必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.64.13.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31101
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.64.13.248.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 22:41:35 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
248.13.64.194.in-addr.arpa domain name pointer C2400DF8.dslbycall.de.easynet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
248.13.64.194.in-addr.arpa	name = C2400DF8.dslbycall.de.easynet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
120.70.101.103 attackspambots
Oct 28 07:14:32 mail sshd[10122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.101.103  user=root
Oct 28 07:14:34 mail sshd[10122]: Failed password for root from 120.70.101.103 port 33717 ssh2
Oct 28 07:23:04 mail sshd[11107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.101.103  user=root
Oct 28 07:23:06 mail sshd[11107]: Failed password for root from 120.70.101.103 port 60179 ssh2
Oct 28 07:27:46 mail sshd[11680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.101.103  user=root
Oct 28 07:27:47 mail sshd[11680]: Failed password for root from 120.70.101.103 port 49599 ssh2
...
2019-10-28 17:38:58
65.229.5.158 attackbotsspam
Oct 28 04:37:46 sshgateway sshd\[27955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.229.5.158  user=root
Oct 28 04:37:48 sshgateway sshd\[27955\]: Failed password for root from 65.229.5.158 port 46120 ssh2
Oct 28 04:44:25 sshgateway sshd\[27975\]: Invalid user kq from 65.229.5.158
2019-10-28 18:04:31
218.27.204.33 attack
Oct 28 04:48:18 lnxmysql61 sshd[7525]: Failed password for root from 218.27.204.33 port 58976 ssh2
Oct 28 04:48:18 lnxmysql61 sshd[7525]: Failed password for root from 218.27.204.33 port 58976 ssh2
2019-10-28 17:49:59
139.155.71.154 attack
Oct 28 06:28:05 pl3server sshd[21773]: Invalid user ubnt from 139.155.71.154
Oct 28 06:28:05 pl3server sshd[21773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.71.154
Oct 28 06:28:07 pl3server sshd[21773]: Failed password for invalid user ubnt from 139.155.71.154 port 43678 ssh2
Oct 28 06:28:07 pl3server sshd[21773]: Received disconnect from 139.155.71.154: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=139.155.71.154
2019-10-28 17:32:18
104.248.121.67 attackbotsspam
Oct 28 08:30:00 OPSO sshd\[26054\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.121.67  user=root
Oct 28 08:30:01 OPSO sshd\[26054\]: Failed password for root from 104.248.121.67 port 49793 ssh2
Oct 28 08:34:01 OPSO sshd\[26878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.121.67  user=root
Oct 28 08:34:03 OPSO sshd\[26878\]: Failed password for root from 104.248.121.67 port 40743 ssh2
Oct 28 08:37:52 OPSO sshd\[27610\]: Invalid user qhsupport from 104.248.121.67 port 59926
Oct 28 08:37:52 OPSO sshd\[27610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.121.67
2019-10-28 17:42:45
217.68.210.163 attackbotsspam
slow and persistent scanner
2019-10-28 17:49:15
112.170.27.139 attackspambots
$f2bV_matches
2019-10-28 17:47:33
159.203.81.28 attackbotsspam
Oct 28 06:25:29 venus sshd\[30244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.81.28  user=root
Oct 28 06:25:31 venus sshd\[30244\]: Failed password for root from 159.203.81.28 port 56542 ssh2
Oct 28 06:29:17 venus sshd\[30337\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.81.28  user=root
...
2019-10-28 17:29:14
191.232.198.212 attackbots
Triggered by Fail2Ban at Vostok web server
2019-10-28 18:03:51
106.12.47.216 attackbotsspam
Oct 28 10:03:32 vpn01 sshd[29586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.47.216
Oct 28 10:03:34 vpn01 sshd[29586]: Failed password for invalid user supervisor from 106.12.47.216 port 44146 ssh2
...
2019-10-28 17:42:30
138.197.5.224 attackbots
138.197.5.224 - - [28/Oct/2019:06:48:20 +0100] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.5.224 - - [28/Oct/2019:06:48:20 +0100] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.5.224 - - [28/Oct/2019:06:48:21 +0100] "POST /wp-login.php HTTP/1.1" 200 1486 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.5.224 - - [28/Oct/2019:06:48:21 +0100] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.5.224 - - [28/Oct/2019:06:48:21 +0100] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.5.224 - - [28/Oct/2019:06:48:21 +0100] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-10-28 17:39:40
89.185.44.43 attack
WordPress wp-login brute force :: 89.185.44.43 0.084 BYPASS [28/Oct/2019:05:41:28  0000] [censored_4] "POST /wp-login.php HTTP/1.1" 200 1525 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-28 17:28:12
191.232.196.4 attack
Oct 28 05:48:50 MK-Soft-VM7 sshd[18251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.232.196.4 
Oct 28 05:48:52 MK-Soft-VM7 sshd[18251]: Failed password for invalid user yh from 191.232.196.4 port 9396 ssh2
...
2019-10-28 17:41:10
213.79.125.30 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2019-10-28 17:33:44
68.183.84.213 attackbotsspam
10/28/2019-04:48:57.586375 68.183.84.213 Protocol: 6 ET POLICY Cleartext WordPress Login
2019-10-28 17:33:02

最近上报的IP列表

210.87.179.232 248.203.252.217 131.29.203.24 222.18.33.80
231.240.35.3 246.1.45.62 177.9.112.33 221.74.200.17
57.236.93.1 18.39.244.36 158.129.19.206 166.234.226.51
199.243.76.128 212.222.178.143 207.116.247.173 101.149.144.112
61.29.130.12 49.13.79.18 88.4.94.120 99.229.68.250