admin from 217.128.185.234
...
2020-02-20 04:42:48
202.57.160.131 attackbots
Feb 19 19:21:47 XXXXXX sshd[12319]: Invalid user shinken from 202.57.160.131 port 34796
2020-02-20 04:22:47
107.200.127.153 attackbots
2020-02-19T14:32:02.6529951240 sshd\[21610\]: Invalid user pi from 107.200.127.153 port 52424
2020-02-19T14:32:02.7658561240 sshd\[21612\]: Invalid user pi from 107.200.127.153 port 52426
2020-02-19T14:32:02.7827601240 sshd\[21610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.200.127.153
...
2020-02-20 04:36:22
82.120.103.254 attack
20/2/19@10:40:55: FAIL: Alarm-Intrusion address from=82.120.103.254
...
2020-02-20 04:29:38
52.91.86.16 attack
[18/Feb/2020:01:40:05 -0500] "GET / HTTP/1.1" Chrome 51.0 UA
2020-02-20 04:12:46
201.76.115.102 attackbots
Feb 19 21:14:28 MK-Soft-VM8 sshd[3352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.76.115.102 
Feb 19 21:14:30 MK-Soft-VM8 sshd[3352]: Failed password for invalid user tom from 201.76.115.102 port 36808 ssh2
...
2020-02-20 04:33:51
49.88.112.69 attackspambots
Feb 19 20:18:59 server sshd[1322236]: Failed password for root from 49.88.112.69 port 23462 ssh2
Feb 19 20:19:03 server sshd[1322236]: Failed password for root from 49.88.112.69 port 23462 ssh2
Feb 19 20:19:06 server sshd[1322236]: Failed password for root from 49.88.112.69 port 23462 ssh2
2020-02-20 04:18:49
212.156.151.182 attack
Unauthorized connection attempt from IP address 212.156.151.182 on Port 445(SMB)
2020-02-20 04:22:33
124.77.208.167 attackspam
Unauthorized connection attempt from IP address 124.77.208.167 on Port 445(SMB)
2020-02-20 04:42:22
162.217.224.233 attack
tcp 2323
2020-02-20 04:23:30
186.96.65.226 attackspambots
Unauthorized connection attempt from IP address 186.96.65.226 on Port 445(SMB)
2020-02-20 04:33:21

最近上报的IP列表

121.43.118.205 192.36.137.155 10.43.208.203 124.239.14.175
95.214.52.209 47.246.174.120 27.46.125.40 124.221.248.247
159.89.51.193 118.78.163.6 20.169.107.229 212.11.61.20
43.156.116.171 66.253.5.20 122.10.116.162 34.142.201.109
121.127.34.138 44.203.84.138 104.248.131.169 67.205.176.14