必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Jakarta

省份(region): Jakarta

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.193.196.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52326
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;39.193.196.134.			IN	A

;; AUTHORITY SECTION:
.			314	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019122401 1800 900 604800 86400

;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 25 03:32:18 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
Host 134.196.193.39.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.196.193.39.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
88.98.232.53 attackspambots
Dec  3 23:17:05 webhost01 sshd[29905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.98.232.53
Dec  3 23:17:07 webhost01 sshd[29905]: Failed password for invalid user malignac from 88.98.232.53 port 45561 ssh2
...
2019-12-04 01:57:44
51.89.151.214 attackspambots
2019-12-03T15:55:51.886766shield sshd\[2422\]: Invalid user squid from 51.89.151.214 port 55486
2019-12-03T15:55:51.891190shield sshd\[2422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=214.ip-51-89-151.eu
2019-12-03T15:55:53.927014shield sshd\[2422\]: Failed password for invalid user squid from 51.89.151.214 port 55486 ssh2
2019-12-03T16:01:28.769458shield sshd\[3477\]: Invalid user none from 51.89.151.214 port 38122
2019-12-03T16:01:28.773773shield sshd\[3477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=214.ip-51-89-151.eu
2019-12-04 02:23:39
93.174.93.171 attack
12/03/2019-09:57:14.957985 93.174.93.171 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-04 01:50:15
212.237.63.28 attackspambots
Dec  3 19:46:07 sauna sshd[2563]: Failed password for root from 212.237.63.28 port 59218 ssh2
Dec  3 19:51:45 sauna sshd[2682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.63.28
...
2019-12-04 02:12:58
51.83.77.224 attackspam
Dec  3 12:59:32 linuxvps sshd\[29551\]: Invalid user apache from 51.83.77.224
Dec  3 12:59:32 linuxvps sshd\[29551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.77.224
Dec  3 12:59:34 linuxvps sshd\[29551\]: Failed password for invalid user apache from 51.83.77.224 port 49538 ssh2
Dec  3 13:05:05 linuxvps sshd\[33035\]: Invalid user charlesbabbage from 51.83.77.224
Dec  3 13:05:05 linuxvps sshd\[33035\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.77.224
2019-12-04 02:18:57
103.21.218.242 attackspambots
Dec  3 18:58:20 vps647732 sshd[13344]: Failed password for root from 103.21.218.242 port 59204 ssh2
...
2019-12-04 02:12:34
129.204.108.143 attack
Dec  3 15:18:37 vps666546 sshd\[9816\]: Invalid user trunk from 129.204.108.143 port 44401
Dec  3 15:18:37 vps666546 sshd\[9816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.108.143
Dec  3 15:18:39 vps666546 sshd\[9816\]: Failed password for invalid user trunk from 129.204.108.143 port 44401 ssh2
Dec  3 15:27:12 vps666546 sshd\[10207\]: Invalid user asd from 129.204.108.143 port 50068
Dec  3 15:27:12 vps666546 sshd\[10207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.108.143
...
2019-12-04 02:17:57
111.231.110.80 attack
Dec  3 17:30:56 Ubuntu-1404-trusty-64-minimal sshd\[19933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.110.80  user=root
Dec  3 17:30:58 Ubuntu-1404-trusty-64-minimal sshd\[19933\]: Failed password for root from 111.231.110.80 port 26599 ssh2
Dec  3 17:43:19 Ubuntu-1404-trusty-64-minimal sshd\[462\]: Invalid user planeaci from 111.231.110.80
Dec  3 17:43:19 Ubuntu-1404-trusty-64-minimal sshd\[462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.110.80
Dec  3 17:43:21 Ubuntu-1404-trusty-64-minimal sshd\[462\]: Failed password for invalid user planeaci from 111.231.110.80 port 6115 ssh2
2019-12-04 02:04:09
84.20.122.227 attackspam
Brute force SMTP login attempts.
2019-12-04 02:06:49
