必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): India

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.44.139.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39342
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.44.139.48.			IN	A

;; AUTHORITY SECTION:
.			521	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 23:54:55 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 48.139.44.103.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.139.44.103.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
111.241.120.32 attackbotsspam
suspicious action Thu, 27 Feb 2020 11:21:26 -0300
2020-02-28 04:05:35
139.198.123.106 attackbotsspam
Feb 27 15:04:48 vayu sshd[865705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.123.106  user=daemon
Feb 27 15:04:51 vayu sshd[865705]: Failed password for daemon from 139.198.123.106 port 57234 ssh2
Feb 27 15:04:51 vayu sshd[865705]: Received disconnect from 139.198.123.106: 11: Bye Bye [preauth]
Feb 27 15:11:10 vayu sshd[868208]: Connection closed by 139.198.123.106 [preauth]
Feb 27 15:13:53 vayu sshd[868875]: Invalid user dods from 139.198.123.106
Feb 27 15:13:53 vayu sshd[868875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.123.106 
Feb 27 15:13:54 vayu sshd[868875]: Failed password for invalid user dods from 139.198.123.106 port 36996 ssh2
Feb 27 15:13:54 vayu sshd[868875]: Received disconnect from 139.198.123.106: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=139.198.123.106
2020-02-28 04:24:19
14.243.101.227 attackbotsspam
Port 1433 Scan
2020-02-28 04:13:47
96.47.10.53 attack
Feb 27 20:41:28 vps691689 sshd[1913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.47.10.53
Feb 27 20:41:31 vps691689 sshd[1913]: Failed password for invalid user liuzhenfeng from 96.47.10.53 port 56019 ssh2
...
2020-02-28 04:02:11
142.93.210.218 attack
Feb 27 15:10:03 iago sshd[3914]: Invalid user narciso from 142.93.210.218
Feb 27 15:10:03 iago sshd[3914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.210.218 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=142.93.210.218
2020-02-28 04:08:44
124.115.214.185 attackspam
02/27/2020-15:21:54.223163 124.115.214.185 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-02-28 03:47:23
222.186.175.181 attackbots
Feb 27 21:06:27 minden010 sshd[3638]: Failed password for root from 222.186.175.181 port 10886 ssh2
Feb 27 21:06:40 minden010 sshd[3638]: error: maximum authentication attempts exceeded for root from 222.186.175.181 port 10886 ssh2 [preauth]
Feb 27 21:06:46 minden010 sshd[3754]: Failed password for root from 222.186.175.181 port 51867 ssh2
...
2020-02-28 04:07:04
216.218.206.93 attack
Feb 27 15:21:47 debian-2gb-nbg1-2 kernel: \[5072500.822231\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=216.218.206.93 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=54321 PROTO=TCP SPT=34376 DPT=8080 WINDOW=65535 RES=0x00 SYN URGP=0
2020-02-28 03:51:06
194.6.231.122 attackbots
Feb 27 19:24:14 *** sshd[13439]: Invalid user qq from 194.6.231.122
2020-02-28 03:54:18
221.156.126.1 attackspam
2020-02-27T15:26:28.641797randservbullet-proofcloud-66.localdomain sshd[11265]: Invalid user debian-spamd from 221.156.126.1 port 51836
2020-02-27T15:26:28.648188randservbullet-proofcloud-66.localdomain sshd[11265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.156.126.1
2020-02-27T15:26:28.641797randservbullet-proofcloud-66.localdomain sshd[11265]: Invalid user debian-spamd from 221.156.126.1 port 51836
2020-02-27T15:26:30.487732randservbullet-proofcloud-66.localdomain sshd[11265]: Failed password for invalid user debian-spamd from 221.156.126.1 port 51836 ssh2
...
2020-02-28 03:52:07
222.186.31.83 attackspambots
Feb 27 09:34:31 web1 sshd\[24333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83  user=root
Feb 27 09:34:33 web1 sshd\[24333\]: Failed password for root from 222.186.31.83 port 27779 ssh2
Feb 27 09:34:35 web1 sshd\[24333\]: Failed password for root from 222.186.31.83 port 27779 ssh2
Feb 27 09:34:37 web1 sshd\[24333\]: Failed password for root from 222.186.31.83 port 27779 ssh2
Feb 27 09:43:18 web1 sshd\[25258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83  user=root
2020-02-28 03:50:41
180.250.140.74 attackbots
Feb 27 18:27:07 amit sshd\[14240\]: Invalid user confluence from 180.250.140.74
Feb 27 18:27:07 amit sshd\[14240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.140.74
Feb 27 18:27:09 amit sshd\[14240\]: Failed password for invalid user confluence from 180.250.140.74 port 42358 ssh2
...
2020-02-28 04:19:52
89.248.160.150 attackbots
89.248.160.150 was recorded 24 times by 14 hosts attempting to connect to the following ports: 40854,40850. Incident counter (4h, 24h, all-time): 24, 153, 5685
2020-02-28 03:57:00
92.118.38.42 attackbots
2020-02-27 21:44:17 dovecot_login authenticator failed for \(User\) \[92.118.38.42\]: 535 Incorrect authentication data \(set_id=patyk@org.ua\)2020-02-27 21:44:41 dovecot_login authenticator failed for \(User\) \[92.118.38.42\]: 535 Incorrect authentication data \(set_id=paul@org.ua\)2020-02-27 21:45:04 dovecot_login authenticator failed for \(User\) \[92.118.38.42\]: 535 Incorrect authentication data \(set_id=paula@org.ua\)
...
2020-02-28 03:53:06
37.211.44.226 attack
Feb 27 15:05:31 pl1server sshd[32749]: Invalid user admin from 37.211.44.226
Feb 27 15:05:31 pl1server sshd[32749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.211.44.226
Feb 27 15:05:32 pl1server sshd[32749]: Failed password for invalid user admin from 37.211.44.226 port 44092 ssh2
Feb 27 15:05:33 pl1server sshd[32749]: Connection closed by 37.211.44.226 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=37.211.44.226
2020-02-28 03:56:29

最近上报的IP列表

103.44.139.72 103.44.139.27 103.151.217.238 103.151.218.214
67.24.103.50 103.152.101.136 103.152.101.138 105.0.168.71
103.152.101.17 103.152.101.192 103.46.236.3 103.46.237.162
103.46.236.9 103.46.236.26 103.46.236.75 103.46.236.69
103.46.237.171 103.46.237.161 103.46.237.164 103.46.237.168