必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Norway

运营商(isp): Telenor

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 77.19.190.155
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62511
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;77.19.190.155.			IN	A

;; AUTHORITY SECTION:
.			441	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040502 1800 900 604800 86400

;; Query time: 49 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 06 12:03:30 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
155.190.19.77.in-addr.arpa domain name pointer 77.19.190.155.tmi.telenormobil.no.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
155.190.19.77.in-addr.arpa	name = 77.19.190.155.tmi.telenormobil.no.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
151.76.137.164 attackbots
Oct 21 18:40:50 server dovecot: imap-login: Disconnected (auth failed, 3 attempts in 14 secs): user=, method=PLAIN, rip=151.76.137.164, lip=172.16.0.100, TLS: Disconnected, session=
Oct 21 21:53:20 server dovecot: imap-login: Disconnected (auth failed, 3 attempts in 14 secs): user=, method=PLAIN, rip=151.76.137.164, lip=172.16.0.100, TLS: Disconnected, session=
Oct 21 22:03:53 server dovecot: imap-login: Disconnected (auth failed, 3 attempts in 14 secs): user=, method=PLAIN, rip=151.76.137.164, lip=172.16.0.100, TLS: Disconnected, session=<0skHLnGVCv2XTImk>
2019-10-22 06:39:39
167.99.65.138 attack
Oct 21 22:50:07 ns381471 sshd[4509]: Failed password for root from 167.99.65.138 port 49536 ssh2
Oct 21 22:54:18 ns381471 sshd[4629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.65.138
Oct 21 22:54:20 ns381471 sshd[4629]: Failed password for invalid user yuanwd from 167.99.65.138 port 59170 ssh2
2019-10-22 06:39:07
62.148.142.202 attack
Oct 22 00:24:07 sso sshd[6260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.148.142.202
Oct 22 00:24:09 sso sshd[6260]: Failed password for invalid user admin from 62.148.142.202 port 50032 ssh2
...
2019-10-22 06:35:45
116.110.117.42 attack
Oct 22 00:48:25 rotator sshd\[13011\]: Invalid user admin from 116.110.117.42Oct 22 00:48:27 rotator sshd\[13028\]: Invalid user cisco from 116.110.117.42Oct 22 00:48:27 rotator sshd\[13011\]: Failed password for invalid user admin from 116.110.117.42 port 42524 ssh2Oct 22 00:48:29 rotator sshd\[13028\]: Failed password for invalid user cisco from 116.110.117.42 port 52242 ssh2Oct 22 00:48:30 rotator sshd\[13030\]: Failed password for root from 116.110.117.42 port 61954 ssh2Oct 22 00:48:37 rotator sshd\[13032\]: Invalid user guest from 116.110.117.42
...
2019-10-22 06:50:52
222.186.175.151 attackbots
Oct 22 00:20:14 tux-35-217 sshd\[20497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.151  user=root
Oct 22 00:20:16 tux-35-217 sshd\[20497\]: Failed password for root from 222.186.175.151 port 17750 ssh2
Oct 22 00:20:20 tux-35-217 sshd\[20497\]: Failed password for root from 222.186.175.151 port 17750 ssh2
Oct 22 00:20:24 tux-35-217 sshd\[20497\]: Failed password for root from 222.186.175.151 port 17750 ssh2
...
2019-10-22 06:34:11
140.207.114.222 attackbotsspam
Oct 21 19:09:38 firewall sshd[23129]: Failed password for invalid user test from 140.207.114.222 port 48676 ssh2
Oct 21 19:12:55 firewall sshd[23189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.207.114.222  user=root
Oct 21 19:12:58 firewall sshd[23189]: Failed password for root from 140.207.114.222 port 28259 ssh2
...
2019-10-22 06:55:16
186.135.26.183 attack
