必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 230.119.139.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40055
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;230.119.139.112.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 15:48:16 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 112.139.119.230.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 112.139.119.230.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
113.200.60.74 attackbots
Jul 23 08:05:05 eventyay sshd[15141]: Failed password for proxy from 113.200.60.74 port 52216 ssh2
Jul 23 08:08:57 eventyay sshd[15291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.200.60.74
Jul 23 08:09:00 eventyay sshd[15291]: Failed password for invalid user pyramid from 113.200.60.74 port 48549 ssh2
...
2020-07-23 14:16:12
171.227.212.34 attackspambots
Jul 22 23:40:08 askasleikir sshd[142662]: Failed password for invalid user shutdown from 171.227.212.34 port 41564 ssh2
Jul 22 23:23:10 askasleikir sshd[142600]: Failed password for invalid user mailman from 171.227.212.34 port 57838 ssh2
Jul 22 23:26:31 askasleikir sshd[142607]: Failed password for invalid user ftpuser from 171.227.212.34 port 34768 ssh2
2020-07-23 14:04:09
201.206.66.135 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-07-23 14:21:44
1.179.185.50 attackspam
Jul 22 22:08:47 dignus sshd[24746]: Failed password for invalid user harold from 1.179.185.50 port 43460 ssh2
Jul 22 22:12:01 dignus sshd[25148]: Invalid user data from 1.179.185.50 port 33662
Jul 22 22:12:01 dignus sshd[25148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.185.50
Jul 22 22:12:03 dignus sshd[25148]: Failed password for invalid user data from 1.179.185.50 port 33662 ssh2
Jul 22 22:15:14 dignus sshd[25550]: Invalid user support from 1.179.185.50 port 52150
...
2020-07-23 14:02:33
179.124.34.8 attackbotsspam
2020-07-23T05:23:57.311899vps1033 sshd[31809]: Invalid user test from 179.124.34.8 port 53870
2020-07-23T05:23:57.316304vps1033 sshd[31809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.124.34.8
2020-07-23T05:23:57.311899vps1033 sshd[31809]: Invalid user test from 179.124.34.8 port 53870
2020-07-23T05:23:59.555156vps1033 sshd[31809]: Failed password for invalid user test from 179.124.34.8 port 53870 ssh2
2020-07-23T05:28:08.253897vps1033 sshd[8192]: Invalid user meimei from 179.124.34.8 port 40079
...
2020-07-23 13:56:26
138.68.148.177 attack
Jul 23 11:10:57 gw1 sshd[25563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.148.177
Jul 23 11:10:59 gw1 sshd[25563]: Failed password for invalid user oracle from 138.68.148.177 port 34432 ssh2
...
2020-07-23 14:20:12
87.251.74.223 attackbots
Port scan on 2 port(s): 321 6000
2020-07-23 14:08:43
144.91.124.45 attack
20/7/22@23:57:08: FAIL: Alarm-Network address from=144.91.124.45
...
2020-07-23 14:24:13
50.100.113.207 attackbots
bruteforce detected
2020-07-23 14:10:18
49.234.52.104 attackbotsspam
WordPress (CMS) attack attempts.
Date: 2020 Jul 22. 22:06:34
Source IP: 49.234.52.104

Portion of the log(s):
49.234.52.104 - [22/Jul/2020:22:06:29 +0200] "GET /wp-login.php HTTP/1.1" 200 1962 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
49.234.52.104 - [22/Jul/2020:22:06:31 +0200] "POST /wp-login.php HTTP/1.1" 200 2416 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
49.234.52.104 - [22/Jul/2020:22:06:32 +0200] "POST /xmlrpc.php HTTP/1.1" 404 118 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-23 14:21:13
175.138.213.93 attack
Port probing on unauthorized port 23
2020-07-23 13:59:41
61.177.172.61 attackbotsspam
Jul 23 08:00:38 eventyay sshd[14951]: Failed password for root from 61.177.172.61 port 8226 ssh2
Jul 23 08:00:48 eventyay sshd[14951]: Failed password for root from 61.177.172.61 port 8226 ssh2
Jul 23 08:00:51 eventyay sshd[14951]: Failed password for root from 61.177.172.61 port 8226 ssh2
Jul 23 08:00:51 eventyay sshd[14951]: error: maximum authentication attempts exceeded for root from 61.177.172.61 port 8226 ssh2 [preauth]
...
2020-07-23 14:07:01
222.186.175.183 attackbots
SSH brutforce
2020-07-23 14:01:38
117.211.192.70 attack
Jul 23 06:56:08 vmd36147 sshd[14341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.211.192.70
Jul 23 06:56:10 vmd36147 sshd[14341]: Failed password for invalid user surya from 117.211.192.70 port 33246 ssh2
Jul 23 07:01:32 vmd36147 sshd[26167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.211.192.70
...
2020-07-23 14:17:09
222.229.112.168 attack
(mod_security) mod_security (id:230011) triggered by 222.229.112.168 (JP/Japan/222-229-112-168.catv.medias.ne.jp): 5 in the last 3600 secs
2020-07-23 14:02:57

最近上报的IP列表

176.18.72.190 167.181.68.2 178.19.34.74 97.214.103.17
26.127.69.206 211.83.9.67 185.192.219.58 146.244.46.126
134.10.152.232 163.203.127.237 214.22.33.237 85.215.70.157
15.24.7.78 214.126.153.175 198.142.184.41 31.49.192.228
205.254.65.2 123.142.218.234 207.30.238.247 148.235.116.11