必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Amsterdam

省份(region): Noord Holland

国家(country): The Netherlands

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.234.159.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20158
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.234.159.119.			IN	A

;; AUTHORITY SECTION:
.			269	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024052300 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 23 22:58:44 CST 2024
;; MSG SIZE  rcvd: 107
HOST信息:
Host 119.159.234.20.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 119.159.234.20.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
49.88.112.55 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.55  user=root
Failed password for root from 49.88.112.55 port 3572 ssh2
Failed password for root from 49.88.112.55 port 3572 ssh2
Failed password for root from 49.88.112.55 port 3572 ssh2
Failed password for root from 49.88.112.55 port 3572 ssh2
2020-02-04 21:43:14
49.206.191.163 attackspambots
Automatic report - XMLRPC Attack
2020-02-04 21:54:54
122.51.147.181 attackbots
Feb  4 15:05:55 markkoudstaal sshd[23592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.147.181
Feb  4 15:05:56 markkoudstaal sshd[23592]: Failed password for invalid user ps-admin from 122.51.147.181 port 44814 ssh2
Feb  4 15:09:15 markkoudstaal sshd[24152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.147.181
2020-02-04 22:13:45
183.82.109.42 attack
" "
2020-02-04 21:42:35
14.211.3.202 attack
2019-09-25 15:57:41 H=\(ledlight.top.com\) \[14.211.3.202\]:36224 I=\[193.107.88.166\]:25 sender verify fail for \: Unrouteable address
2019-09-25 15:57:41 H=\(ledlight.top.com\) \[14.211.3.202\]:36175 I=\[193.107.88.166\]:25 sender verify fail for \: Unrouteable address
2019-09-25 15:57:41 H=\(ledlight.top.com\) \[14.211.3.202\]:36224 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-09-25 15:57:41 H=\(ledlight.top.com\) \[14.211.3.202\]:36175 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-02-04 22:00:39
80.66.81.86 attackspam
2020-02-04 14:19:04 dovecot_login authenticator failed for \(\[80.66.81.86\]\) \[80.66.81.86\]: 535 Incorrect authentication data \(set_id=giorgio@opso.it\)
2020-02-04 14:19:14 dovecot_login authenticator failed for \(\[80.66.81.86\]\) \[80.66.81.86\]: 535 Incorrect authentication data
2020-02-04 14:19:25 dovecot_login authenticator failed for \(\[80.66.81.86\]\) \[80.66.81.86\]: 535 Incorrect authentication data
2020-02-04 14:19:31 dovecot_login authenticator failed for \(\[80.66.81.86\]\) \[80.66.81.86\]: 535 Incorrect authentication data
2020-02-04 14:19:44 dovecot_login authenticator failed for \(\[80.66.81.86\]\) \[80.66.81.86\]: 535 Incorrect authentication data
2020-02-04 21:33:02
187.188.6.210 attackspam
unauthorized connection attempt
2020-02-04 21:45:34
14.187.221.10 attackbotsspam
2019-06-22 15:11:51 1hefo3-00062S-7R SMTP connection from \(static.vnpt.vn\) \[14.187.221.10\]:13152 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-22 15:12:26 1hefoe-00063E-J2 SMTP connection from \(static.vnpt.vn\) \[14.187.221.10\]:13359 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-22 15:12:41 1hefou-00063U-70 SMTP connection from \(static.vnpt.vn\) \[14.187.221.10\]:13455 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-04 22:15:47
185.10.186.211 spam
Nespresso <> 
they want you to test a coffee machine.
2020-02-04 21:51:21
77.247.110.19 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 71 - port: 5070 proto: UDP cat: Misc Attack
2020-02-04 21:47:09
14.211.0.215 attack
2019-11-07 20:21:16 H=\(ledlight.top.com\) \[14.211.0.215\]:44420 I=\[193.107.88.166\]:25 sender verify fail for \: Unrouteable address
2019-11-07 20:21:16 H=\(ledlight.top.com\) \[14.211.0.215\]:44420 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-11-07 20:22:51 H=\(ledlight.top.com\) \[14.211.0.215\]:44482 I=\[193.107.88.166\]:25 sender verify fail for \: Unrouteable address
2019-11-07 20:22:51 H=\(ledlight.top.com\) \[14.211.0.215\]:44482 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-02-04 22:01:04
103.26.43.202 attack
Feb  4 15:15:26 dedicated sshd[7307]: Invalid user zabbix from 103.26.43.202 port 57934
2020-02-04 22:18:21
23.247.88.200 attackspambots
Feb  4 05:52:23 icecube postfix/smtpd[43598]: NOQUEUE: reject: RCPT from unknown[23.247.88.200]: 554 5.7.1 Service unavailable; Client host [23.247.88.200] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=
2020-02-04 21:37:45
202.116.237.20 attackspambots
Feb  4 04:38:26 serwer sshd\[13602\]: User ftpuser from 202.116.237.20 not allowed because not listed in AllowUsers
Feb  4 04:38:26 serwer sshd\[13602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.116.237.20  user=ftpuser
Feb  4 04:38:28 serwer sshd\[13602\]: Failed password for invalid user ftpuser from 202.116.237.20 port 53568 ssh2
Feb  4 04:51:00 serwer sshd\[15123\]: Invalid user cochiloco from 202.116.237.20 port 27405
Feb  4 04:51:00 serwer sshd\[15123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.116.237.20
Feb  4 04:51:02 serwer sshd\[15123\]: Failed password for invalid user cochiloco from 202.116.237.20 port 27405 ssh2
Feb  4 04:53:09 serwer sshd\[15335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.116.237.20  user=root
Feb  4 04:53:11 serwer sshd\[15335\]: Failed password for root from 202.116.237.20 port 35685 ssh2
Feb 
...
2020-02-04 21:41:59
159.203.74.227 attackbots
Feb  4 15:05:57 silence02 sshd[23949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.74.227
Feb  4 15:05:59 silence02 sshd[23949]: Failed password for invalid user byuan from 159.203.74.227 port 34468 ssh2
Feb  4 15:09:16 silence02 sshd[24251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.74.227
2020-02-04 22:17:57

最近上报的IP列表

28.173.136.183 214.82.238.166 189.124.103.112 227.115.172.217
238.99.94.198 116.155.244.111 39.177.103.48 45.73.13.54
114.4.69.30 3.133.148.85 204.104.171.134 58.153.243.174
157.235.174.203 225.4.222.166 124.154.154.36 171.51.137.161
59.226.217.160 185.95.75.8 169.84.167.173 49.153.92.211