必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): India

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.149.68.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44959
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.149.68.20.			IN	A

;; AUTHORITY SECTION:
.			169	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 01:15:19 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
20.68.149.103.in-addr.arpa domain name pointer noida01.protondns.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.68.149.103.in-addr.arpa	name = noida01.protondns.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
140.143.127.179 attackbots
Apr  2 17:54:26 lukav-desktop sshd\[28075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.127.179  user=root
Apr  2 17:54:28 lukav-desktop sshd\[28075\]: Failed password for root from 140.143.127.179 port 48066 ssh2
Apr  2 18:00:41 lukav-desktop sshd\[28309\]: Invalid user sunbaochen from 140.143.127.179
Apr  2 18:00:41 lukav-desktop sshd\[28309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.127.179
Apr  2 18:00:43 lukav-desktop sshd\[28309\]: Failed password for invalid user sunbaochen from 140.143.127.179 port 48222 ssh2
2020-04-03 01:14:09
180.120.209.226 attackbots
MAIL: User Login Brute Force Attempt
2020-04-03 00:31:41
222.222.31.70 attackbotsspam
Apr  2 16:45:17 lukav-desktop sshd\[15487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.222.31.70  user=root
Apr  2 16:45:19 lukav-desktop sshd\[15487\]: Failed password for root from 222.222.31.70 port 42158 ssh2
Apr  2 16:50:07 lukav-desktop sshd\[15693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.222.31.70  user=root
Apr  2 16:50:09 lukav-desktop sshd\[15693\]: Failed password for root from 222.222.31.70 port 32768 ssh2
Apr  2 16:54:58 lukav-desktop sshd\[15915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.222.31.70  user=root
2020-04-03 01:11:50
123.19.175.131 attackbotsspam
20/4/2@08:45:04: FAIL: Alarm-Network address from=123.19.175.131
...
2020-04-03 01:07:28
87.98.190.42 attackspambots
Apr  1 01:04:47 hgb10301 sshd[25170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.98.190.42  user=r.r
Apr  1 01:04:49 hgb10301 sshd[25170]: Failed password for r.r from 87.98.190.42 port 52077 ssh2
Apr  1 01:04:51 hgb10301 sshd[25170]: Received disconnect from 87.98.190.42 port 52077:11: Bye Bye [preauth]
Apr  1 01:04:51 hgb10301 sshd[25170]: Disconnected from authenticating user r.r 87.98.190.42 port 52077 [preauth]
Apr  1 01:09:04 hgb10301 sshd[25286]: Invalid user shubh from 87.98.190.42 port 58926
Apr  1 01:09:04 hgb10301 sshd[25286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.98.190.42 
Apr  1 01:09:06 hgb10301 sshd[25286]: Failed password for invalid user shubh from 87.98.190.42 port 58926 ssh2
Apr  1 01:09:07 hgb10301 sshd[25286]: Received disconnect from 87.98.190.42 port 58926:11: Bye Bye [preauth]
Apr  1 01:09:07 hgb10301 sshd[25286]: Disconnected from invalid user s........
-------------------------------
2020-04-03 00:32:33
14.162.217.62 attackbots
1585831502 - 04/02/2020 14:45:02 Host: 14.162.217.62/14.162.217.62 Port: 445 TCP Blocked
2020-04-03 01:12:50
114.119.166.181 attackbots
[Thu Apr 02 19:45:27.445100 2020] [:error] [pid 6188:tid 140149895538432] [client 114.119.166.181:23686] [client 114.119.166.181] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/index.php/prakiraan-iklim/agroklimatologi/kalender-tanam/2185-kalender-tanam-katam-terpadu-pulau-sulawesi/kalender-tanam-katam-terpadu-provinsi-gorontalo/kalender-tanam-katam-terpadu-kabupaten-boalemo-provinsi-gorontalo/kalender-tanam-katam-terpadu-kec
...
2020-04-03 00:28:09
89.248.160.178 attackbots
04/02/2020-12:15:49.190229 89.248.160.178 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-04-03 00:44:43
87.5.44.114 attack
1585841561 - 04/02/2020 17:32:41 Host: 87.5.44.114/87.5.44.114 Port: 445 TCP Blocked
2020-04-03 00:33:19
218.92.0.145 attackbotsspam
Apr  2 19:03:45 mail sshd\[25159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.145  user=root
Apr  2 19:03:47 mail sshd\[25159\]: Failed password for root from 218.92.0.145 port 21353 ssh2
Apr  2 19:03:51 mail sshd\[25159\]: Failed password for root from 218.92.0.145 port 21353 ssh2
...
2020-04-03 01:05:26
107.172.197.4 attack
Apr  1 10:34:48 datentool sshd[21647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.197.4  user=r.r
Apr  1 10:34:50 datentool sshd[21647]: Failed password for r.r from 107.172.197.4 port 57662 ssh2
Apr  1 10:43:29 datentool sshd[21828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.197.4  user=r.r
Apr  1 10:43:31 datentool sshd[21828]: Failed password for r.r from 107.172.197.4 port 54976 ssh2
Apr  1 10:50:20 datentool sshd[21886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.197.4  user=r.r
Apr  1 10:50:22 datentool sshd[21886]: Failed password for r.r from 107.172.197.4 port 50286 ssh2
Apr  1 10:57:06 datentool sshd[21999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.197.4  user=r.r
Apr  1 10:57:07 datentool sshd[21999]: Failed password for r.r from 107.172.197.4 port........
-------------------------------
2020-04-03 00:26:34
61.246.33.106 attack
SSH Brute-Force attacks
2020-04-03 00:52:20
88.250.46.80 attackspam
Unauthorized connection attempt from IP address 88.250.46.80 on Port 445(SMB)
2020-04-03 00:36:22
111.93.31.227 attackspam
SSH/22 MH Probe, BF, Hack -
2020-04-03 01:20:16
42.118.10.249 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 02-04-2020 13:45:10.
2020-04-03 00:57:29

最近上报的IP列表

103.15.170.110 103.15.179.139 103.149.68.7 104.21.61.190
103.149.26.219 103.15.226.230 103.15.216.88 103.15.51.172
103.15.210.63 103.15.62.178 103.15.51.5 103.150.136.169
104.21.61.192 103.150.136.196 103.15.83.211 103.15.83.140
103.150.186.130 103.150.160.40 103.150.186.193 103.150.186.97