必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Vietnam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.11.198.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64115
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.11.198.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025042100 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 21 19:39:53 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
b'Host 149.198.11.103.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 103.11.198.149.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
49.88.112.113 attackbotsspam
Dec 17 11:47:25 plusreed sshd[22985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
Dec 17 11:47:26 plusreed sshd[22985]: Failed password for root from 49.88.112.113 port 54164 ssh2
...
2019-12-18 00:47:40
129.204.202.89 attackbots
2019-12-17 02:17:12 server sshd[25333]: Failed password for invalid user pcmc from 129.204.202.89 port 44880 ssh2
2019-12-18 00:41:29
144.121.28.206 attackbotsspam
SSH authentication failure x 6 reported by Fail2Ban
...
2019-12-18 00:22:00
102.114.74.214 attackspam
Dec 17 17:11:28 h2034429 sshd[29014]: Invalid user pi from 102.114.74.214
Dec 17 17:11:28 h2034429 sshd[29016]: Invalid user pi from 102.114.74.214
Dec 17 17:11:29 h2034429 sshd[29014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.114.74.214
Dec 17 17:11:29 h2034429 sshd[29016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.114.74.214
Dec 17 17:11:30 h2034429 sshd[29014]: Failed password for invalid user pi from 102.114.74.214 port 47250 ssh2
Dec 17 17:11:30 h2034429 sshd[29016]: Failed password for invalid user pi from 102.114.74.214 port 47254 ssh2
Dec 17 17:11:31 h2034429 sshd[29014]: Connection closed by 102.114.74.214 port 47250 [preauth]
Dec 17 17:11:31 h2034429 sshd[29016]: Connection closed by 102.114.74.214 port 47254 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=102.114.74.214
2019-12-18 00:42:33
140.246.58.131 attack
Dec 17 16:49:33 sd-53420 sshd\[30316\]: User mail from 140.246.58.131 not allowed because none of user's groups are listed in AllowGroups
Dec 17 16:49:33 sd-53420 sshd\[30316\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.246.58.131  user=mail
Dec 17 16:49:35 sd-53420 sshd\[30316\]: Failed password for invalid user mail from 140.246.58.131 port 50951 ssh2
Dec 17 16:57:08 sd-53420 sshd\[869\]: Invalid user server from 140.246.58.131
Dec 17 16:57:08 sd-53420 sshd\[869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.246.58.131
...
2019-12-18 00:38:08
137.74.166.77 attack
Dec 17 17:07:10 microserver sshd[6481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.166.77  user=root
Dec 17 17:07:12 microserver sshd[6481]: Failed password for root from 137.74.166.77 port 50992 ssh2
Dec 17 17:12:21 microserver sshd[7303]: Invalid user bw from 137.74.166.77 port 59120
Dec 17 17:12:21 microserver sshd[7303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.166.77
Dec 17 17:12:23 microserver sshd[7303]: Failed password for invalid user bw from 137.74.166.77 port 59120 ssh2
Dec 17 17:22:42 microserver sshd[9096]: Invalid user jagjeet from 137.74.166.77 port 48676
Dec 17 17:22:42 microserver sshd[9096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.166.77
Dec 17 17:22:44 microserver sshd[9096]: Failed password for invalid user jagjeet from 137.74.166.77 port 48676 ssh2
Dec 17 17:27:51 microserver sshd[9885]: pam_unix(sshd:auth): authentication failure
2019-12-18 01:03:19
112.217.207.130 attackspam
Dec 17 16:29:08 minden010 sshd[3715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.217.207.130
Dec 17 16:29:10 minden010 sshd[3715]: Failed password for invalid user emerald from 112.217.207.130 port 40132 ssh2
