必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Malaysia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.92.136.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36969
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;219.92.136.41.			IN	A

;; AUTHORITY SECTION:
.			156	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020072600 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jul 26 17:24:08 CST 2020
;; MSG SIZE  rcvd: 117
HOST信息:
41.136.92.219.in-addr.arpa domain name pointer ktg-136-41.tm.net.my.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
41.136.92.219.in-addr.arpa	name = ktg-136-41.tm.net.my.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.14.150.86 attack
Port Scan
...
2020-08-25 01:24:31
173.232.51.168 attackspam
TCP Port: 25     invalid blocked  Listed on   dnsbl-sorbs also zen-spamhaus and MailSpike L3-L5           (109)
2020-08-25 01:14:57
170.254.226.100 attack
fail2ban detected brute force on sshd
2020-08-25 01:19:00
179.225.220.132 attack
Invalid user ed from 179.225.220.132 port 36978
2020-08-25 01:35:26
185.179.82.164 attackspam
Invalid user libuuid from 185.179.82.164 port 45828
2020-08-25 01:15:57
222.186.30.57 attackbots
Aug 24 14:13:11 vps46666688 sshd[11036]: Failed password for root from 222.186.30.57 port 44474 ssh2
...
2020-08-25 01:21:22
139.59.59.75 attack
139.59.59.75 - - [24/Aug/2020:12:48:00 +0100] "POST /wp-login.php HTTP/1.1" 200 2121 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.59.75 - - [24/Aug/2020:12:48:03 +0100] "POST /wp-login.php HTTP/1.1" 200 2116 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.59.75 - - [24/Aug/2020:12:48:10 +0100] "POST /wp-login.php HTTP/1.1" 200 2086 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-25 01:10:11
95.214.52.249 attack
24.08.2020 16:27:18 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2020-08-25 01:32:56
14.192.54.148 attackbots
WEB SPAM: Re: Website Error

Hello,

My name is Sofia and I am a Digital Marketing Specialists for a Creative Agency.

I was doing some industry benchmarking for a client of mine when I came across your website.

I noticed a few technical errors which correspond with a drop of website traffic over the last 2-3 months which I thought I would bring to your attention.

After closer inspection, it appears your site is lacking in 4 key criteria.

1- Website Speed
2- Link Diversity
3- Domain Authority
4- Competition Comparison

I would love the chance to send you all the errors that at least give you a gauge on the quality of what I do.

If you are interested then please share your Phone number and requirements.

Our prices are less than half of what other companies charge.

Thanks
Sofia Jones
sofiaseowebmaster@gmail.com
2020-08-25 01:01:52
27.156.222.100 attack
Aug 24 14:38:03 buvik sshd[19612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.156.222.100
Aug 24 14:38:05 buvik sshd[19612]: Failed password for invalid user gitlab from 27.156.222.100 port 24101 ssh2
Aug 24 14:44:28 buvik sshd[20615]: Invalid user sinusbot from 27.156.222.100
...
2020-08-25 01:32:30
1.10.214.86 attack
1598269648 - 08/24/2020 13:47:28 Host: 1.10.214.86/1.10.214.86 Port: 445 TCP Blocked
2020-08-25 01:37:36
51.254.22.172 attackbotsspam
Aug 24 18:58:05 eventyay sshd[2549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.22.172
Aug 24 18:58:07 eventyay sshd[2549]: Failed password for invalid user teamspeak2 from 51.254.22.172 port 37794 ssh2
Aug 24 19:01:35 eventyay sshd[2634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.22.172
...
2020-08-25 01:25:27
119.86.20.52 attack
Aug 24 15:04:30 vps1 sshd[30173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.86.20.52  user=root
Aug 24 15:04:32 vps1 sshd[30173]: Failed password for invalid user root from 119.86.20.52 port 15796 ssh2
Aug 24 15:05:48 vps1 sshd[30190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.86.20.52 
Aug 24 15:05:50 vps1 sshd[30190]: Failed password for invalid user botuser from 119.86.20.52 port 16576 ssh2
Aug 24 15:08:16 vps1 sshd[30229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.86.20.52 
Aug 24 15:08:18 vps1 sshd[30229]: Failed password for invalid user ze from 119.86.20.52 port 16892 ssh2
...
2020-08-25 01:20:14
89.163.134.246 attackspambots
89.163.134.246 - - [24/Aug/2020:16:10:43 +0200] "POST /wp-login.php HTTP/1.1" 200 5920 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
89.163.134.246 - - [24/Aug/2020:16:10:45 +0200] "POST /wp-login.php HTTP/1.1" 200 5911 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
89.163.134.246 - - [24/Aug/2020:16:20:40 +0200] "POST /wp-login.php HTTP/1.1" 200 5416 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
89.163.134.246 - - [24/Aug/2020:16:20:41 +0200] "POST /wp-login.php HTTP/1.1" 200 5423 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
89.163.134.246 - - [24/Aug/2020:16:20:42 +0200] "POST /wp-login.php HTTP/1.1" 200 5421 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-25 01:24:11
222.186.175.183 attackbotsspam
Aug 24 18:37:49 rocket sshd[22170]: Failed password for root from 222.186.175.183 port 42452 ssh2
Aug 24 18:37:53 rocket sshd[22170]: Failed password for root from 222.186.175.183 port 42452 ssh2
Aug 24 18:37:55 rocket sshd[22170]: Failed password for root from 222.186.175.183 port 42452 ssh2
...
2020-08-25 01:41:29

最近上报的IP列表

88.14.18.243 49.83.36.245 91.245.30.147 241.72.106.76
150.141.241.152 49.235.150.196 187.85.209.210 42.201.167.58
103.76.191.99 62.113.115.209 190.181.3.238 227.195.47.50
85.196.181.222 177.87.253.99 59.95.161.126 72.186.152.188
77.205.166.237 254.231.80.69 71.68.85.229 198.183.215.129