必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 30.194.132.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1211
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;30.194.132.46.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 05:31:35 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 46.132.194.30.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 46.132.194.30.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
67.207.91.133 attackspambots
SSH Brute-Force reported by Fail2Ban
2019-09-22 23:55:17
74.208.235.29 attack
2019-09-22T15:42:04.943649hub.schaetter.us sshd\[10709\]: Invalid user q1w2e3r4 from 74.208.235.29
2019-09-22T15:42:04.993490hub.schaetter.us sshd\[10709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.208.235.29
2019-09-22T15:42:06.995759hub.schaetter.us sshd\[10709\]: Failed password for invalid user q1w2e3r4 from 74.208.235.29 port 38176 ssh2
2019-09-22T15:46:35.745133hub.schaetter.us sshd\[10767\]: Invalid user rack123 from 74.208.235.29
2019-09-22T15:46:35.779956hub.schaetter.us sshd\[10767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.208.235.29
...
2019-09-22 23:51:59
62.28.34.125 attackbots
2019-09-17 22:13:11,228 fail2ban.actions        [800]: NOTICE  [sshd] Ban 62.28.34.125
2019-09-18 01:19:29,672 fail2ban.actions        [800]: NOTICE  [sshd] Ban 62.28.34.125
2019-09-18 04:25:47,608 fail2ban.actions        [800]: NOTICE  [sshd] Ban 62.28.34.125
...
2019-09-23 00:15:01
105.156.174.9 attackspambots
Sep 22 07:43:44 borg sshd[40179]: Failed unknown for root from 105.156.174.9 port 54609 ssh2
Sep 22 07:43:44 borg sshd[40179]: Failed unknown for root from 105.156.174.9 port 54609 ssh2
Sep 22 07:43:44 borg sshd[40179]: Failed unknown for root from 105.156.174.9 port 54609 ssh2
...
2019-09-23 00:20:32
123.125.71.21 attackbots
Bad bot/spoofed identity
2019-09-23 00:18:19
180.76.119.77 attackspambots
Sep 22 12:22:06 ny01 sshd[19856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.119.77
Sep 22 12:22:08 ny01 sshd[19856]: Failed password for invalid user 12345 from 180.76.119.77 port 39870 ssh2
Sep 22 12:28:13 ny01 sshd[21435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.119.77
2019-09-23 00:43:50
129.146.132.238 attackbots
Lines containing failures of 129.146.132.238
Sep 22 06:28:46 *** sshd[106589]: Invalid user octuser5 from 129.146.132.238 port 42711
Sep 22 06:28:46 *** sshd[106589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.132.238
Sep 22 06:28:48 *** sshd[106589]: Failed password for invalid user octuser5 from 129.146.132.238 port 42711 ssh2
Sep 22 06:28:49 *** sshd[106589]: Received disconnect from 129.146.132.238 port 42711:11: Bye Bye [preauth]
Sep 22 06:28:49 *** sshd[106589]: Disconnected from invalid user octuser5 129.146.132.238 port 42711 [preauth]
Sep 22 06:45:14 *** sshd[107593]: Invalid user nestor from 129.146.132.238 port 56443
Sep 22 06:45:14 *** sshd[107593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.132.238
Sep 22 06:45:16 *** sshd[107593]: Failed password for invalid user nestor from 129.146.132.238 port 56443 ssh2
Sep 22 06:45:16 *** sshd[107593]: Received disc........
------------------------------
2019-09-22 23:54:46
91.137.8.221 attackspam
ssh failed login
2019-09-23 00:29:59
59.149.237.145 attack
2019-09-18 17:05:48,619 fail2ban.actions        \[946\]: NOTICE  \[sshd\] Ban 59.149.237.145
2019-09-18 17:36:13,352 fail2ban.actions        \[946\]: NOTICE  \[sshd\] Ban 59.149.237.145
2019-09-18 18:10:49,465 fail2ban.actions        \[946\]: NOTICE  \[sshd\] Ban 59.149.237.145
2019-09-18 18:45:22,213 fail2ban.actions        \[946\]: NOTICE  \[sshd\] Ban 59.149.237.145
2019-09-18 19:19:56,076 fail2ban.actions        \[946\]: NOTICE  \[sshd\] Ban 59.149.237.145
...
