必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.46.135.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43584
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;21.46.135.136.			IN	A

;; AUTHORITY SECTION:
.			576	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100900 1800 900 604800 86400

;; Query time: 106 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 10 01:26:13 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
Host 136.135.46.21.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 136.135.46.21.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
79.190.119.50 attackspambots
Sep 16 01:22:16 [host] sshd[30947]: Invalid user natasha from 79.190.119.50
Sep 16 01:22:16 [host] sshd[30947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.190.119.50
Sep 16 01:22:18 [host] sshd[30947]: Failed password for invalid user natasha from 79.190.119.50 port 34294 ssh2
2019-09-16 07:27:49
36.110.39.217 attackbots
$f2bV_matches
2019-09-16 07:32:24
200.16.132.202 attackbots
Sep 16 01:22:21 cvbmail sshd\[22364\]: Invalid user ftp from 200.16.132.202
Sep 16 01:22:21 cvbmail sshd\[22364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.16.132.202
Sep 16 01:22:23 cvbmail sshd\[22364\]: Failed password for invalid user ftp from 200.16.132.202 port 33335 ssh2
2019-09-16 07:24:32
94.15.4.86 attack
[ssh] SSH attack
2019-09-16 07:44:44
108.222.68.232 attackbotsspam
Sep 15 13:17:27 hiderm sshd\[20675\]: Invalid user fang from 108.222.68.232
Sep 15 13:17:27 hiderm sshd\[20675\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=108-222-68-232.lightspeed.sntcca.sbcglobal.net
Sep 15 13:17:29 hiderm sshd\[20675\]: Failed password for invalid user fang from 108.222.68.232 port 47928 ssh2
Sep 15 13:22:01 hiderm sshd\[21120\]: Invalid user printul from 108.222.68.232
Sep 15 13:22:02 hiderm sshd\[21120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=108-222-68-232.lightspeed.sntcca.sbcglobal.net
2019-09-16 07:37:35
167.114.192.162 attackbotsspam
Sep 16 01:18:26 v22019058497090703 sshd[20902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.192.162
Sep 16 01:18:28 v22019058497090703 sshd[20902]: Failed password for invalid user user3 from 167.114.192.162 port 31399 ssh2
Sep 16 01:22:06 v22019058497090703 sshd[21173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.192.162
...
2019-09-16 07:33:07
182.234.89.109 attackbotsspam
Sep 16 01:21:23 dev0-dcfr-rnet sshd[4074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.234.89.109
Sep 16 01:21:23 dev0-dcfr-rnet sshd[4075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.234.89.109
Sep 16 01:21:25 dev0-dcfr-rnet sshd[4074]: Failed password for invalid user pi from 182.234.89.109 port 45510 ssh2
2019-09-16 07:58:55
172.105.23.36 attackbotsspam
" "
2019-09-16 07:32:45
71.217.180.92 attackspam
$f2bV_matches
2019-09-16 07:47:57
31.0.243.76 attackspam
Sep 16 01:21:21 saschabauer sshd[23930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.0.243.76
Sep 16 01:21:23 saschabauer sshd[23930]: Failed password for invalid user ubnt from 31.0.243.76 port 46360 ssh2
2019-09-16 07:59:11
211.120.75.58 attackspam
Sep 14 01:41:41 db01 sshd[15622]: Failed password for r.r from 211.120.75.58 port 47336 ssh2
Sep 14 01:41:44 db01 sshd[15622]: Failed password for r.r from 211.120.75.58 port 47336 ssh2
Sep 14 01:41:47 db01 sshd[15622]: Failed password for r.r from 211.120.75.58 port 47336 ssh2
Sep 14 01:41:49 db01 sshd[15622]: Failed password for r.r from 211.120.75.58 port 47336 ssh2
Sep 14 01:41:52 db01 sshd[15622]: Failed password for r.r from 211.120.75.58 port 47336 ssh2
Sep 14 01:41:56 db01 sshd[15622]: Failed password for r.r from 211.120.75.58 port 47336 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=211.120.75.58
2019-09-16 07:50:56
222.186.31.136 attack
2019-09-15T23:58:03.210653abusebot.cloudsearch.cf sshd\[24852\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.136  user=root
2019-09-16 08:00:21
128.199.142.138 attack
Sep 16 02:22:38 www4 sshd\[19683\]: Invalid user musikbot from 128.199.142.138
Sep 16 02:22:38 www4 sshd\[19683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.138
Sep 16 02:22:41 www4 sshd\[19683\]: Failed password for invalid user musikbot from 128.199.142.138 port 44392 ssh2
...
2019-09-16 07:34:44
147.135.255.107 attack
Sep 16 01:46:30 OPSO sshd\[4655\]: Invalid user wuchunpeng from 147.135.255.107 port 50256
Sep 16 01:46:30 OPSO sshd\[4655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.255.107
Sep 16 01:46:31 OPSO sshd\[4655\]: Failed password for invalid user wuchunpeng from 147.135.255.107 port 50256 ssh2
Sep 16 01:55:39 OPSO sshd\[7413\]: Invalid user catego from 147.135.255.107 port 33942
Sep 16 01:55:39 OPSO sshd\[7413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.255.107
2019-09-16 08:03:08
54.38.185.87 attack
Sep 15 19:24:54 plusreed sshd[18150]: Invalid user psimiyu from 54.38.185.87
...
2019-09-16 07:39:53

最近上报的IP列表

31.148.120.161 118.69.35.91 106.13.39.248 183.82.81.199
31.184.198.231 95.174.103.156 217.91.51.74 203.160.165.2
107.207.57.23 122.129.84.98 180.252.122.33 203.217.122.107
31.154.34.38 178.128.52.126 43.229.89.31 77.222.113.115
149.56.91.140 213.153.197.136 14.139.49.234 69.108.224.2