必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Budapest

省份(region): Budapest

国家(country): Hungary

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 78.139.54.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12284
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;78.139.54.128.			IN	A

;; AUTHORITY SECTION:
.			540	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019111401 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 15 02:53:33 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
128.54.139.78.in-addr.arpa domain name pointer business-78-139-54-128.business.broadband.hu.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
128.54.139.78.in-addr.arpa	name = business-78-139-54-128.business.broadband.hu.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.155.93.180 attackbots
Oct  3 07:36:34 OPSO sshd\[28407\]: Invalid user system from 139.155.93.180 port 51382
Oct  3 07:36:34 OPSO sshd\[28407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.93.180
Oct  3 07:36:35 OPSO sshd\[28407\]: Failed password for invalid user system from 139.155.93.180 port 51382 ssh2
Oct  3 07:40:36 OPSO sshd\[29035\]: Invalid user support from 139.155.93.180 port 51132
Oct  3 07:40:36 OPSO sshd\[29035\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.93.180
2019-10-03 14:00:39
190.145.7.42 attackbotsspam
Sep 30 18:21:37 mail sshd[20185]: Invalid user ju from 190.145.7.42
Sep 30 18:21:37 mail sshd[20185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.7.42
Sep 30 18:21:39 mail sshd[20185]: Failed password for invalid user ju from 190.145.7.42 port 54633 ssh2
Sep 30 18:31:17 mail sshd[20351]: Invalid user vahati from 190.145.7.42
Sep 30 18:31:17 mail sshd[20351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.7.42

