必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea, Republic of

运营商(isp): SK Broadband Co Ltd

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attack
Invalid user admin from 221.142.135.128 port 47958
2019-10-20 02:45:08
attack
$f2bV_matches
2019-10-17 03:53:06
attack
Oct  6 13:47:22 km20725 sshd\[12551\]: Failed password for root from 221.142.135.128 port 60448 ssh2Oct  6 13:47:23 km20725 sshd\[12551\]: Failed password for root from 221.142.135.128 port 60448 ssh2Oct  6 13:47:26 km20725 sshd\[12551\]: Failed password for root from 221.142.135.128 port 60448 ssh2Oct  6 13:47:28 km20725 sshd\[12551\]: Failed password for root from 221.142.135.128 port 60448 ssh2
...
2019-10-06 21:38:18
attackbots
Reported by AbuseIPDB proxy server.
2019-08-20 07:48:03
attackbots
Invalid user admin from 221.142.135.128 port 33145
2019-08-16 20:31:21
attackspambots
Caught in portsentry honeypot
2019-08-14 05:56:48
attackspambots
2019-08-08T11:20:25.580930lon01.zurich-datacenter.net sshd\[11305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.142.135.128  user=root
2019-08-08T11:20:27.600104lon01.zurich-datacenter.net sshd\[11305\]: Failed password for root from 221.142.135.128 port 41993 ssh2
2019-08-08T11:20:29.833687lon01.zurich-datacenter.net sshd\[11305\]: Failed password for root from 221.142.135.128 port 41993 ssh2
2019-08-08T11:20:31.812785lon01.zurich-datacenter.net sshd\[11305\]: Failed password for root from 221.142.135.128 port 41993 ssh2
2019-08-08T11:20:34.066297lon01.zurich-datacenter.net sshd\[11305\]: Failed password for root from 221.142.135.128 port 41993 ssh2
...
2019-08-08 19:27:47
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.142.135.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57199
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;221.142.135.128.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019080800 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Aug 08 19:27:41 CST 2019
;; MSG SIZE  rcvd: 119
HOST信息:
Host 128.135.142.221.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 128.135.142.221.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
116.110.95.195 attackspambots
Invalid user admin from 116.110.95.195 port 52904
2019-09-15 09:34:58
223.190.127.130 attackbotsspam
Automatic report - Banned IP Access
2019-09-15 09:15:33
202.169.62.187 attackspambots
Sep 14 20:13:38 vpn01 sshd\[3395\]: Invalid user mabad from 202.169.62.187
Sep 14 20:13:38 vpn01 sshd\[3395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.169.62.187
Sep 14 20:13:40 vpn01 sshd\[3395\]: Failed password for invalid user mabad from 202.169.62.187 port 36811 ssh2
2019-09-15 09:02:01
177.102.230.72 attackbotsspam
Sep 14 13:53:00 cumulus sshd[12635]: Invalid user tomcat from 177.102.230.72 port 49726
Sep 14 13:53:00 cumulus sshd[12635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.102.230.72
Sep 14 13:53:02 cumulus sshd[12635]: Failed password for invalid user tomcat from 177.102.230.72 port 49726 ssh2
Sep 14 13:53:02 cumulus sshd[12635]: Received disconnect from 177.102.230.72 port 49726:11: Bye Bye [preauth]
Sep 14 13:53:02 cumulus sshd[12635]: Disconnected from 177.102.230.72 port 49726 [preauth]
Sep 14 14:00:23 cumulus sshd[12882]: Invalid user anne from 177.102.230.72 port 34154
Sep 14 14:00:23 cumulus sshd[12882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.102.230.72


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=177.102.230.72
2019-09-15 09:29:51
142.93.222.197 attackbotsspam
Sep 15 04:05:58 www sshd\[45573\]: Address 142.93.222.197 maps to jira-support.terasoftware.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Sep 15 04:05:58 www sshd\[45573\]: Invalid user ud from 142.93.222.197Sep 15 04:05:59 www sshd\[45573\]: Failed password for invalid user ud from 142.93.222.197 port 55854 ssh2
...
2019-09-15 09:08:49
106.12.89.121 attack
Sep 14 10:15:46 php1 sshd\[18962\]: Invalid user lia from 106.12.89.121
Sep 14 10:15:46 php1 sshd\[18962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.121
Sep 14 10:15:48 php1 sshd\[18962\]: Failed password for invalid user lia from 106.12.89.121 port 59670 ssh2
Sep 14 10:20:12 php1 sshd\[19358\]: Invalid user qwerty from 106.12.89.121
Sep 14 10:20:12 php1 sshd\[19358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.121
2019-09-15 09:35:48
79.137.72.121 attackbots
Sep 15 02:47:53 lnxded64 sshd[3863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.72.121
Sep 15 02:47:53 lnxded64 sshd[3863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.72.121
2019-09-15 09:11:32
167.71.40.112 attackspambots
Sep 14 19:45:15 aat-srv002 sshd[32071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.40.112
Sep 14 19:45:17 aat-srv002 sshd[32071]: Failed password for invalid user 123456 from 167.71.40.112 port 40950 ssh2
Sep 14 19:48:54 aat-srv002 sshd[32206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.40.112
Sep 14 19:48:56 aat-srv002 sshd[32206]: Failed password for invalid user 123 from 167.71.40.112 port 53466 ssh2
...
2019-09-15 09:02:31
88.255.94.185 attack
Automatic report - Port Scan Attack
2019-09-15 09:23:25
157.230.116.99 attackbotsspam
Sep 14 15:42:41 Tower sshd[2594]: Connection from 157.230.116.99 port 49866 on 192.168.10.220 port 22
Sep 14 15:42:42 Tower sshd[2594]: Invalid user teamspeak from 157.230.116.99 port 49866
Sep 14 15:42:42 Tower sshd[2594]: error: Could not get shadow information for NOUSER
Sep 14 15:42:42 Tower sshd[2594]: Failed password for invalid user teamspeak from 157.230.116.99 port 49866 ssh2
Sep 14 15:42:42 Tower sshd[2594]: Received disconnect from 157.230.116.99 port 49866:11: Bye Bye [preauth]
Sep 14 15:42:42 Tower sshd[2594]: Disconnected from invalid user teamspeak 157.230.116.99 port 49866 [preauth]
2019-09-15 09:20:01
46.39.224.200 attack
F2B jail: sshd. Time: 2019-09-15 03:14:57, Reported by: VKReport
2019-09-15 09:27:01
220.225.7.90 attack
Chat Spam
2019-09-15 09:30:40
104.248.191.159 attack
Invalid user git from 104.248.191.159 port 45948
2019-09-15 09:26:14
105.235.193.94 attackbots
proto=tcp  .  spt=37345  .  dpt=25  .     (listed on Blocklist de  Sep 14)     (765)
2019-09-15 08:50:19
51.38.51.200 attack
Sep 15 02:38:40 core sshd[4669]: Invalid user nagios from 51.38.51.200 port 47464
Sep 15 02:38:42 core sshd[4669]: Failed password for invalid user nagios from 51.38.51.200 port 47464 ssh2
...
2019-09-15 08:58:29

最近上报的IP列表

64.20.35.181 27.218.170.99 112.84.91.233 37.6.222.245
180.126.61.160 103.14.34.28 78.188.71.40 80.82.55.71
73.62.149.46 122.61.50.236 3.87.147.63 169.197.112.102
46.246.65.164 3.19.69.120 42.188.17.242 106.12.78.199
78.15.127.193 49.4.26.134 119.192.16.23 222.220.119.249