必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Sellebakk

省份(region): Viken

国家(country): Norway

运营商(isp): Telenor

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 77.19.0.228
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10335
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;77.19.0.228.			IN	A

;; AUTHORITY SECTION:
.			369	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020082001 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Aug 21 09:01:55 CST 2020
;; MSG SIZE  rcvd: 115
HOST信息:
228.0.19.77.in-addr.arpa domain name pointer 77.19.0.228.tmi.telenormobil.no.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
228.0.19.77.in-addr.arpa	name = 77.19.0.228.tmi.telenormobil.no.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
175.152.109.218 attackspambots
Unauthorized connection attempt detected from IP address 175.152.109.218 to port 80
2019-12-27 00:42:10
139.59.254.74 attackbotsspam
POST /xmlrpc.php.  Part of botnet attack -- 34 POST requests from 19 different IP addresses.
2019-12-27 00:20:59
103.48.82.41 attackspam
POST /xmlrpc.php.  Part of botnet attack -- 34 POST requests from 19 different IP addresses.
2019-12-27 00:31:42
104.244.74.57 attackspambots
26.12.2019 15:03:08 Connection to port 81 blocked by firewall
2019-12-27 00:36:46
104.236.75.170 attack
GET /wp-content/themes/wp-update.php
2019-12-27 00:28:33
222.186.175.148 attack
Dec 26 11:49:02 linuxvps sshd\[20023\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
Dec 26 11:49:04 linuxvps sshd\[20023\]: Failed password for root from 222.186.175.148 port 22760 ssh2
Dec 26 11:49:23 linuxvps sshd\[20253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
Dec 26 11:49:26 linuxvps sshd\[20253\]: Failed password for root from 222.186.175.148 port 50064 ssh2
Dec 26 11:49:42 linuxvps sshd\[20253\]: Failed password for root from 222.186.175.148 port 50064 ssh2
2019-12-27 00:51:15
91.121.103.175 attack
Dec 26 17:32:08 sd-53420 sshd\[11768\]: Invalid user maxine from 91.121.103.175
Dec 26 17:32:08 sd-53420 sshd\[11768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.103.175
Dec 26 17:32:09 sd-53420 sshd\[11768\]: Failed password for invalid user maxine from 91.121.103.175 port 36174 ssh2
Dec 26 17:34:06 sd-53420 sshd\[12481\]: Invalid user 12345660 from 91.121.103.175
Dec 26 17:34:06 sd-53420 sshd\[12481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.103.175
...
2019-12-27 00:43:00
211.194.190.87 attackspam
Dec 26 15:53:13 hcbbdb sshd\[16122\]: Invalid user demaine from 211.194.190.87
Dec 26 15:53:13 hcbbdb sshd\[16122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.194.190.87
Dec 26 15:53:15 hcbbdb sshd\[16122\]: Failed password for invalid user demaine from 211.194.190.87 port 55474 ssh2
Dec 26 15:58:31 hcbbdb sshd\[16616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.194.190.87  user=root
Dec 26 15:58:33 hcbbdb sshd\[16616\]: Failed password for root from 211.194.190.87 port 39350 ssh2
2019-12-27 00:44:00
134.209.39.98 attack
GET /web/wp-login.php
2019-12-27 00:22:21
81.249.131.18 attackbots
Dec 26 16:15:25 pi sshd\[1623\]: Invalid user sgmint from 81.249.131.18 port 47082
Dec 26 16:15:25 pi sshd\[1623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.249.131.18
Dec 26 16:15:27 pi sshd\[1623\]: Failed password for invalid user sgmint from 81.249.131.18 port 47082 ssh2
Dec 26 16:16:45 pi sshd\[1635\]: Invalid user abelaye from 81.249.131.18 port 59066
Dec 26 16:16:45 pi sshd\[1635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.249.131.18
...
2019-12-27 00:39:54
159.89.16.69 attack
GET /site/wp-login.php
2019-12-27 00:17:21
162.254.165.221 attackspam
POST /login/?login_only=1  Attempting to login via port 2083.  No user agent.
2019-12-27 00:15:52
80.82.78.20 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-27 00:49:21
159.65.78.120 attackspambots
GET requests for autodiscover. and webdisk.
/vendor/phpunit/phpunit/build.xml and /vendor/phpunit/phpunit/LICENSE
2019-12-27 00:18:57
222.161.37.89 attackbots
$f2bV_matches
2019-12-27 00:53:55

最近上报的IP列表

68.141.0.161 180.64.251.186 174.26.72.215 114.106.53.12
92.110.224.69 139.162.117.88 86.109.144.243 207.214.37.153
95.180.8.172 105.169.51.188 180.224.115.197 148.123.0.197
94.216.121.245 90.242.17.194 181.19.189.29 60.214.130.60
180.171.121.208 83.235.252.2 173.186.187.41 179.152.216.193