必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Timişoara

省份(region): Timis

国家(country): Romania

运营商(isp): Digi.Mobil

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 86.126.140.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64141
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;86.126.140.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031800 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 18 21:53:26 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
45.140.126.86.in-addr.arpa domain name pointer 86-126-140-45.rdsnet.ro.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.140.126.86.in-addr.arpa	name = 86-126-140-45.rdsnet.ro.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
140.143.57.159 attackbots
2019-10-17T22:03:59.964451abusebot-5.cloudsearch.cf sshd\[10431\]: Invalid user arkserver from 140.143.57.159 port 54080
2019-10-18 06:22:04
118.25.143.199 attackspam
Oct 17 22:01:43 ip-172-31-62-245 sshd\[8717\]: Failed password for root from 118.25.143.199 port 33458 ssh2\
Oct 17 22:05:37 ip-172-31-62-245 sshd\[8738\]: Invalid user leninha from 118.25.143.199\
Oct 17 22:05:38 ip-172-31-62-245 sshd\[8738\]: Failed password for invalid user leninha from 118.25.143.199 port 52942 ssh2\
Oct 17 22:09:30 ip-172-31-62-245 sshd\[8830\]: Invalid user mythic from 118.25.143.199\
Oct 17 22:09:32 ip-172-31-62-245 sshd\[8830\]: Failed password for invalid user mythic from 118.25.143.199 port 44203 ssh2\
2019-10-18 06:37:50
123.20.61.122 attack
Lines containing failures of 123.20.61.122


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=123.20.61.122
2019-10-18 06:47:50
222.186.190.2 attackspam
Oct 18 01:34:27 server sshd\[24959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
Oct 18 01:34:28 server sshd\[24966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
Oct 18 01:34:29 server sshd\[24959\]: Failed password for root from 222.186.190.2 port 35746 ssh2
Oct 18 01:34:29 server sshd\[24964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
Oct 18 01:34:29 server sshd\[24966\]: Failed password for root from 222.186.190.2 port 42422 ssh2
...
2019-10-18 06:51:54
114.239.149.255 attackbots
Oct 17 21:32:01 smtp sshd[20832]: Invalid user user3 from 114.239.149.255
Oct 17 21:32:03 smtp sshd[20832]: Failed password for invalid user user3 from 114.239.149.255 port 33997 ssh2
Oct 17 21:34:14 smtp sshd[21127]: Invalid user parkyr from 114.239.149.255


