必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): Technische Universitaet Muenchen

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): University/College/School

用户上报:
类型 评论内容 时间
attackbotsspam
The IP has triggered Cloudflare WAF. CF-Ray: 5435bcba7cdb6455 | WAF_Rule_ID: 100001 | WAF_Kind: firewall | CF_Action: drop | Country: DE | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: skk.moe | User-Agent:  | CF_DC: FRA. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 07:18:56
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2a09:80c0:24::47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42717
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2a09:80c0:24::47.		IN	A

;; AUTHORITY SECTION:
.			10800	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121101 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 100.100.2.136#53(100.100.2.136)
;; WHEN: Thu Dec 12 07:21:49 CST 2019
;; MSG SIZE  rcvd: 120

HOST信息:
7.4.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.4.2.0.0.0.c.0.8.9.0.a.2.ip6.arpa domain name pointer one06.cm.in.tum.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
7.4.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.4.2.0.0.0.c.0.8.9.0.a.2.ip6.arpa	name = one06.cm.in.tum.de.

Authoritative answers can be found from:
最新评论:
IP 类型 评论内容 时间
122.170.99.105 attack
Dec 25 07:23:58 debian-2gb-nbg1-2 kernel: \[907774.064427\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=122.170.99.105 DST=195.201.40.59 LEN=60 TOS=0x00 PREC=0x00 TTL=117 ID=26615 DF PROTO=TCP SPT=62136 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0
2019-12-25 18:51:47
151.49.241.22 attack
Lines containing failures of 151.49.241.22
Dec 25 07:31:37 HOSTNAME sshd[7443]: Address 151.49.241.22 maps to adsl-ull-22-241.49-151.wind.hostname, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Dec 25 07:31:37 HOSTNAME sshd[7443]: Invalid user ching from 151.49.241.22 port 37236
Dec 25 07:31:37 HOSTNAME sshd[7443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.49.241.22
Dec 25 07:31:39 HOSTNAME sshd[7443]: Failed password for invalid user ching from 151.49.241.22 port 37236 ssh2
Dec 25 07:31:39 HOSTNAME sshd[7443]: Received disconnect from 151.49.241.22 port 37236:11: Bye Bye [preauth]
Dec 25 07:31:39 HOSTNAME sshd[7443]: Disconnected from 151.49.241.22 port 37236 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=151.49.241.22
2019-12-25 18:49:14
101.108.95.237 attackspam
1577255078 - 12/25/2019 07:24:38 Host: 101.108.95.237/101.108.95.237 Port: 445 TCP Blocked
2019-12-25 18:35:35
103.232.120.109 attackbotsspam
Dec 25 14:09:25 vibhu-HP-Z238-Microtower-Workstation sshd\[24706\]: Invalid user b2 from 103.232.120.109
Dec 25 14:09:25 vibhu-HP-Z238-Microtower-Workstation sshd\[24706\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.232.120.109
Dec 25 14:09:27 vibhu-HP-Z238-Microtower-Workstation sshd\[24706\]: Failed password for invalid user b2 from 103.232.120.109 port 54250 ssh2
Dec 25 14:13:18 vibhu-HP-Z238-Microtower-Workstation sshd\[24868\]: Invalid user calomiti from 103.232.120.109
Dec 25 14:13:18 vibhu-HP-Z238-Microtower-Workstation sshd\[24868\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.232.120.109
...
2019-12-25 18:38:59
193.19.119.26 normal
You stupid fucking Russian whore I fucked your mother while your daughter sucked my dick and licked my asshole you vodka drinking piece of shit the USA WILL WIPE YALL RUSSIAN PUSSIES OFF THE MAP BITCH
2019-12-25 18:48:08
46.101.94.240 attack
Dec 25 12:20:44 vibhu-HP-Z238-Microtower-Workstation sshd\[19375\]: Invalid user demo from 46.101.94.240
Dec 25 12:20:44 vibhu-HP-Z238-Microtower-Workstation sshd\[19375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.94.240
Dec 25 12:20:46 vibhu-HP-Z238-Microtower-Workstation sshd\[19375\]: Failed password for invalid user demo from 46.101.94.240 port 35246 ssh2
Dec 25 12:23:37 vibhu-HP-Z238-Microtower-Workstation sshd\[19521\]: Invalid user user from 46.101.94.240
Dec 25 12:23:37 vibhu-HP-Z238-Microtower-Workstation sshd\[19521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.94.240
...
2019-12-25 18:55:58
193.19.119.26 normal
Are you there
2019-12-25 18:35:15
38.240.23.13 attackbotsspam
[Fail2ban] nginx-unwanted
2019-12-25 18:28:46
140.143.134.86 attackbots
2019-12-25 05:18:40,799 fail2ban.actions        \[10658\]: NOTICE  \[sshd\] Ban 140.143.134.86
2019-12-25 05:50:20,112 fail2ban.actions        \[10658\]: NOTICE  \[sshd\] Ban 140.143.134.86
2019-12-25 06:21:38,454 fail2ban.actions        \[10658\]: NOTICE  \[sshd\] Ban 140.143.134.86
2019-12-25 06:52:14,475 fail2ban.actions        \[10658\]: NOTICE  \[sshd\] Ban 140.143.134.86
2019-12-25 07:24:04,304 fail2ban.actions        \[10658\]: NOTICE  \[sshd\] Ban 140.143.134.86
...
2019-12-25 18:49:26
165.227.102.177 attack
Dec 25 07:40:03 zeus sshd[4608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.102.177 
Dec 25 07:40:04 zeus sshd[4608]: Failed password for invalid user ftpuser from 165.227.102.177 port 52748 ssh2
Dec 25 07:42:14 zeus sshd[4676]: Failed password for root from 165.227.102.177 port 45914 ssh2
2019-12-25 18:55:11
193.19.119.26 normal
Ok answer my questions
2019-12-25 18:33:30
177.133.204.139 attackbots
Automatic report - Port Scan Attack
2019-12-25 18:38:29
175.107.198.23 attackbotsspam
2019-12-25T10:27:02.135586shield sshd\[27522\]: Invalid user admin from 175.107.198.23 port 34696
2019-12-25T10:27:02.139627shield sshd\[27522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.107.198.23
2019-12-25T10:27:03.786001shield sshd\[27522\]: Failed password for invalid user admin from 175.107.198.23 port 34696 ssh2
2019-12-25T10:30:12.472177shield sshd\[28150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.107.198.23  user=root
2019-12-25T10:30:15.202197shield sshd\[28150\]: Failed password for root from 175.107.198.23 port 60526 ssh2
2019-12-25 18:47:49
211.251.237.142 attack
Dec 25 07:11:59 firewall sshd[2978]: Invalid user changem from 211.251.237.142
Dec 25 07:12:02 firewall sshd[2978]: Failed password for invalid user changem from 211.251.237.142 port 37904 ssh2
Dec 25 07:13:04 firewall sshd[3026]: Invalid user gabe from 211.251.237.142
...
2019-12-25 18:29:45
46.151.157.115 attackbotsspam
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2019-12-25 18:42:15

最近上报的IP列表

220.184.98.65 220.181.51.81 176.134.238.115 183.250.214.56
183.185.20.239 175.184.164.89 175.152.31.238 175.42.0.203
171.94.174.41 171.37.36.67 171.34.178.72 171.22.255.62
150.255.6.148 124.235.138.233 124.235.138.126 124.88.113.95
124.88.112.145 123.191.140.32 123.160.172.147 123.145.39.53