Dec 17 16:35:30 minden010 sshd[5820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.217.207.130
...
2019-12-18 00:37:50
163.172.60.213 attackspam
wp-login.php
2019-12-18 00:56:50
168.243.91.19 attackspambots
Dec 17 16:22:58 web8 sshd\[4652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.243.91.19  user=root
Dec 17 16:22:59 web8 sshd\[4652\]: Failed password for root from 168.243.91.19 port 39715 ssh2
Dec 17 16:29:09 web8 sshd\[7501\]: Invalid user yosef from 168.243.91.19
Dec 17 16:29:09 web8 sshd\[7501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.243.91.19
Dec 17 16:29:11 web8 sshd\[7501\]: Failed password for invalid user yosef from 168.243.91.19 port 44258 ssh2
2019-12-18 00:33:06
121.134.159.21 attack
$f2bV_matches
2019-12-18 00:51:23
106.54.226.205 attack
Dec 17 09:37:14 server sshd\[32436\]: Failed password for invalid user server from 106.54.226.205 port 47348 ssh2
Dec 17 17:30:10 server sshd\[5041\]: Invalid user manette from 106.54.226.205
Dec 17 17:30:10 server sshd\[5041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.226.205 
Dec 17 17:30:12 server sshd\[5041\]: Failed password for invalid user manette from 106.54.226.205 port 39018 ssh2
Dec 17 17:52:50 server sshd\[11492\]: Invalid user ecaterina from 106.54.226.205
Dec 17 17:52:50 server sshd\[11492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.226.205 
...
2019-12-18 01:04:50
106.13.222.115 attack
Dec 17 17:40:24 markkoudstaal sshd[20038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.222.115
Dec 17 17:40:26 markkoudstaal sshd[20038]: Failed password for invalid user huebscher from 106.13.222.115 port 49384 ssh2
Dec 17 17:45:48 markkoudstaal sshd[20768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.222.115
2019-12-18 01:00:16
177.170.157.182 attackspam
Unauthorized connection attempt detected from IP address 177.170.157.182 to port 445
2019-12-18 00:59:05
165.192.78.20 attack
Dec 17 00:00:03 fwservlet sshd[12510]: Invalid user yo from 165.192.78.20
Dec 17 00:00:03 fwservlet sshd[12510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.192.78.20
Dec 17 00:00:05 fwservlet sshd[12510]: Failed password for invalid user yo from 165.192.78.20 port 38908 ssh2
Dec 17 00:00:05 fwservlet sshd[12510]: Received disconnect from 165.192.78.20 port 38908:11: Bye Bye [preauth]
Dec 17 00:00:05 fwservlet sshd[12510]: Disconnected from 165.192.78.20 port 38908 [preauth]
Dec 17 00:09:43 fwservlet sshd[12967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.192.78.20  user=r.r
Dec 17 00:09:45 fwservlet sshd[12967]: Failed password for r.r from 165.192.78.20 port 60958 ssh2
Dec 17 00:09:46 fwservlet sshd[12967]: Received disconnect from 165.192.78.20 port 60958:11: Bye Bye [preauth]
Dec 17 00:09:46 fwservlet sshd[12967]: Disconnected from 165.192.78.20 port 60958 [preauth]


........
---------------------------------
2019-12-18 01:01:12
104.131.46.166 attack
Dec 17 16:30:35 zeus sshd[28967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.46.166 
Dec 17 16:30:37 zeus sshd[28967]: Failed password for invalid user diestel from 104.131.46.166 port 59764 ssh2
Dec 17 16:36:03 zeus sshd[29090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.46.166 
Dec 17 16:36:05 zeus sshd[29090]: Failed password for invalid user meres from 104.131.46.166 port 36014 ssh2
2019-12-18 00:38:58

最近上报的IP列表

59.50.91.137 165.227.177.153 94.241.113.135 149.102.154.129
151.234.202.98 185.208.181.162 15.204.65.145 121.127.34.124
10.9.0.12 35.180.41.230 184.154.86.160 20.65.194.183
90.229.177.252 111.94.7.86 90.139.204.3 84.227.3.175
135.233.96.232 2408:8262:3c97:5e26:1290:28ff:feea:3306 192.168.100.199 154.202.56.134