必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 7.13.199.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59129
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;7.13.199.148.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 23:51:09 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 148.199.13.7.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.199.13.7.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
115.146.126.209 attack
2020-06-03T13:03:28.695759server.espacesoutien.com sshd[12260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.126.209  user=root
2020-06-03T13:03:30.857640server.espacesoutien.com sshd[12260]: Failed password for root from 115.146.126.209 port 49374 ssh2
2020-06-03T13:06:32.293638server.espacesoutien.com sshd[12789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.126.209  user=root
2020-06-03T13:06:34.050713server.espacesoutien.com sshd[12789]: Failed password for root from 115.146.126.209 port 58826 ssh2
...
2020-06-04 00:30:23
52.191.174.199 attackbots
Jun  3 15:48:34 pve1 sshd[19312]: Failed password for root from 52.191.174.199 port 58758 ssh2
...
2020-06-04 00:56:42
122.51.22.134 attackbotsspam
2020-06-03T10:19:25.632122linuxbox-skyline sshd[113744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.22.134  user=root
2020-06-03T10:19:27.164051linuxbox-skyline sshd[113744]: Failed password for root from 122.51.22.134 port 41852 ssh2
...
2020-06-04 00:53:55
186.138.55.249 attackspam
Lines containing failures of 186.138.55.249
Jun  2 19:27:10 nexus sshd[19097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.138.55.249  user=r.r
Jun  2 19:27:12 nexus sshd[19097]: Failed password for r.r from 186.138.55.249 port 55474 ssh2
Jun  2 19:27:12 nexus sshd[19097]: Received disconnect from 186.138.55.249 port 55474:11: Bye Bye [preauth]
Jun  2 19:27:12 nexus sshd[19097]: Disconnected from 186.138.55.249 port 55474 [preauth]
Jun  2 19:32:02 nexus sshd[19155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.138.55.249  user=r.r
Jun  2 19:32:04 nexus sshd[19155]: Failed password for r.r from 186.138.55.249 port 60010 ssh2
Jun  2 19:32:05 nexus sshd[19155]: Received disconnect from 186.138.55.249 port 60010:11: Bye Bye [preauth]
Jun  2 19:32:05 nexus sshd[19155]: Disconnected from 186.138.55.249 port 60010 [preauth]
Jun  2 19:36:52 nexus sshd[19291]: pam_unix(sshd:auth): authe........
------------------------------
2020-06-04 00:57:04
79.136.70.159 attackbots
2020-06-03T06:55:50.449028linuxbox-skyline sshd[109433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.136.70.159  user=root
2020-06-03T06:55:52.737607linuxbox-skyline sshd[109433]: Failed password for root from 79.136.70.159 port 54248 ssh2
...
2020-06-04 00:32:55
82.102.24.169 attack
1 attempts against mh-modsecurity-ban on pluto
2020-06-04 00:31:28
201.231.115.87 attackspam
Jun  3 13:47:01 serwer sshd\[14046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.231.115.87  user=root
Jun  3 13:47:03 serwer sshd\[14046\]: Failed password for root from 201.231.115.87 port 60577 ssh2
Jun  3 13:51:25 serwer sshd\[14615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.231.115.87  user=root
...
2020-06-04 00:46:58
84.92.92.196 attack
(sshd) Failed SSH login from 84.92.92.196 (GB/United Kingdom/dleaseomnibus.pndsl.co.uk): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun  3 18:11:10 ubnt-55d23 sshd[13987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.92.92.196  user=root
Jun  3 18:11:12 ubnt-55d23 sshd[13987]: Failed password for root from 84.92.92.196 port 46630 ssh2
2020-06-04 01:09:29
110.164.189.53 attackspam
odoo8
...
2020-06-04 00:37:59
144.34.210.56 attackspam
SSH Brute Force
2020-06-04 00:33:54
119.5.157.124 attackbots
Jun  3 15:26:32 zulu412 sshd\[20836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.5.157.124  user=root
Jun  3 15:26:34 zulu412 sshd\[20836\]: Failed password for root from 119.5.157.124 port 58892 ssh2
Jun  3 15:30:36 zulu412 sshd\[21717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.5.157.124  user=root
...
2020-06-04 00:50:43
160.153.147.140 attackbots
Automatic report - XMLRPC Attack
2020-06-04 01:08:51
222.186.42.7 attackbots
Jun  3 18:40:45 MainVPS sshd[18223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7  user=root
Jun  3 18:40:46 MainVPS sshd[18223]: Failed password for root from 222.186.42.7 port 10998 ssh2
Jun  3 18:40:53 MainVPS sshd[18504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7  user=root
Jun  3 18:40:55 MainVPS sshd[18504]: Failed password for root from 222.186.42.7 port 49785 ssh2
Jun  3 18:41:03 MainVPS sshd[18578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7  user=root
Jun  3 18:41:05 MainVPS sshd[18578]: Failed password for root from 222.186.42.7 port 24379 ssh2
...
2020-06-04 00:43:48
186.122.148.216 attack
Jun  3 22:25:41 localhost sshd[3021288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.148.216  user=root
Jun  3 22:25:43 localhost sshd[3021288]: Failed password for root from 186.122.148.216 port 39586 ssh2
...
2020-06-04 00:39:29
195.56.187.26 attackspam
Unauthorised connection attempt detected at AUO FR1 NODE2. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-06-04 01:00:04

最近上报的IP列表

86.110.221.210 221.211.38.27 167.246.75.11 92.7.144.244
13.140.66.191 147.147.22.42 225.60.255.136 229.204.170.106
2.117.83.222 146.61.59.46 205.66.76.106 48.144.208.115
200.9.251.220 76.186.63.157 107.23.15.71 67.199.163.213
108.165.122.91 154.7.179.145 86.118.144.99 67.214.222.36