必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Kazakhstan

运营商(isp): Kazakhtelecom

主机名(hostname): unknown

机构(organization): JSC Kazakhtelecom

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.132.208.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65296
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.132.208.146.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061200 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 12 22:28:17 CST 2019
;; MSG SIZE  rcvd: 117

HOST信息:
146.208.132.2.in-addr.arpa domain name pointer 2.132.208.146.megaline.telecom.kz.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
146.208.132.2.in-addr.arpa	name = 2.132.208.146.megaline.telecom.kz.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
18.181.81.161 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-09-17 02:47:21
157.230.220.179 attackspam
Sep 16 17:28:41 nopemail auth.info sshd[16319]: Disconnected from authenticating user root 157.230.220.179 port 41876 [preauth]
...
2020-09-17 02:51:14
198.100.146.65 attackspam
2020-09-15 UTC: (42x) - controlling,ftptest,gian,lishan,orasit,pedro,root(32x),shader,support,trainer,vinay
2020-09-17 02:51:58
5.79.135.91 attackspam
Sep 16 14:02:10 logopedia-1vcpu-1gb-nyc1-01 sshd[353518]: Invalid user admin from 5.79.135.91 port 45824
...
2020-09-17 03:42:46
68.183.83.38 attack
2020-09-16T19:23:37+0200 Failed SSH Authentication/Brute Force Attack. (Server 9)
2020-09-17 03:22:44
5.190.229.89 attackspambots
Icarus honeypot on github
2020-09-17 02:46:04
218.210.32.106 attackspam
Sep 16 14:02:20 logopedia-1vcpu-1gb-nyc1-01 sshd[353542]: Invalid user admin from 218.210.32.106 port 33402
...
2020-09-17 03:29:47
111.251.44.110 attackbots
Sep 16 14:02:23 logopedia-1vcpu-1gb-nyc1-01 sshd[353564]: Failed password for root from 111.251.44.110 port 52678 ssh2
...
2020-09-17 03:24:07
51.77.146.170 attackbotsspam
Sep 16 19:19:01 h1745522 sshd[17134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.146.170  user=root
Sep 16 19:19:03 h1745522 sshd[17134]: Failed password for root from 51.77.146.170 port 35580 ssh2
Sep 16 19:22:07 h1745522 sshd[17242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.146.170  user=root
Sep 16 19:22:09 h1745522 sshd[17242]: Failed password for root from 51.77.146.170 port 56198 ssh2
Sep 16 19:24:59 h1745522 sshd[17324]: Invalid user dalia from 51.77.146.170 port 48592
Sep 16 19:24:59 h1745522 sshd[17324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.146.170
Sep 16 19:24:59 h1745522 sshd[17324]: Invalid user dalia from 51.77.146.170 port 48592
Sep 16 19:25:01 h1745522 sshd[17324]: Failed password for invalid user dalia from 51.77.146.170 port 48592 ssh2
Sep 16 19:27:51 h1745522 sshd[17437]: Invalid user user from 51.77.146.170 p
...
2020-09-17 02:50:22
124.244.82.52 attackbots
Sep 16 17:01:39 ssh2 sshd[64164]: User root from 124244082052.ctinets.com not allowed because not listed in AllowUsers
Sep 16 17:01:39 ssh2 sshd[64164]: Failed password for invalid user root from 124.244.82.52 port 47191 ssh2
Sep 16 17:01:39 ssh2 sshd[64164]: Connection closed by invalid user root 124.244.82.52 port 47191 [preauth]
...
2020-09-17 03:18:01
49.235.132.88 attackbots
Sep 16 18:44:11 email sshd\[24321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.132.88  user=root
Sep 16 18:44:13 email sshd\[24321\]: Failed password for root from 49.235.132.88 port 34878 ssh2
Sep 16 18:48:22 email sshd\[25128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.132.88  user=lp
Sep 16 18:48:24 email sshd\[25128\]: Failed password for lp from 49.235.132.88 port 54996 ssh2
Sep 16 18:52:34 email sshd\[25914\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.132.88  user=root
...
2020-09-17 03:26:19
181.114.208.137 attackbots
Sep 15 18:28:52 mail.srvfarm.net postfix/smtpd[2805938]: warning: unknown[181.114.208.137]: SASL PLAIN authentication failed: 
Sep 15 18:28:56 mail.srvfarm.net postfix/smtpd[2805938]: lost connection after AUTH from unknown[181.114.208.137]
Sep 15 18:31:48 mail.srvfarm.net postfix/smtpd[2805902]: warning: unknown[181.114.208.137]: SASL PLAIN authentication failed: 
Sep 15 18:31:48 mail.srvfarm.net postfix/smtpd[2805902]: lost connection after AUTH from unknown[181.114.208.137]
Sep 15 18:31:59 mail.srvfarm.net postfix/smtps/smtpd[2819938]: warning: unknown[181.114.208.137]: SASL PLAIN authentication failed:
2020-09-17 02:44:15
103.36.102.244 attack
web-1 [ssh_2] SSH Attack
2020-09-17 02:58:58
118.97.213.194 attack
This client attempted to login to an administrator account on a Website, or abused from another resource.
2020-09-17 02:59:31
118.89.241.214 attack
Time:     Wed Sep 16 16:41:44 2020 +0000
IP:       118.89.241.214 (CN/China/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 16 16:26:20 vps3 sshd[11057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.241.214  user=root
Sep 16 16:26:22 vps3 sshd[11057]: Failed password for root from 118.89.241.214 port 35079 ssh2
Sep 16 16:38:05 vps3 sshd[13638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.241.214  user=root
Sep 16 16:38:07 vps3 sshd[13638]: Failed password for root from 118.89.241.214 port 40053 ssh2
Sep 16 16:41:41 vps3 sshd[14453]: Invalid user romanenko from 118.89.241.214 port 18224
2020-09-17 02:59:45

最近上报的IP列表

211.138.43.228 70.165.68.149 156.207.8.219 1.164.72.134
110.119.117.14 188.39.126.58 210.172.63.198 105.132.229.79
61.239.33.228 180.7.225.141 132.170.186.214 142.113.66.195
160.24.6.96 77.34.148.159 219.157.94.135 122.27.12.118
110.164.128.37 154.193.115.155 89.36.214.4 194.194.141.179