必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Taiwan (Province of China)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.117.40.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61959
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.117.40.149.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023102101 1800 900 604800 86400

;; Query time: 87 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 22 02:50:22 CST 2023
;; MSG SIZE  rcvd: 107
HOST信息:
Host 149.40.117.103.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.40.117.103.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.82.23.113 attackspam
PostgreSQL port 5432
2019-11-02 21:57:52
168.63.250.90 attack
Automatic report - XMLRPC Attack
2019-11-02 22:11:00
74.63.250.6 attackspam
Nov  2 13:56:45 bouncer sshd\[18879\]: Invalid user 1219 from 74.63.250.6 port 41196
Nov  2 13:56:45 bouncer sshd\[18879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.63.250.6 
Nov  2 13:56:47 bouncer sshd\[18879\]: Failed password for invalid user 1219 from 74.63.250.6 port 41196 ssh2
...
2019-11-02 22:35:01
167.114.157.86 attackspambots
SSH bruteforce
2019-11-02 22:22:28
201.116.194.210 attackbots
Automatic report - Banned IP Access
2019-11-02 22:33:01
51.15.109.142 attackspam
fail2ban honeypot
2019-11-02 22:30:05
145.239.89.243 attackbots
Nov  2 01:53:28 sachi sshd\[10928\]: Invalid user Op3r@t0r from 145.239.89.243
Nov  2 01:53:28 sachi sshd\[10928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=243.ip-145-239-89.eu
Nov  2 01:53:30 sachi sshd\[10928\]: Failed password for invalid user Op3r@t0r from 145.239.89.243 port 46726 ssh2
Nov  2 01:57:18 sachi sshd\[11235\]: Invalid user 123! from 145.239.89.243
Nov  2 01:57:18 sachi sshd\[11235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=243.ip-145-239-89.eu
2019-11-02 21:54:10
216.10.249.73 attackbots
Nov  2 06:17:02 home sshd[28842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.10.249.73  user=root
Nov  2 06:17:05 home sshd[28842]: Failed password for root from 216.10.249.73 port 49212 ssh2
Nov  2 06:34:26 home sshd[29109]: Invalid user yong from 216.10.249.73 port 42434
Nov  2 06:34:26 home sshd[29109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.10.249.73
Nov  2 06:34:26 home sshd[29109]: Invalid user yong from 216.10.249.73 port 42434
Nov  2 06:34:28 home sshd[29109]: Failed password for invalid user yong from 216.10.249.73 port 42434 ssh2
Nov  2 06:38:40 home sshd[29130]: Invalid user danny from 216.10.249.73 port 52976
Nov  2 06:38:40 home sshd[29130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.10.249.73
Nov  2 06:38:40 home sshd[29130]: Invalid user danny from 216.10.249.73 port 52976
Nov  2 06:38:42 home sshd[29130]: Failed password for invalid user danny f
2019-11-02 21:59:05
50.199.94.84 attackspambots
Nov  2 18:19:53 gw1 sshd[29925]: Failed password for root from 50.199.94.84 port 45138 ssh2
...
2019-11-02 22:01:52
121.7.25.197 attackspam
PostgreSQL port 5432
2019-11-02 22:33:37
77.55.235.226 attack
PostgreSQL port 5432
2019-11-02 22:09:01
179.99.141.121 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/179.99.141.121/ 
 
 BR - 1H : (396)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN27699 
 
 IP : 179.99.141.121 
 
 CIDR : 179.99.0.0/16 
 
 PREFIX COUNT : 267 
 
 UNIQUE IP COUNT : 6569728 
 
 
 ATTACKS DETECTED ASN27699 :  
  1H - 6 
  3H - 19 
  6H - 40 
 12H - 80 
 24H - 163 
 
 DateTime : 2019-11-02 12:56:49 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-02 22:14:07
129.158.73.231 attackspambots
Nov  2 14:40:31 server sshd\[8636\]: Invalid user webmail from 129.158.73.231
Nov  2 14:40:31 server sshd\[8636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-129-158-73-231.compute.oraclecloud.com 
Nov  2 14:40:33 server sshd\[8636\]: Failed password for invalid user webmail from 129.158.73.231 port 61687 ssh2
Nov  2 14:56:42 server sshd\[12782\]: Invalid user hub from 129.158.73.231
Nov  2 14:56:42 server sshd\[12782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-129-158-73-231.compute.oraclecloud.com 
...
2019-11-02 22:21:01
106.14.10.205 attackspam
PostgreSQL port 5432
2019-11-02 22:29:40
175.212.62.83 attackspambots
2019-11-02T13:02:49.947020abusebot-3.cloudsearch.cf sshd\[13644\]: Invalid user kbj from 175.212.62.83 port 38250
2019-11-02 22:08:38

最近上报的IP列表

103.117.251.226 103.117.223.125 103.117.229.225 103.117.188.147
103.117.186.8 103.117.183.162 103.117.184.89 103.117.162.12
103.117.169.201 103.117.161.124 103.117.144.238 103.117.155.106
103.117.171.236 103.117.153.189 103.117.166.134 103.117.130.85
103.117.138.18 103.117.138.156 103.117.140.18 103.117.123.58