必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.148.132.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48484
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.148.132.108.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 11:01:05 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
108.132.148.99.in-addr.arpa domain name pointer 99-148-132-108.lightspeed.knvltn.sbcglobal.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
108.132.148.99.in-addr.arpa	name = 99-148-132-108.lightspeed.knvltn.sbcglobal.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
113.176.89.116 attack
2019-09-04T23:21:51.657265enmeeting.mahidol.ac.th sshd\[3169\]: Invalid user tc from 113.176.89.116 port 43942
2019-09-04T23:21:51.675599enmeeting.mahidol.ac.th sshd\[3169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.176.89.116
2019-09-04T23:21:53.497069enmeeting.mahidol.ac.th sshd\[3169\]: Failed password for invalid user tc from 113.176.89.116 port 43942 ssh2
...
2019-09-05 00:39:30
67.218.96.156 attackbots
2019-09-04T15:51:58.181612abusebot-6.cloudsearch.cf sshd\[13701\]: Invalid user jboss from 67.218.96.156 port 32925
2019-09-05 00:06:17
167.71.14.214 attack
Sep  4 12:15:36 plusreed sshd[19181]: Invalid user johanna from 167.71.14.214
...
2019-09-05 00:17:40
92.242.44.162 attack
ssh failed login
2019-09-05 00:20:15
80.10.72.184 attack
23/tcp
[2019-09-04]1pkt
2019-09-05 00:38:07
89.234.157.254 attack
Sep  4 23:32:18 itv-usvr-02 sshd[19713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.234.157.254  user=root
Sep  4 23:32:20 itv-usvr-02 sshd[19713]: Failed password for root from 89.234.157.254 port 34113 ssh2
2019-09-05 00:34:21
206.189.202.165 attackbotsspam
Sep  4 18:06:31 mail sshd\[15269\]: Failed password for invalid user oraprod from 206.189.202.165 port 38598 ssh2
Sep  4 18:11:08 mail sshd\[16046\]: Invalid user ew from 206.189.202.165 port 53826
Sep  4 18:11:08 mail sshd\[16046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.202.165
Sep  4 18:11:10 mail sshd\[16046\]: Failed password for invalid user ew from 206.189.202.165 port 53826 ssh2
Sep  4 18:15:27 mail sshd\[16653\]: Invalid user holger from 206.189.202.165 port 40830
2019-09-05 00:22:48
188.130.155.155 attackspam
Port 500/udp
2019-09-04 23:49:28
114.141.104.45 attackbots
2019-09-04T13:48:19.235216abusebot-4.cloudsearch.cf sshd\[14621\]: Invalid user adminuser from 114.141.104.45 port 35137
2019-09-05 00:04:15
130.61.121.78 attackspam
2019-09-02T18:00:00.971121ns557175 sshd\[19033\]: Invalid user ldap from 130.61.121.78 port 53504
2019-09-02T18:00:00.975716ns557175 sshd\[19033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.121.78
2019-09-02T18:00:03.026132ns557175 sshd\[19033\]: Failed password for invalid user ldap from 130.61.121.78 port 53504 ssh2
2019-09-03T00:17:52.225092ns557175 sshd\[9979\]: Invalid user che from 130.61.121.78 port 35060
2019-09-03T00:17:52.230964ns557175 sshd\[9979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.121.78
2019-09-03T00:17:54.419079ns557175 sshd\[9979\]: Failed password for invalid user che from 130.61.121.78 port 35060 ssh2
2019-09-03T00:21:35.291274ns557175 sshd\[11184\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.121.78  user=root
2019-09-03T00:21:37.092964ns557175 sshd\[11184\]: Failed password for root from 130.61.
...
2019-09-05 00:18:38
5.199.130.188 attackspam
2019-09-04T17:33:12.480544lon01.zurich-datacenter.net sshd\[15820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor.piratenpartei-nrw.de  user=root
2019-09-04T17:33:14.579823lon01.zurich-datacenter.net sshd\[15820\]: Failed password for root from 5.199.130.188 port 38147 ssh2
2019-09-04T17:33:16.848900lon01.zurich-datacenter.net sshd\[15820\]: Failed password for root from 5.199.130.188 port 38147 ssh2
2019-09-04T17:33:20.575972lon01.zurich-datacenter.net sshd\[15820\]: Failed password for root from 5.199.130.188 port 38147 ssh2
2019-09-04T17:33:23.189729lon01.zurich-datacenter.net sshd\[15820\]: Failed password for root from 5.199.130.188 port 38147 ssh2
...
2019-09-04 23:50:49
51.68.189.69 attack
Sep  4 11:33:20 TORMINT sshd\[23995\]: Invalid user nick from 51.68.189.69
Sep  4 11:33:20 TORMINT sshd\[23995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.189.69
Sep  4 11:33:22 TORMINT sshd\[23995\]: Failed password for invalid user nick from 51.68.189.69 port 37063 ssh2
...
2019-09-04 23:42:05
61.165.254.218 attackspam
2019-09-04T15:09:29.412709mail01 postfix/smtpd[23809]: warning: unknown[61.165.254.218]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-09-04T15:09:38.240650mail01 postfix/smtpd[23809]: warning: unknown[61.165.254.218]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-09-04T15:09:50.267759mail01 postfix/smtpd[23809]: warning: unknown[61.165.254.218]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-09-05 00:26:30
218.92.0.144 attackspambots
Sep  4 09:09:33 TORMINT sshd\[8872\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.144  user=root
Sep  4 09:09:34 TORMINT sshd\[8872\]: Failed password for root from 218.92.0.144 port 53625 ssh2
Sep  4 09:09:51 TORMINT sshd\[8888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.144  user=root
...
2019-09-05 00:14:18
92.222.47.41 attackspam
2019-09-04T15:30:27.640996abusebot.cloudsearch.cf sshd\[31010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.ip-92-222-47.eu  user=root
2019-09-04 23:41:20

最近上报的IP列表

5.124.36.32 235.183.57.117 116.91.47.107 15.204.197.203
199.115.239.148 39.238.121.183 140.95.222.135 218.124.61.36
54.93.18.102 18.115.152.99 132.201.201.115 38.119.203.153
241.49.99.122 137.161.229.70 124.125.172.209 51.224.33.124
188.82.164.210 55.0.96.92 48.132.165.77 228.154.56.109