必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.148.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11316
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.148.148.		IN	A

;; AUTHORITY SECTION:
.			122	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 12:02:49 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
148.148.149.104.in-addr.arpa domain name pointer unassigned.psychz.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.148.149.104.in-addr.arpa	name = unassigned.psychz.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
62.210.83.52 attackspam
[2020-03-28 03:06:46] NOTICE[1148][C-0001815f] chan_sip.c: Call from '' (62.210.83.52:50171) to extension '3920014146624066' rejected because extension not found in context 'public'.
[2020-03-28 03:06:46] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-28T03:06:46.237-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="3920014146624066",SessionID="0x7fd82c530768",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.83.52/50171",ACLName="no_extension_match"
[2020-03-28 03:15:39] NOTICE[1148][C-0001816a] chan_sip.c: Call from '' (62.210.83.52:58909) to extension '3930014146624066' rejected because extension not found in context 'public'.
[2020-03-28 03:15:39] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-28T03:15:39.751-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="3930014146624066",SessionID="0x7fd82c53a2e8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP
...
2020-03-28 15:39:02
106.240.234.114 attack
Mar 28 05:53:30 nextcloud sshd\[19509\]: Invalid user lxk from 106.240.234.114
Mar 28 05:53:30 nextcloud sshd\[19509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.240.234.114
Mar 28 05:53:32 nextcloud sshd\[19509\]: Failed password for invalid user lxk from 106.240.234.114 port 43662 ssh2
2020-03-28 15:19:59
31.169.18.90 attack
Unauthorised access (Mar 28) SRC=31.169.18.90 LEN=40 TTL=57 ID=65049 TCP DPT=23 WINDOW=28897 SYN
2020-03-28 15:30:00
92.118.38.66 attackspam
2020-03-28 08:35:04 dovecot_login authenticator failed for \(User\) \[92.118.38.66\]: 535 Incorrect authentication data \(set_id=mailing@no-server.de\)
2020-03-28 08:35:20 dovecot_login authenticator failed for \(User\) \[92.118.38.66\]: 535 Incorrect authentication data \(set_id=mailing@no-server.de\)
2020-03-28 08:35:41 dovecot_login authenticator failed for \(User\) \[92.118.38.66\]: 535 Incorrect authentication data \(set_id=status@no-server.de\)
2020-03-28 08:36:01 dovecot_login authenticator failed for \(User\) \[92.118.38.66\]: 535 Incorrect authentication data \(set_id=status@no-server.de\)
2020-03-28 08:36:13 dovecot_login authenticator failed for \(User\) \[92.118.38.66\]: 535 Incorrect authentication data \(set_id=status@no-server.de\)
...
2020-03-28 15:36:45
218.75.115.26 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 28-03-2020 03:50:09.
2020-03-28 15:55:42
121.204.212.7 attack
port scan and connect, tcp 6379 (redis)
2020-03-28 16:09:42
35.195.65.87 attackbotsspam
Fail2Ban Ban Triggered
2020-03-28 15:36:22
153.127.14.47 attackspam
Mar 28 03:25:30 ws22vmsma01 sshd[243839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.127.14.47
Mar 28 03:25:33 ws22vmsma01 sshd[243839]: Failed password for invalid user pum from 153.127.14.47 port 59590 ssh2
...
2020-03-28 15:50:27
122.51.96.57 attack
$f2bV_matches
2020-03-28 15:41:56
132.232.245.79 attackspam
5x Failed Password
2020-03-28 15:23:03
159.65.181.225 attackspambots
Mar 28 06:30:38 vps647732 sshd[13792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.181.225
Mar 28 06:30:40 vps647732 sshd[13792]: Failed password for invalid user decker from 159.65.181.225 port 60938 ssh2
...
2020-03-28 15:58:20
185.243.114.132 attackbots
Attempting to bruteforce  account on exchange server.
2020-03-28 15:55:14
181.40.122.2 attackbots
Automatic report - Banned IP Access
2020-03-28 16:12:46
103.23.100.87 attackbotsspam
2020-03-28T05:46:35.900885abusebot-5.cloudsearch.cf sshd[15741]: Invalid user rlu from 103.23.100.87 port 46021
2020-03-28T05:46:35.906683abusebot-5.cloudsearch.cf sshd[15741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.23.100.87
2020-03-28T05:46:35.900885abusebot-5.cloudsearch.cf sshd[15741]: Invalid user rlu from 103.23.100.87 port 46021
2020-03-28T05:46:37.728954abusebot-5.cloudsearch.cf sshd[15741]: Failed password for invalid user rlu from 103.23.100.87 port 46021 ssh2
2020-03-28T05:55:41.542446abusebot-5.cloudsearch.cf sshd[16155]: Invalid user xjl from 103.23.100.87 port 47369
2020-03-28T05:55:41.549631abusebot-5.cloudsearch.cf sshd[16155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.23.100.87
2020-03-28T05:55:41.542446abusebot-5.cloudsearch.cf sshd[16155]: Invalid user xjl from 103.23.100.87 port 47369
2020-03-28T05:55:42.995332abusebot-5.cloudsearch.cf sshd[16155]: Failed password 
...
2020-03-28 15:24:58
183.95.84.150 attackspam
Invalid user xsj from 183.95.84.150 port 31735
2020-03-28 15:26:47

最近上报的IP列表

104.149.152.174 104.149.195.93 104.149.198.131 104.149.154.11
104.149.150.66 104.149.198.132 104.22.15.193 104.152.109.92
104.22.15.199 46.100.242.230 104.22.15.20 104.22.15.201
104.22.15.210 113.60.182.33 104.22.15.228 104.22.15.35
104.16.167.106 104.16.166.76 104.16.169.237 104.16.17.42