222.186.180.9 attackspambots
2019-12-03T19:16:55.921038ns386461 sshd\[14579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.9  user=root
2019-12-03T19:16:57.910658ns386461 sshd\[14579\]: Failed password for root from 222.186.180.9 port 56748 ssh2
2019-12-03T19:17:00.990477ns386461 sshd\[14579\]: Failed password for root from 222.186.180.9 port 56748 ssh2
2019-12-03T19:17:04.146643ns386461 sshd\[14579\]: Failed password for root from 222.186.180.9 port 56748 ssh2
2019-12-03T19:17:07.380822ns386461 sshd\[14579\]: Failed password for root from 222.186.180.9 port 56748 ssh2
...
2019-12-04 02:19:17
195.154.118.83 attackspam
Dec  3 13:18:28 vayu sshd[55402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195-154-118-83.rev.poneytelecom.eu  user=r.r
Dec  3 13:18:30 vayu sshd[55402]: Failed password for r.r from 195.154.118.83 port 50478 ssh2
Dec  3 13:18:30 vayu sshd[55402]: Received disconnect from 195.154.118.83: 11: Bye Bye [preauth]
Dec  3 13:18:31 vayu sshd[55419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195-154-118-83.rev.poneytelecom.eu  user=r.r
Dec  3 13:18:33 vayu sshd[55419]: Failed password for r.r from 195.154.118.83 port 53110 ssh2
Dec  3 13:18:33 vayu sshd[55419]: Received disconnect from 195.154.118.83: 11: Bye Bye [preauth]
Dec  3 13:18:35 vayu sshd[55425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195-154-118-83.rev.poneytelecom.eu  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=195.154.118.83
2019-12-04 01:52:23
54.38.183.181 attackbotsspam
SSH brutforce
2019-12-04 02:05:47
36.78.212.76 attackbots
Lines containing failures of 36.78.212.76
Dec  3 13:35:20 install sshd[28504]: Invalid user ubnt from 36.78.212.76 port 8853
Dec  3 13:35:20 install sshd[28504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.78.212.76
Dec  3 13:35:23 install sshd[28504]: Failed password for invalid user ubnt from 36.78.212.76 port 8853 ssh2
Dec  3 13:35:23 install sshd[28504]: Connection closed by invalid user ubnt 36.78.212.76 port 8853 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=36.78.212.76
2019-12-04 02:15:09
115.186.148.38 attackbots
Dec  3 07:57:03 php1 sshd\[10833\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.186.148.38  user=mysql
Dec  3 07:57:05 php1 sshd\[10833\]: Failed password for mysql from 115.186.148.38 port 64997 ssh2
Dec  3 08:03:56 php1 sshd\[11493\]: Invalid user dellabough from 115.186.148.38
Dec  3 08:03:56 php1 sshd\[11493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.186.148.38
Dec  3 08:03:58 php1 sshd\[11493\]: Failed password for invalid user dellabough from 115.186.148.38 port 19553 ssh2
2019-12-04 02:13:43
128.199.116.10 attack
Dec  2 09:13:19 collab sshd[15019]: Did not receive identification string from 128.199.116.10
Dec  2 09:13:44 collab sshd[15021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.116.10  user=r.r
Dec  2 09:13:46 collab sshd[15021]: Failed password for r.r from 128.199.116.10 port 46775 ssh2
Dec  2 09:13:46 collab sshd[15021]: Received disconnect from 128.199.116.10: 11: Normal Shutdown, Thank you for playing [preauth]
Dec  2 09:13:54 collab sshd[15023]: Invalid user test from 128.199.116.10
Dec  2 09:13:54 collab sshd[15023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.116.10 
Dec  2 09:13:56 collab sshd[15023]: Failed password for invalid user test from 128.199.116.10 port 52770 ssh2
Dec  2 09:13:56 collab sshd[15023]: Received disconnect from 128.199.116.10: 11: Normal Shutdown, Thank you for playing [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=1
2019-12-04 01:51:32

最近上报的IP列表

56.208.178.196 95.46.40.17 227.94.97.95 56.63.4.5
240.246.12.156 65.15.49.216 163.115.23.124 90.14.217.101
56.69.23.5 154.68.58.240 208.70.144.234 201.93.53.8
104.68.9.24 196.237.146.187 158.12.79.193 227.5.107.46
37.104.164.155 26.132.155.19 88.65.130.4 208.34.180.127