必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.198.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25570
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.198.131.		IN	A

;; AUTHORITY SECTION:
.			127	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 12:02:49 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 131.198.149.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 131.198.149.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
164.132.38.166 attackspambots
C1,DEF GET /wp-login.php
2020-06-26 09:14:51
60.249.216.153 attack
Honeypot attack, port: 81, PTR: 60-249-216-153.HINET-IP.hinet.net.
2020-06-26 09:13:22
190.106.222.30 attackbotsspam
Unauthorized connection attempt from IP address 190.106.222.30 on Port 445(SMB)
2020-06-26 09:07:21
46.38.150.94 attackspam
(smtpauth) Failed SMTP AUTH login from 46.38.150.94 (GB/United Kingdom/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SMTPAUTH; Logs: 2020-06-26 02:53:38 login authenticator failed for (User) [46.38.150.94]: 535 Incorrect authentication data (set_id=mtt@forhosting.nl)
2020-06-26 02:53:53 login authenticator failed for (User) [46.38.150.94]: 535 Incorrect authentication data (set_id=api-staging@forhosting.nl)
2020-06-26 02:54:11 login authenticator failed for (User) [46.38.150.94]: 535 Incorrect authentication data (set_id=api-staging@forhosting.nl)
2020-06-26 02:54:25 login authenticator failed for (User) [46.38.150.94]: 535 Incorrect authentication data (set_id=ot@forhosting.nl)
2020-06-26 02:54:42 login authenticator failed for (User) [46.38.150.94]: 535 Incorrect authentication data (set_id=ot@forhosting.nl)
2020-06-26 09:10:27
80.82.77.240 attackbots
This IP is associated with RDP abuse. It was found in a paste by https://twitter.com/RdpSnitch - https://pastebin.com/fRjuhG72  
For more information, or to report interesting/incorrect findings, contact us - bot@tines.io
2020-06-26 09:09:35
40.113.83.213 attackbotsspam
Jun 26 01:35:28 mellenthin sshd[24404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.113.83.213  user=root
Jun 26 01:35:30 mellenthin sshd[24404]: Failed password for invalid user root from 40.113.83.213 port 5952 ssh2
2020-06-26 08:40:56
89.223.31.218 attackspambots
2020-06-25T21:31:43.752466shield sshd\[26924\]: Invalid user xman from 89.223.31.218 port 56484
2020-06-25T21:31:43.756084shield sshd\[26924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=244967.simplecloud.ru
2020-06-25T21:31:45.885862shield sshd\[26924\]: Failed password for invalid user xman from 89.223.31.218 port 56484 ssh2
2020-06-25T21:35:50.609221shield sshd\[27419\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=244967.simplecloud.ru  user=root
2020-06-25T21:35:52.649373shield sshd\[27419\]: Failed password for root from 89.223.31.218 port 56114 ssh2
2020-06-26 08:25:11
103.233.5.24 attackspambots
Jun 26 01:57:57 rotator sshd\[13712\]: Invalid user administrador from 103.233.5.24Jun 26 01:58:00 rotator sshd\[13712\]: Failed password for invalid user administrador from 103.233.5.24 port 21738 ssh2Jun 26 02:00:41 rotator sshd\[14503\]: Invalid user di from 103.233.5.24Jun 26 02:00:44 rotator sshd\[14503\]: Failed password for invalid user di from 103.233.5.24 port 26845 ssh2Jun 26 02:03:20 rotator sshd\[14528\]: Invalid user sanchit from 103.233.5.24Jun 26 02:03:21 rotator sshd\[14528\]: Failed password for invalid user sanchit from 103.233.5.24 port 16013 ssh2
...
2020-06-26 08:45:48
92.63.197.58 attackbotsspam
firewall-block, port(s): 1089/tcp, 3336/tcp, 3353/tcp, 3413/tcp, 3452/tcp, 4499/tcp, 9972/tcp, 15005/tcp
2020-06-26 09:08:58
83.97.20.35 attackspam
Triggered: repeated knocking on closed ports.
2020-06-26 08:33:05
40.123.48.71 attack
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-06-26 08:34:36
216.6.201.3 attackspambots
Jun 26 02:46:09 server sshd[13035]: Failed password for invalid user admin from 216.6.201.3 port 46394 ssh2
Jun 26 02:49:42 server sshd[16589]: Failed password for invalid user alin from 216.6.201.3 port 48083 ssh2
Jun 26 02:52:40 server sshd[19793]: Failed password for invalid user nagios from 216.6.201.3 port 47697 ssh2
2020-06-26 09:06:38
106.12.222.60 attackspambots
Jun 26 09:34:41 web1 sshd[11673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.222.60  user=root
Jun 26 09:34:43 web1 sshd[11673]: Failed password for root from 106.12.222.60 port 37406 ssh2
Jun 26 09:59:13 web1 sshd[17649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.222.60  user=root
Jun 26 09:59:14 web1 sshd[17649]: Failed password for root from 106.12.222.60 port 55178 ssh2
Jun 26 10:02:13 web1 sshd[18452]: Invalid user ubuntu from 106.12.222.60 port 46624
Jun 26 10:02:13 web1 sshd[18452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.222.60
Jun 26 10:02:13 web1 sshd[18452]: Invalid user ubuntu from 106.12.222.60 port 46624
Jun 26 10:02:15 web1 sshd[18452]: Failed password for invalid user ubuntu from 106.12.222.60 port 46624 ssh2
Jun 26 10:05:17 web1 sshd[19490]: Invalid user wp from 106.12.222.60 port 38098
...
2020-06-26 08:44:58
120.92.166.166 attackbotsspam
2020-06-25T23:47:02.608800vps773228.ovh.net sshd[21297]: Failed password for invalid user ftpuser from 120.92.166.166 port 31675 ssh2
2020-06-25T23:49:52.473145vps773228.ovh.net sshd[21315]: Invalid user uat from 120.92.166.166 port 55944
2020-06-25T23:49:52.490200vps773228.ovh.net sshd[21315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.166.166
2020-06-25T23:49:52.473145vps773228.ovh.net sshd[21315]: Invalid user uat from 120.92.166.166 port 55944
2020-06-25T23:49:54.988525vps773228.ovh.net sshd[21315]: Failed password for invalid user uat from 120.92.166.166 port 55944 ssh2
...
2020-06-26 08:37:29
196.203.72.152 attackspam
1593117769 - 06/25/2020 22:42:49 Host: 196.203.72.152/196.203.72.152 Port: 445 TCP Blocked
2020-06-26 08:29:06

最近上报的IP列表

104.149.195.93 104.149.154.11 104.149.150.66 104.149.198.132
104.22.15.193 104.152.109.92 104.22.15.199 46.100.242.230
104.22.15.20 104.22.15.201 104.22.15.210 113.60.182.33
104.22.15.228 104.22.15.35 104.16.167.106 104.16.166.76
104.16.169.237 104.16.17.42 104.16.170.177 104.16.166.182