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=114.239.149.255
2019-10-18 06:54:15
182.71.144.122 attackbotsspam
Unauthorised access (Oct 17) SRC=182.71.144.122 LEN=52 TTL=120 ID=12548 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-18 06:33:45
201.192.160.40 attack
Mar 13 08:43:26 odroid64 sshd\[29323\]: User root from 201.192.160.40 not allowed because not listed in AllowUsers
Mar 13 08:43:26 odroid64 sshd\[29323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.192.160.40  user=root
Mar 13 08:43:28 odroid64 sshd\[29323\]: Failed password for invalid user root from 201.192.160.40 port 53198 ssh2
Mar 24 07:23:27 odroid64 sshd\[11615\]: User root from 201.192.160.40 not allowed because not listed in AllowUsers
Mar 24 07:23:27 odroid64 sshd\[11615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.192.160.40  user=root
Mar 24 07:23:29 odroid64 sshd\[11615\]: Failed password for invalid user root from 201.192.160.40 port 45334 ssh2
Apr 22 03:52:04 odroid64 sshd\[12257\]: Invalid user pentaho from 201.192.160.40
Apr 22 03:52:04 odroid64 sshd\[12257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.192.160.40
A
...
2019-10-18 06:19:57
47.74.190.56 attack
Oct 15 05:51:13 odroid64 sshd\[16956\]: User root from 47.74.190.56 not allowed because not listed in AllowUsers
Oct 15 05:51:13 odroid64 sshd\[16956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.74.190.56  user=root
Oct 15 05:51:15 odroid64 sshd\[16956\]: Failed password for invalid user root from 47.74.190.56 port 45940 ssh2
Oct 15 06:20:16 odroid64 sshd\[4004\]: Invalid user qwert from 47.74.190.56
Oct 15 06:20:16 odroid64 sshd\[4004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.74.190.56
Oct 15 06:20:17 odroid64 sshd\[4004\]: Failed password for invalid user qwert from 47.74.190.56 port 46184 ssh2
Oct 15 06:24:27 odroid64 sshd\[6248\]: Invalid user git from 47.74.190.56
Oct 15 06:24:27 odroid64 sshd\[6248\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.74.190.56
Oct 15 06:24:29 odroid64 sshd\[6248\]: Failed password for invalid user 
...
2019-10-18 06:36:38
201.184.155.178 attackspam
May  2 18:15:34 odroid64 sshd\[11187\]: Invalid user ali from 201.184.155.178
May  2 18:15:34 odroid64 sshd\[11187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.184.155.178
May  2 18:15:36 odroid64 sshd\[11187\]: Failed password for invalid user ali from 201.184.155.178 port 28937 ssh2
...
2019-10-18 06:31:50
201.184.169.106 attackbots
May 25 11:39:48 odroid64 sshd\[2483\]: Invalid user guest from 201.184.169.106
May 25 11:39:48 odroid64 sshd\[2483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.184.169.106
May 25 11:39:50 odroid64 sshd\[2483\]: Failed password for invalid user guest from 201.184.169.106 port 36584 ssh2
May 29 12:45:08 odroid64 sshd\[18074\]: Invalid user httpd from 201.184.169.106
May 29 12:45:08 odroid64 sshd\[18074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.184.169.106
May 29 12:45:10 odroid64 sshd\[18074\]: Failed password for invalid user httpd from 201.184.169.106 port 34057 ssh2
Jun  6 12:01:28 odroid64 sshd\[19612\]: User root from 201.184.169.106 not allowed because not listed in AllowUsers
Jun  6 12:01:28 odroid64 sshd\[19612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.184.169.106  user=root
Jun  6 12:01:30 odroid64 sshd\[19612\]: Fai
...
2019-10-18 06:31:28
197.248.34.58 attackbots
Oct 17 21:30:30 linuxrulz sshd[28528]: Did not receive identification string from 197.248.34.58 port 40801
Oct 17 21:30:53 linuxrulz sshd[28532]: Invalid user guest from 197.248.34.58 port 36355
Oct 17 21:30:55 linuxrulz sshd[28532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.34.58
Oct 17 21:30:57 linuxrulz sshd[28532]: Failed password for invalid user guest from 197.248.34.58 port 36355 ssh2
Oct 17 21:30:57 linuxrulz sshd[28532]: Connection closed by 197.248.34.58 port 36355 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=197.248.34.58
2019-10-18 06:43:19
201.20.104.231 attack
Jan 20 16:51:25 odroid64 sshd\[30217\]: Invalid user newadmin from 201.20.104.231
Jan 20 16:51:25 odroid64 sshd\[30217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.20.104.231
Jan 20 16:51:27 odroid64 sshd\[30217\]: Failed password for invalid user newadmin from 201.20.104.231 port 33790 ssh2
Jan 23 00:55:59 odroid64 sshd\[4828\]: Invalid user sunny from 201.20.104.231
Jan 23 00:55:59 odroid64 sshd\[4828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.20.104.231
Jan 23 00:56:01 odroid64 sshd\[4828\]: Failed password for invalid user sunny from 201.20.104.231 port 39286 ssh2
...
2019-10-18 06:19:35
201.168.208.42 attackbotsspam
Feb 25 20:39:16 odroid64 sshd\[16317\]: Invalid user davids from 201.168.208.42
Feb 25 20:39:16 odroid64 sshd\[16317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.168.208.42
Feb 25 20:39:18 odroid64 sshd\[16317\]: Failed password for invalid user davids from 201.168.208.42 port 40672 ssh2
Mar  4 03:02:59 odroid64 sshd\[20823\]: Invalid user hdfs from 201.168.208.42
Mar  4 03:02:59 odroid64 sshd\[20823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.168.208.42
Mar  4 03:03:01 odroid64 sshd\[20823\]: Failed password for invalid user hdfs from 201.168.208.42 port 43240 ssh2
Mar 10 11:08:30 odroid64 sshd\[11495\]: User root from 201.168.208.42 not allowed because not listed in AllowUsers
Mar 10 11:08:30 odroid64 sshd\[11495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.168.208.42  user=root
Mar 10 11:08:32 odroid64 sshd\[11495\]: Failed p
...
2019-10-18 06:50:10
178.128.81.60 attackspam
Oct 17 12:03:24 hanapaa sshd\[4131\]: Invalid user idckj from 178.128.81.60
Oct 17 12:03:24 hanapaa sshd\[4131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.81.60
Oct 17 12:03:26 hanapaa sshd\[4131\]: Failed password for invalid user idckj from 178.128.81.60 port 46960 ssh2
Oct 17 12:07:57 hanapaa sshd\[4501\]: Invalid user bernadine from 178.128.81.60
Oct 17 12:07:57 hanapaa sshd\[4501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.81.60
2019-10-18 06:24:08
201.17.24.195 attackspam
Mar  2 02:15:45 odroid64 sshd\[28136\]: Invalid user admin from 201.17.24.195
Mar  2 02:15:45 odroid64 sshd\[28136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.24.195
Mar  2 02:15:47 odroid64 sshd\[28136\]: Failed password for invalid user admin from 201.17.24.195 port 51728 ssh2
Mar 10 18:02:44 odroid64 sshd\[2563\]: Invalid user jester from 201.17.24.195
Mar 10 18:02:44 odroid64 sshd\[2563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.24.195
Mar 10 18:02:46 odroid64 sshd\[2563\]: Failed password for invalid user jester from 201.17.24.195 port 46332 ssh2
Mar 16 09:17:27 odroid64 sshd\[2786\]: Invalid user sebastian from 201.17.24.195
Mar 16 09:17:28 odroid64 sshd\[2786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.24.195
Mar 16 09:17:30 odroid64 sshd\[2786\]: Failed password for invalid user sebastian from 201.17.24.195 p
...
2019-10-18 06:44:44

最近上报的IP列表

59.82.199.208 53.140.172.65 106.22.219.159 72.212.68.209
61.42.236.228 71.107.166.59 50.105.130.195 108.114.169.216
53.86.125.179 173.94.151.18 10.31.2.155 243.121.229.126
221.253.69.229 151.109.129.179 151.98.63.237 17.6.15.200
210.142.182.72 92.57.99.88 145.149.234.69 143.28.91.236