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=190.145.7.42
2019-10-03 14:30:39
46.212.176.250 attackbotsspam
Oct  3 05:58:28 lnxweb61 sshd[26364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.212.176.250
2019-10-03 13:56:06
182.186.122.2 attack
B: Magento admin pass test (wrong country)
2019-10-03 14:08:47
87.26.36.198 attack
Oct  1 11:27:50 our-server-hostname postfix/smtpd[572]: connect from unknown[87.26.36.198]
Oct x@x
Oct x@x
Oct x@x
Oct  1 11:27:54 our-server-hostname postfix/smtpd[572]: lost connection after RCPT from unknown[87.26.36.198]
Oct  1 11:27:54 our-server-hostname postfix/smtpd[572]: disconnect from unknown[87.26.36.198]
Oct  1 14:01:03 our-server-hostname postfix/smtpd[22071]: connect from unknown[87.26.36.198]
Oct x@x
Oct  1 14:01:10 our-server-hostname postfix/smtpd[22071]: lost connection after RCPT from unknown[87.26.36.198]
Oct  1 14:01:10 our-server-hostname postfix/smtpd[22071]: disconnect from unknown[87.26.36.198]
Oct  1 14:25:40 our-server-hostname postfix/smtpd[4589]: connect from unknown[87.26.36.198]
Oct x@x
Oct  1 14:25:42 our-server-hostname postfix/smtpd[4589]: lost connection after RCPT from unknown[87.26.36.198]
Oct  1 14:25:42 our-server-hostname postfix/smtpd[4589]: disconnect from unknown[87.26.36.198]
Oct  1 16:09:13 our-server-hostname postfix/smtpd[........
-------------------------------
2019-10-03 14:25:43
196.251.11.25 attackbots
Oct  3 03:42:21 localhost sshd\[16877\]: Invalid user euser from 196.251.11.25 port 51749
Oct  3 03:42:21 localhost sshd\[16877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.251.11.25
Oct  3 03:42:23 localhost sshd\[16877\]: Failed password for invalid user euser from 196.251.11.25 port 51749 ssh2
Oct  3 03:57:49 localhost sshd\[17418\]: Invalid user xn from 196.251.11.25 port 38642
Oct  3 03:57:49 localhost sshd\[17418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.251.11.25
...
2019-10-03 14:34:28
139.199.37.189 attackspambots
$f2bV_matches
2019-10-03 13:54:20
112.14.13.162 attack
Oct  2 01:25:56 gutwein sshd[14982]: Failed password for invalid user shan from 112.14.13.162 port 35480 ssh2
Oct  2 01:25:56 gutwein sshd[14982]: Received disconnect from 112.14.13.162: 11: Bye Bye [preauth]
Oct  2 01:38:19 gutwein sshd[17231]: Failed password for invalid user admin from 112.14.13.162 port 49546 ssh2
Oct  2 01:38:19 gutwein sshd[17231]: Received disconnect from 112.14.13.162: 11: Bye Bye [preauth]
Oct  2 01:41:33 gutwein sshd[17882]: Failed password for invalid user agasti from 112.14.13.162 port 50812 ssh2
Oct  2 01:41:34 gutwein sshd[17882]: Received disconnect from 112.14.13.162: 11: Bye Bye [preauth]
Oct  2 01:44:56 gutwein sshd[18490]: Failed password for invalid user wks from 112.14.13.162 port 52088 ssh2
Oct  2 01:44:56 gutwein sshd[18490]: Received disconnect from 112.14.13.162: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=112.14.13.162
2019-10-03 14:35:34
207.244.70.35 attackspambots
2019-10-03T06:24:27.963584abusebot.cloudsearch.cf sshd\[6514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.244.70.35  user=root
2019-10-03 14:29:15
140.143.72.21 attackspam
2019-10-03T08:21:35.041442tmaserv sshd\[2860\]: Failed password for invalid user test from 140.143.72.21 port 55286 ssh2
2019-10-03T08:38:51.725253tmaserv sshd\[3595\]: Invalid user ki from 140.143.72.21 port 48604
2019-10-03T08:38:51.730281tmaserv sshd\[3595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.72.21
2019-10-03T08:38:54.095963tmaserv sshd\[3595\]: Failed password for invalid user ki from 140.143.72.21 port 48604 ssh2
2019-10-03T08:47:39.026907tmaserv sshd\[4082\]: Invalid user ronald from 140.143.72.21 port 59380
2019-10-03T08:47:39.032600tmaserv sshd\[4082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.72.21
...
2019-10-03 13:54:02
142.112.115.160 attackbots
Oct  2 20:08:44 hpm sshd\[25519\]: Invalid user iw from 142.112.115.160
Oct  2 20:08:44 hpm sshd\[25519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ipagstaticip-f6ffd4e0-f46a-b142-b2ad-b6c2b58e2418.sdsl.bell.ca
Oct  2 20:08:46 hpm sshd\[25519\]: Failed password for invalid user iw from 142.112.115.160 port 52024 ssh2
Oct  2 20:12:40 hpm sshd\[25979\]: Invalid user florian from 142.112.115.160
Oct  2 20:12:40 hpm sshd\[25979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ipagstaticip-f6ffd4e0-f46a-b142-b2ad-b6c2b58e2418.sdsl.bell.ca
2019-10-03 14:15:49
113.69.244.252 attackspam
3389/tcp 65529/tcp 1433/tcp...
[2019-10-03]6pkt,3pt.(tcp)
2019-10-03 13:55:13
104.236.61.100 attackspambots
Fail2Ban Ban Triggered
2019-10-03 14:04:39
167.99.194.54 attackspam
2019-10-03T01:53:06.1184841495-001 sshd\[58853\]: Invalid user test from 167.99.194.54 port 57774
2019-10-03T01:53:06.1262971495-001 sshd\[58853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.194.54
2019-10-03T01:53:07.8705891495-001 sshd\[58853\]: Failed password for invalid user test from 167.99.194.54 port 57774 ssh2
2019-10-03T01:56:52.7818951495-001 sshd\[59060\]: Invalid user ftpuser from 167.99.194.54 port 39960
2019-10-03T01:56:52.7888881495-001 sshd\[59060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.194.54
2019-10-03T01:56:54.5584851495-001 sshd\[59060\]: Failed password for invalid user ftpuser from 167.99.194.54 port 39960 ssh2
...
2019-10-03 14:12:34
106.12.204.44 attackbots
2019-10-03T07:39:16.178024lon01.zurich-datacenter.net sshd\[28806\]: Invalid user factorio from 106.12.204.44 port 44598
2019-10-03T07:39:16.185120lon01.zurich-datacenter.net sshd\[28806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.204.44
2019-10-03T07:39:17.648704lon01.zurich-datacenter.net sshd\[28806\]: Failed password for invalid user factorio from 106.12.204.44 port 44598 ssh2
2019-10-03T07:44:54.355484lon01.zurich-datacenter.net sshd\[28892\]: Invalid user allotest from 106.12.204.44 port 53276
2019-10-03T07:44:54.362215lon01.zurich-datacenter.net sshd\[28892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.204.44
...
2019-10-03 14:11:55

最近上报的IP列表

210.22.15.37 202.9.37.14 95.89.105.28 86.159.32.219
191.199.140.206 151.199.109.204 68.189.102.84 27.73.153.82
113.194.131.86 105.82.115.44 197.110.19.210 12.47.64.152
3.132.121.179 84.223.37.150 151.233.230.80 68.124.25.57
123.68.235.122 80.19.248.214 221.2.57.103 1.254.23.160