必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 36.135.106.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27753
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;36.135.106.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 01:52:52 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 139.106.135.36.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.106.135.36.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.92.0.251 attackspam
2020-09-06T04:27:55.569446shield sshd\[25918\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.251  user=root
2020-09-06T04:27:57.613823shield sshd\[25918\]: Failed password for root from 218.92.0.251 port 1750 ssh2
2020-09-06T04:28:00.646908shield sshd\[25918\]: Failed password for root from 218.92.0.251 port 1750 ssh2
2020-09-06T04:28:04.107631shield sshd\[25918\]: Failed password for root from 218.92.0.251 port 1750 ssh2
2020-09-06T04:28:07.435366shield sshd\[25918\]: Failed password for root from 218.92.0.251 port 1750 ssh2
2020-09-06 12:35:31
5.188.86.207 attackspambots
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-06T03:01:58Z
2020-09-06 12:47:05
185.47.65.30 attack
Sep  5 20:15:35 pixelmemory sshd[3967974]: Failed password for root from 185.47.65.30 port 40302 ssh2
Sep  5 20:19:15 pixelmemory sshd[3968424]: Invalid user david from 185.47.65.30 port 54998
Sep  5 20:19:15 pixelmemory sshd[3968424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.47.65.30 
Sep  5 20:19:15 pixelmemory sshd[3968424]: Invalid user david from 185.47.65.30 port 54998
Sep  5 20:19:17 pixelmemory sshd[3968424]: Failed password for invalid user david from 185.47.65.30 port 54998 ssh2
...
2020-09-06 12:30:47
103.87.28.153 attackbotsspam
Lines containing failures of 103.87.28.153
Sep  1 03:33:36 newdogma sshd[1000]: Invalid user prasad from 103.87.28.153 port 48706
Sep  1 03:33:36 newdogma sshd[1000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.87.28.153 
Sep  1 03:33:38 newdogma sshd[1000]: Failed password for invalid user prasad from 103.87.28.153 port 48706 ssh2
Sep  1 03:33:40 newdogma sshd[1000]: Received disconnect from 103.87.28.153 port 48706:11: Bye Bye [preauth]
Sep  1 03:33:40 newdogma sshd[1000]: Disconnected from invalid user prasad 103.87.28.153 port 48706 [preauth]
Sep  1 03:48:45 newdogma sshd[5849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.87.28.153  user=r.r
Sep  1 03:48:48 newdogma sshd[5849]: Failed password for r.r from 103.87.28.153 port 39584 ssh2
Sep  1 03:48:49 newdogma sshd[5849]: Received disconnect from 103.87.28.153 port 39584:11: Bye Bye [preauth]
Sep  1 03:48:49 newdogma sshd[........
------------------------------
2020-09-06 12:34:26
61.177.172.142 attackbots
2020-09-06T04:14:54.437910shield sshd\[24532\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.142  user=root
2020-09-06T04:14:56.597931shield sshd\[24532\]: Failed password for root from 61.177.172.142 port 16861 ssh2
2020-09-06T04:14:59.428557shield sshd\[24532\]: Failed password for root from 61.177.172.142 port 16861 ssh2
2020-09-06T04:15:03.010796shield sshd\[24532\]: Failed password for root from 61.177.172.142 port 16861 ssh2
2020-09-06T04:15:06.475946shield sshd\[24532\]: Failed password for root from 61.177.172.142 port 16861 ssh2
2020-09-06 12:39:14
184.105.247.231 attackbotsspam
srv02 Mass scanning activity detected Target: 9200  ..
2020-09-06 12:54:30
68.168.213.251 attack
Sep  6 05:06:08 server2 sshd\[4047\]: User root from 68.168.213.251 not allowed because not listed in AllowUsers
Sep  6 05:06:09 server2 sshd\[4049\]: Invalid user admin from 68.168.213.251
Sep  6 05:06:09 server2 sshd\[4051\]: Invalid user admin from 68.168.213.251
Sep  6 05:06:10 server2 sshd\[4053\]: Invalid user user from 68.168.213.251
Sep  6 05:06:11 server2 sshd\[4055\]: Invalid user ubnt from 68.168.213.251
Sep  6 05:06:11 server2 sshd\[4057\]: Invalid user admin from 68.168.213.251
2020-09-06 12:42:35
190.128.171.250 attackbots
Sep  6 04:19:11 vlre-nyc-1 sshd\[7825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.171.250  user=root
Sep  6 04:19:12 vlre-nyc-1 sshd\[7825\]: Failed password for root from 190.128.171.250 port 38254 ssh2
Sep  6 04:24:16 vlre-nyc-1 sshd\[7935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.171.250  user=root
Sep  6 04:24:18 vlre-nyc-1 sshd\[7935\]: Failed password for root from 190.128.171.250 port 57046 ssh2
Sep  6 04:28:36 vlre-nyc-1 sshd\[8015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.171.250  user=root
...
2020-09-06 12:48:39
71.6.135.131 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 61 - port: 9200 proto: tcp cat: Misc Attackbytes: 60
2020-09-06 12:33:25
111.93.235.74 attack
ssh brute force
2020-09-06 12:32:55
45.142.120.83 attackspam
Sep  6 06:30:52 v22019058497090703 postfix/smtpd[18973]: warning: unknown[45.142.120.83]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  6 06:31:34 v22019058497090703 postfix/smtpd[22631]: warning: unknown[45.142.120.83]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  6 06:32:16 v22019058497090703 postfix/smtpd[20610]: warning: unknown[45.142.120.83]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-06 12:33:55
192.241.235.88 attackbots
2375/tcp 6930/tcp 4331/tcp...
[2020-08-25/09-06]12pkt,11pt.(tcp),1pt.(udp)
2020-09-06 12:37:46
109.173.115.169 attack
SSH break in attempt
...
2020-09-06 12:35:48
141.98.10.212 attack
Sep  6 03:47:50 scw-6657dc sshd[29515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.10.212
Sep  6 03:47:50 scw-6657dc sshd[29515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.10.212
Sep  6 03:47:53 scw-6657dc sshd[29515]: Failed password for invalid user Administrator from 141.98.10.212 port 41709 ssh2
...
2020-09-06 12:36:46
165.90.3.122 attack
[Sun Sep 06 03:13:25.153543 2020] [:error] [pid 2754:tid 140397330274048] [client 165.90.3.122:65500] [client 165.90.3.122] ModSecurity: Access denied with code 403 (phase 1). Match of "within %{tx.allowed_http_versions}" against "REQUEST_PROTOCOL" required. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "972"] [id "920430"] [msg "HTTP protocol version is not allowed by policy"] [data "HTTP/1.0"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/POLICY/PROTOCOL_NOT_ALLOWED"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A6"] [tag "PCI/6.5.10"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/"] [unique_id "X1PxZdlmuncnyx65RuMHlQAAAGU"]
...
2020-09-06 13:06:58

最近上报的IP列表

14.132.134.145 119.150.116.61 40.109.165.150 145.105.106.158
220.5.1.131 197.103.79.18 167.2.187.15 250.109.194.194
4.243.116.50 33.19.194.194 109.147.62.158 13.150.47.183
142.187.29.109 7.209.152.117 170.125.254.81 32.8.0.141
3.42.140.171 35.145.187.127 133.192.9.146 44.147.187.194