必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Preston

省份(region): England

国家(country): United Kingdom

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Sky UK Limited

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 90.193.145.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20450
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;90.193.145.139.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050100 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed May 01 20:23:18 +08 2019
;; MSG SIZE  rcvd: 118

HOST信息:
139.145.193.90.in-addr.arpa domain name pointer 5ac1918b.bb.sky.com.
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
139.145.193.90.in-addr.arpa	name = 5ac1918b.bb.sky.com.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
138.197.21.218 attackspambots
(sshd) Failed SSH login from 138.197.21.218 (US/United States/ns1.hostingbytg.com): 5 in the last 3600 secs
2020-04-19 20:22:31
45.14.224.131 attack
C2,DEF GET //phpMyAdmin/scripts/setup.php
GET //phpmyadmin/scripts/setup.php
GET //myadmin/scripts/setup.php
GET //MyAdmin/scripts/setup.php
GET //PhpMyAdmin/scripts/setup.php
2020-04-19 19:51:33
162.209.247.74 attack
Apr 19 06:31:45 server770 sshd[29736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.209.247.74  user=r.r
Apr 19 06:31:46 server770 sshd[29736]: Failed password for r.r from 162.209.247.74 port 34972 ssh2
Apr 19 06:31:47 server770 sshd[29736]: Received disconnect from 162.209.247.74 port 34972:11: Bye Bye [preauth]
Apr 19 06:31:47 server770 sshd[29736]: Disconnected from 162.209.247.74 port 34972 [preauth]
Apr 19 06:44:25 server770 sshd[30143]: Invalid user oracle from 162.209.247.74 port 51092
Apr 19 06:44:25 server770 sshd[30143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.209.247.74
Apr 19 06:44:27 server770 sshd[30143]: Failed password for invalid user oracle from 162.209.247.74 port 51092 ssh2
Apr 19 06:44:27 server770 sshd[30143]: Received disconnect from 162.209.247.74 port 51092:11: Bye Bye [preauth]
Apr 19 06:44:27 server770 sshd[30143]: Disconnected from 162.209.247.........
-------------------------------
2020-04-19 20:15:32
117.131.60.58 attackspambots
Apr 19 00:35:10 cumulus sshd[5435]: Invalid user admin from 117.131.60.58 port 15578
Apr 19 00:35:10 cumulus sshd[5435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.131.60.58
Apr 19 00:35:11 cumulus sshd[5435]: Failed password for invalid user admin from 117.131.60.58 port 15578 ssh2
Apr 19 00:35:12 cumulus sshd[5435]: Received disconnect from 117.131.60.58 port 15578:11: Bye Bye [preauth]
Apr 19 00:35:12 cumulus sshd[5435]: Disconnected from 117.131.60.58 port 15578 [preauth]
Apr 19 00:44:38 cumulus sshd[6301]: Connection closed by 117.131.60.58 port 44363 [preauth]
Apr 19 00:47:32 cumulus sshd[6568]: Connection closed by 117.131.60.58 port 51093 [preauth]
Apr 19 00:50:13 cumulus sshd[6778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.131.60.58  user=r.r
Apr 19 00:50:15 cumulus sshd[6778]: Failed password for r.r from 117.131.60.58 port 65279 ssh2
Apr 19 00:50:15 cumulus ssh........
-------------------------------
2020-04-19 20:23:06
211.157.164.162 attackspam
Apr 19 13:39:09 srv-ubuntu-dev3 sshd[42874]: Invalid user postgres from 211.157.164.162
Apr 19 13:39:09 srv-ubuntu-dev3 sshd[42874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.157.164.162
Apr 19 13:39:09 srv-ubuntu-dev3 sshd[42874]: Invalid user postgres from 211.157.164.162
Apr 19 13:39:11 srv-ubuntu-dev3 sshd[42874]: Failed password for invalid user postgres from 211.157.164.162 port 51166 ssh2
Apr 19 13:43:18 srv-ubuntu-dev3 sshd[43556]: Invalid user eu from 211.157.164.162
Apr 19 13:43:18 srv-ubuntu-dev3 sshd[43556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.157.164.162