2019-09-23 00:37:14
220.140.14.196 attack
DATE:2019-09-22 14:44:20, IP:220.140.14.196, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2019-09-22 23:59:00
84.121.165.180 attackbotsspam
2019-09-22T16:52:28.703315lon01.zurich-datacenter.net sshd\[25170\]: Invalid user hash from 84.121.165.180 port 58974
2019-09-22T16:52:28.713783lon01.zurich-datacenter.net sshd\[25170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.121.165.180.dyn.user.ono.com
2019-09-22T16:52:31.169764lon01.zurich-datacenter.net sshd\[25170\]: Failed password for invalid user hash from 84.121.165.180 port 58974 ssh2
2019-09-22T16:56:29.183271lon01.zurich-datacenter.net sshd\[25246\]: Invalid user pbb from 84.121.165.180 port 43576
2019-09-22T16:56:29.189836lon01.zurich-datacenter.net sshd\[25246\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.121.165.180.dyn.user.ono.com
...
2019-09-23 00:39:04
67.207.94.17 attackspam
Sep 22 05:57:57 php1 sshd\[25611\]: Invalid user ftpuser from 67.207.94.17
Sep 22 05:57:57 php1 sshd\[25611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.94.17
Sep 22 05:58:00 php1 sshd\[25611\]: Failed password for invalid user ftpuser from 67.207.94.17 port 48110 ssh2
Sep 22 06:01:51 php1 sshd\[25944\]: Invalid user ubnt from 67.207.94.17
Sep 22 06:01:51 php1 sshd\[25944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.94.17
2019-09-23 00:09:22
159.65.24.7 attack
Sep 22 16:48:15 MainVPS sshd[15802]: Invalid user madison from 159.65.24.7 port 33768
Sep 22 16:48:15 MainVPS sshd[15802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.24.7
Sep 22 16:48:15 MainVPS sshd[15802]: Invalid user madison from 159.65.24.7 port 33768
Sep 22 16:48:18 MainVPS sshd[15802]: Failed password for invalid user madison from 159.65.24.7 port 33768 ssh2
Sep 22 16:52:33 MainVPS sshd[16172]: Invalid user nagios from 159.65.24.7 port 46924
...
2019-09-23 00:09:43
75.132.174.9 attack
Sep 22 15:27:04 [snip] sshd[10945]: Invalid user dv from 75.132.174.9 port 52286
Sep 22 15:27:04 [snip] sshd[10945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.132.174.9
Sep 22 15:27:06 [snip] sshd[10945]: Failed password for invalid user dv from 75.132.174.9 port 52286 ssh2[...]
2019-09-23 00:11:35
74.63.255.138 attack
\[2019-09-22 12:15:45\] NOTICE\[2270\] chan_sip.c: Registration from '"666" \' failed for '74.63.255.138:5531' - Wrong password
\[2019-09-22 12:15:45\] SECURITY\[2283\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-09-22T12:15:45.196-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="666",SessionID="0x7fcd8c856e68",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/74.63.255.138/5531",Challenge="1478062b",ReceivedChallenge="1478062b",ReceivedHash="8c8eee6d299428ee46a9df7b18753e08"
\[2019-09-22 12:15:45\] NOTICE\[2270\] chan_sip.c: Registration from '"666" \' failed for '74.63.255.138:5531' - Wrong password
\[2019-09-22 12:15:45\] SECURITY\[2283\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-09-22T12:15:45.311-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="666",SessionID="0x7fcd8c297358",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/74.6
2019-09-23 00:23:18

最近上报的IP列表

187.94.11.95 43.172.205.191 133.13.198.207 36.209.131.41
3.196.153.102 176.112.247.86 131.8.128.54 34.160.208.45
198.197.21.25 199.187.11.153 73.238.222.91 203.177.157.13
8.189.116.200 37.240.73.246 51.69.105.145 216.212.117.233
58.248.155.224 103.171.46.121 239.105.176.223 67.217.67.195