必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): India

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.49.245.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61124
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.49.245.1.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 17:19:10 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 1.245.49.103.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 103.49.245.1.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
176.126.167.167 attack
Aug  6 07:36:05 ns381471 sshd[10698]: Failed password for root from 176.126.167.167 port 56838 ssh2
2020-08-06 14:01:58
69.250.156.161 attack
2020-08-06T01:14:40.9246541495-001 sshd[12577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-69-250-156-161.hsd1.md.comcast.net  user=root
2020-08-06T01:14:43.0413721495-001 sshd[12577]: Failed password for root from 69.250.156.161 port 55936 ssh2
2020-08-06T01:27:47.0985631495-001 sshd[13300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-69-250-156-161.hsd1.md.comcast.net  user=root
2020-08-06T01:27:48.9241061495-001 sshd[13300]: Failed password for root from 69.250.156.161 port 39732 ssh2
2020-08-06T01:41:11.8434321495-001 sshd[13837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-69-250-156-161.hsd1.md.comcast.net  user=root
2020-08-06T01:41:13.7144371495-001 sshd[13837]: Failed password for root from 69.250.156.161 port 51772 ssh2
...
2020-08-06 14:35:46
218.14.80.46 attackspam
[H1.VM7] Blocked by UFW
2020-08-06 14:22:17
52.205.190.131 attackspambots
Port Scan
2020-08-06 14:16:13
212.70.149.82 attackbots
Aug  6 07:57:05 v22019058497090703 postfix/smtpd[14633]: warning: unknown[212.70.149.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  6 07:57:34 v22019058497090703 postfix/smtpd[14633]: warning: unknown[212.70.149.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  6 07:58:02 v22019058497090703 postfix/smtpd[14633]: warning: unknown[212.70.149.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-06 13:59:18
128.199.211.68 attack
Attempt to hack Wordpress Login, XMLRPC or other login
2020-08-06 13:51:27
165.227.191.15 attackbotsspam
Aug  6 08:22:34 theomazars sshd[13108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.191.15  user=root
Aug  6 08:22:36 theomazars sshd[13108]: Failed password for root from 165.227.191.15 port 51222 ssh2
2020-08-06 14:33:39
27.68.30.253 attackbots
Automatic report - Port Scan Attack
2020-08-06 13:57:02
221.133.18.115 attack
" "
2020-08-06 14:12:23
208.28.34.10 attackbotsspam
Port Scan
...
2020-08-06 14:32:51
222.186.175.183 attackspam
Aug  6 08:15:45 serwer sshd\[22576\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183  user=root
Aug  6 08:15:47 serwer sshd\[22576\]: Failed password for root from 222.186.175.183 port 6606 ssh2
Aug  6 08:15:51 serwer sshd\[22576\]: Failed password for root from 222.186.175.183 port 6606 ssh2
...
2020-08-06 14:25:19
202.55.175.236 attackspam
Aug  6 07:51:42 ns382633 sshd\[18525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.55.175.236  user=root
Aug  6 07:51:43 ns382633 sshd\[18525\]: Failed password for root from 202.55.175.236 port 34488 ssh2
Aug  6 07:54:16 ns382633 sshd\[18768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.55.175.236  user=root
Aug  6 07:54:17 ns382633 sshd\[18768\]: Failed password for root from 202.55.175.236 port 43580 ssh2
Aug  6 07:56:23 ns382633 sshd\[19422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.55.175.236  user=root
2020-08-06 14:06:24
193.112.126.198 attackspam
Aug  6 07:34:56 abendstille sshd\[5534\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.126.198  user=root
Aug  6 07:34:58 abendstille sshd\[5534\]: Failed password for root from 193.112.126.198 port 57392 ssh2
Aug  6 07:37:44 abendstille sshd\[7944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.126.198  user=root
Aug  6 07:37:46 abendstille sshd\[7944\]: Failed password for root from 193.112.126.198 port 57926 ssh2
Aug  6 07:40:24 abendstille sshd\[10743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.126.198  user=root
...
2020-08-06 14:33:08
83.12.171.68 attackbotsspam
Aug  5 19:37:12 web9 sshd\[10027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.12.171.68  user=root
Aug  5 19:37:15 web9 sshd\[10027\]: Failed password for root from 83.12.171.68 port 31816 ssh2
Aug  5 19:41:24 web9 sshd\[10567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.12.171.68  user=root
Aug  5 19:41:26 web9 sshd\[10567\]: Failed password for root from 83.12.171.68 port 3348 ssh2
Aug  5 19:45:45 web9 sshd\[11160\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.12.171.68  user=root
2020-08-06 13:50:31
5.135.94.191 attackbots
2020-08-06T07:15:02.470736ns386461 sshd\[4682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip191.ip-5-135-94.eu  user=root
2020-08-06T07:15:04.606560ns386461 sshd\[4682\]: Failed password for root from 5.135.94.191 port 33142 ssh2
2020-08-06T07:28:03.950776ns386461 sshd\[16569\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip191.ip-5-135-94.eu  user=root
2020-08-06T07:28:05.972628ns386461 sshd\[16569\]: Failed password for root from 5.135.94.191 port 35128 ssh2
2020-08-06T07:34:08.257144ns386461 sshd\[22122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip191.ip-5-135-94.eu  user=root
...
2020-08-06 14:18:02

最近上报的IP列表

52.77.133.69 39.7.32.85 13.104.36.106 3.151.146.28
135.90.19.133 89.11.123.250 36.23.238.50 67.229.240.2
57.57.155.106 190.29.241.9 239.139.49.13 19.220.192.31
24.158.33.226 186.34.1.48 33.133.34.254 7.105.89.217
223.228.32.54 118.178.26.68 234.245.186.26 127.243.249.246