必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Bangladesh

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.149.142.232
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37778
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.149.142.232.		IN	A

;; AUTHORITY SECTION:
.			288	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 16:44:01 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 232.142.149.103.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 232.142.149.103.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
92.53.65.128 attack
firewall-block, port(s): 3387/tcp
2019-10-27 07:46:46
81.22.45.15 attackspambots
Port scan: Attack repeated for 24 hours
2019-10-27 07:49:28
185.209.0.58 attackbotsspam
10/27/2019-01:22:12.705540 185.209.0.58 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-27 07:35:27
159.203.201.183 attackspam
ET DROP Dshield Block Listed Source group 1 - port: 4899 proto: TCP cat: Misc Attack
2019-10-27 07:41:22
185.216.140.180 attack
10/26/2019-19:52:16.723555 185.216.140.180 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-27 08:00:43
59.50.85.195 attackspambots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-27 07:54:01
187.38.26.225 attackbots
php WP PHPmyadamin ABUSE blocked for 12h
2019-10-27 08:00:10
60.8.180.8 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 53 - port: 1433 proto: TCP cat: Misc Attack
2019-10-27 07:27:21
61.219.11.153 attackbotsspam
port scan and connect, tcp 80 (http)
2019-10-27 07:53:14
60.191.82.92 attackbots
ET COMPROMISED Known Compromised or Hostile Host Traffic group 15 - port: 8050 proto: TCP cat: Misc Attack
2019-10-27 07:26:54
92.119.160.97 attack
10/26/2019-19:20:24.584438 92.119.160.97 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-27 07:43:41
92.118.37.99 attackbotsspam
10/26/2019-18:39:27.942665 92.118.37.99 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-27 07:45:39
92.53.65.40 attack
10/26/2019-18:44:37.818469 92.53.65.40 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-27 07:47:05
92.118.160.45 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 91 - port: 50070 proto: TCP cat: Misc Attack
2019-10-27 07:44:42
80.82.77.227 attackbotsspam
Brute force attack stopped by firewall
2019-10-27 07:49:42

最近上报的IP列表

103.149.142.153 103.149.143.58 103.149.143.219 103.149.162.112
103.149.142.5 103.149.16.254 103.149.16.250 1.35.177.214
103.149.162.123 103.149.203.55 103.149.212.6 103.149.162.57
103.149.230.254 103.149.230.250 103.149.213.10 1.35.177.218
103.149.194.13 103.149.238.160 103.149.238.141 103.149.238.34