2019-10-21 x@x
2019-10-21 21:33:01 unexpected disconnection while reading SMTP command from (186-135-26-183.speedy.com.ar) [186.135.26.183]:19349 I=[10.100.18.23]:25 (error: Connection reset by peer)
2019-10-21 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=186.135.26.183
2019-10-22 07:00:11
188.131.179.87 attackspam
Oct 21 20:04:11 venus sshd\[8853\]: Invalid user Admin@1@3 from 188.131.179.87 port 23741
Oct 21 20:04:11 venus sshd\[8853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.179.87
Oct 21 20:04:14 venus sshd\[8853\]: Failed password for invalid user Admin@1@3 from 188.131.179.87 port 23741 ssh2
...
2019-10-22 06:24:54
193.32.160.149 attackbotsspam
2019-10-21 17:17:41 H=([193.32.160.150]) [193.32.160.149]:50962 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.2) (https://www.spamhaus.org/sbl/query/SBL462197)
2019-10-21 17:17:41 H=([193.32.160.150]) [193.32.160.149]:50962 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.2) (https://www.spamhaus.org/sbl/query/SBL462197)
2019-10-21 17:17:41 H=([193.32.160.150]) [193.32.160.149]:50962 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.2) (https://www.spamhaus.org/sbl/query/SBL462197)
2019-10-21 17:17:41 H=([193.32.160.150]) [193.32.160.149]:50962 I=[192.147.25.65]:25 F= rejected RCPT 
2019-10-22 06:46:29
188.50.53.145 attackbotsspam
2019-10-21 x@x
2019-10-21 20:05:57 unexpected disconnection while reading SMTP command from ([188.50.53.145]) [188.50.53.145]:15079 I=[10.100.18.21]:25 (error: Connection reset by peer)
2019-10-21 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=188.50.53.145
2019-10-22 06:33:04
195.29.105.125 attackbotsspam
Oct 22 00:35:28 ns381471 sshd[8525]: Failed password for root from 195.29.105.125 port 35188 ssh2
Oct 22 00:38:43 ns381471 sshd[8636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.29.105.125
Oct 22 00:38:45 ns381471 sshd[8636]: Failed password for invalid user linux from 195.29.105.125 port 60922 ssh2
2019-10-22 06:45:07
46.245.179.222 attackspam
$f2bV_matches
2019-10-22 06:42:54
191.235.91.156 attackbotsspam
2019-10-21T21:54:55.262733scmdmz1 sshd\[16318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235.91.156  user=root
2019-10-21T21:54:57.552718scmdmz1 sshd\[16318\]: Failed password for root from 191.235.91.156 port 57272 ssh2
2019-10-21T22:03:36.156651scmdmz1 sshd\[16974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235.91.156  user=root
...
2019-10-22 06:50:39
82.238.107.124 attackspam
2019-10-21T20:44:14.188404abusebot-4.cloudsearch.cf sshd\[23539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=lag77-1-82-238-107-124.fbx.proxad.net  user=root
2019-10-22 06:29:49
102.68.17.48 attackbotsspam
Oct 21 12:08:17 sachi sshd\[15884\]: Invalid user ubuntu from 102.68.17.48
Oct 21 12:08:17 sachi sshd\[15884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.68.17.48
Oct 21 12:08:19 sachi sshd\[15884\]: Failed password for invalid user ubuntu from 102.68.17.48 port 48056 ssh2
Oct 21 12:13:12 sachi sshd\[16348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.68.17.48  user=root
Oct 21 12:13:13 sachi sshd\[16348\]: Failed password for root from 102.68.17.48 port 59104 ssh2
2019-10-22 06:37:10

最近上报的IP列表

219.250.190.255 34.244.99.54 111.63.206.30 34.220.207.253
233.193.244.17 69.250.51.214 234.253.147.125 173.44.0.233
203.101.98.85 29.138.72.194 187.63.232.246 233.134.191.123
227.20.136.50 226.97.178.7 167.35.78.38 28.246.180.117
204.58.247.95 20.26.40.155 136.254.129.193 2.98.100.231