必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
219.157.181.30 attackbotsspam
Automatic report - Port Scan Attack
2020-04-24 13:25:33
219.157.133.21 attackspam
port scan and connect, tcp 23 (telnet)
2020-03-09 06:38:06
219.157.134.113 attack
$f2bV_matches
2020-03-05 02:51:50
219.157.140.238 attackspambots
[portscan] tcp/23 [TELNET]
[scan/connect: 4 time(s)]
in spfbl.net:'listed'
*(RWIN=29040)(10151156)
2019-10-16 01:03:13
219.157.132.185 attackspambots
Aug 18 13:09:33 dallas01 sshd[5642]: Failed password for root from 219.157.132.185 port 60478 ssh2
Aug 18 13:09:40 dallas01 sshd[5642]: Failed password for root from 219.157.132.185 port 60478 ssh2
Aug 18 13:09:42 dallas01 sshd[5642]: Failed password for root from 219.157.132.185 port 60478 ssh2
Aug 18 13:09:45 dallas01 sshd[5642]: Failed password for root from 219.157.132.185 port 60478 ssh2
Aug 18 13:09:45 dallas01 sshd[5642]: error: maximum authentication attempts exceeded for root from 219.157.132.185 port 60478 ssh2 [preauth]
2019-10-09 02:18:58
219.157.190.53 attackbots
23/tcp
[2019-09-02]1pkt
2019-09-03 07:03:58
219.157.151.21 attackspambots
Unauthorised access (Aug 11) SRC=219.157.151.21 LEN=40 TTL=49 ID=46030 TCP DPT=8080 WINDOW=43585 SYN
2019-08-11 13:44:12
219.157.143.92 attackbotsspam
Honeypot attack, port: 23, PTR: hn.kd.ny.adsl.
2019-07-14 18:16:55
219.157.144.211 attack
SSHScan
2019-07-05 14:25:17
219.157.170.31 attackspam
Attempts against Pop3/IMAP
2019-07-05 08:28:55
219.157.177.180 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-01 23:42:00
219.157.186.207 attackspambots
23/tcp
[2019-06-29]1pkt
2019-06-29 17:38:37
219.157.142.129 attack
37215/tcp
[2019-06-23]1pkt
2019-06-24 05:08:46
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.157.1.208
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4456
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;219.157.1.208.			IN	A

;; AUTHORITY SECTION:
.			159	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 08:18:49 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
208.1.157.219.in-addr.arpa domain name pointer hn.kd.ny.adsl.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
208.1.157.219.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
195.54.160.123 attackspam
Unauthorized connection attempt detected from IP address 195.54.160.123 to port 6800 [T]
2020-05-23 16:12:35
195.54.166.81 attackbots
ET DROP Dshield Block Listed Source group 1 - port: 24083 proto: TCP cat: Misc Attack
2020-05-23 16:09:40
14.29.239.215 attackspambots
SSH invalid-user multiple login try
2020-05-23 15:50:37
49.149.235.76 attackbots
Invalid user service from 49.149.235.76 port 65415
2020-05-23 15:41:39
223.71.167.164 attackbotsspam
SSH login attempts.
2020-05-23 15:53:28
27.4.46.61 attackbots
Invalid user admin from 27.4.46.61 port 57374
2020-05-23 15:49:06
209.141.37.175 attackspam
Invalid user fake from 209.141.37.175 port 60052
2020-05-23 16:02:34
1.2.138.164 attackspambots
Invalid user admin from 1.2.138.164 port 54440
2020-05-23 15:52:33
190.5.242.114 attack
Invalid user ljn from 190.5.242.114 port 33926
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.5.242.114
Failed password for invalid user ljn from 190.5.242.114 port 33926 ssh2
Invalid user hourunping from 190.5.242.114 port 51255
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.5.242.114
2020-05-23 16:16:35
185.175.93.27 attackspam
05/23/2020-02:39:21.405039 185.175.93.27 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-05-23 16:19:51
219.139.131.134 attackspambots
May 18 23:21:42 our-server-hostname sshd[4120]: Invalid user rku from 219.139.131.134
May 18 23:21:42 our-server-hostname sshd[4120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.139.131.134 
May 18 23:21:44 our-server-hostname sshd[4120]: Failed password for invalid user rku from 219.139.131.134 port 59266 ssh2
May 18 23:30:53 our-server-hostname sshd[5727]: Invalid user gld from 219.139.131.134
May 18 23:30:53 our-server-hostname sshd[5727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.139.131.134 
May 18 23:30:55 our-server-hostname sshd[5727]: Failed password for invalid user gld from 219.139.131.134 port 54192 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=219.139.131.134
2020-05-23 15:58:58
220.137.44.237 attack
SmallBizIT.US 1 packets to tcp(23)
2020-05-23 15:55:55
195.54.166.43 attack
Port-scan: detected 102 distinct ports within a 24-hour window.
2020-05-23 16:09:54
185.175.93.104 attackspambots
05/23/2020-04:10:30.531378 185.175.93.104 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-05-23 16:19:21
220.132.182.203 attackbotsspam
SmallBizIT.US 1 packets to tcp(23)
2020-05-23 15:57:17

最近上报的IP列表

219.157.137.62 219.157.133.39 219.157.160.249 219.157.141.250
219.157.18.248 219.157.201.135 219.157.201.207 219.157.18.148
219.157.201.80 219.157.17.140 219.157.182.178 219.157.204.218
219.157.204.149 219.157.22.248 219.157.205.176 219.157.209.213
219.157.222.13 219.157.23.66 219.157.232.219 219.157.215.60