Apr 19 13:43:18 srv-ubuntu-dev3 sshd[43556]: Invalid user eu from 211.157.164.162
Apr 19 13:43:20 srv-ubuntu-dev3 sshd[43556]: Failed password for invalid user eu from 211.157.164.162 port 15911 ssh2
Apr 19 13:47:49 srv-ubuntu-dev3 sshd[44403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh 
...
2020-04-19 19:54:14
170.254.201.151 attackbotsspam
Port 23 (Telnet) access denied
2020-04-19 19:51:58
47.188.41.97 attackspambots
SSH Authentication Attempts Exceeded
2020-04-19 19:49:05
201.226.239.98 attackspam
2020-04-19T13:59:45.202497struts4.enskede.local sshd\[17661\]: Invalid user sf from 201.226.239.98 port 49150
2020-04-19T13:59:45.208929struts4.enskede.local sshd\[17661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=r1.up.ac.pa
2020-04-19T13:59:48.847808struts4.enskede.local sshd\[17661\]: Failed password for invalid user sf from 201.226.239.98 port 49150 ssh2
2020-04-19T14:06:03.462714struts4.enskede.local sshd\[17812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=r1.up.ac.pa  user=root
2020-04-19T14:06:07.274006struts4.enskede.local sshd\[17812\]: Failed password for root from 201.226.239.98 port 29222 ssh2
...
2020-04-19 20:12:34
101.89.192.64 attackspam
Apr 19 14:05:55 vpn01 sshd[29044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.192.64
Apr 19 14:05:57 vpn01 sshd[29044]: Failed password for invalid user iq from 101.89.192.64 port 41680 ssh2
...
2020-04-19 20:20:16
113.131.201.7 attack
Port probing on unauthorized port 23
2020-04-19 20:01:52
196.194.253.25 attack
Autoban   196.194.253.25 AUTH/CONNECT
2020-04-19 19:55:05
180.76.167.9 attack
2020-04-19T11:39:01.455201Z 6f6411d8e94d New connection: 180.76.167.9:52318 (172.17.0.5:2222) [session: 6f6411d8e94d]
2020-04-19T12:05:55.302855Z 6227ec42f5bd New connection: 180.76.167.9:52164 (172.17.0.5:2222) [session: 6227ec42f5bd]
2020-04-19 20:22:10
27.124.34.226 attackbots
Apr 19 11:31:45 ns382633 sshd\[30528\]: Invalid user ubuntu from 27.124.34.226 port 43358
Apr 19 11:31:45 ns382633 sshd\[30528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.124.34.226
Apr 19 11:31:47 ns382633 sshd\[30528\]: Failed password for invalid user ubuntu from 27.124.34.226 port 43358 ssh2
Apr 19 11:44:36 ns382633 sshd\[472\]: Invalid user ftpuser from 27.124.34.226 port 42784
Apr 19 11:44:36 ns382633 sshd\[472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.124.34.226
2020-04-19 19:41:22
106.13.195.172 attack
Apr 19 12:43:14 srv01 sshd[12001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.195.172  user=root
Apr 19 12:43:15 srv01 sshd[12001]: Failed password for root from 106.13.195.172 port 34252 ssh2
Apr 19 12:48:30 srv01 sshd[12521]: Invalid user gituser from 106.13.195.172 port 41678
Apr 19 12:48:30 srv01 sshd[12521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.195.172
Apr 19 12:48:30 srv01 sshd[12521]: Invalid user gituser from 106.13.195.172 port 41678
Apr 19 12:48:31 srv01 sshd[12521]: Failed password for invalid user gituser from 106.13.195.172 port 41678 ssh2
...
2020-04-19 19:45:50
123.31.43.173 attackspambots
123.31.43.173 - - [19/Apr/2020:05:46:49 +0200] "GET /wp-login.php HTTP/1.1" 200 6582 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
123.31.43.173 - - [19/Apr/2020:05:46:53 +0200] "POST /wp-login.php HTTP/1.1" 200 7361 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
123.31.43.173 - - [19/Apr/2020:05:46:55 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-19 20:06:48

最近上报的IP列表

220.29.50.220 37.49.224.166 171.59.137.128 41.215.208.138
68.183.105.109 85.160.29.155 41.204.33.38 31.250.176.22
41.139.253.2 44.210.217.189 82.165.159.133 37.49.224.122
139.115.244.134 37.49.225.61 37.120.146.57 199.250.240.125
162.144.70.140 154.158.80.116 37.49.225.241 53.163.60.255