必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom of Great Britain and Northern Ireland (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.149.103.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41596
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.149.103.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 14:18:29 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
42.103.149.109.in-addr.arpa domain name pointer host109-149-103-42.range109-149.btcentralplus.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.103.149.109.in-addr.arpa	name = host109-149-103-42.range109-149.btcentralplus.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.24.235.146 attackbotsspam
Sep 15 06:54:32 site3 sshd\[49116\]: Invalid user cpunks from 185.24.235.146
Sep 15 06:54:32 site3 sshd\[49116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.24.235.146
Sep 15 06:54:34 site3 sshd\[49116\]: Failed password for invalid user cpunks from 185.24.235.146 port 41590 ssh2
Sep 15 07:01:55 site3 sshd\[49219\]: Invalid user oracle from 185.24.235.146
Sep 15 07:01:55 site3 sshd\[49219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.24.235.146
...
2019-09-15 17:13:30
197.85.191.178 attack
2019-09-15T08:08:47.063722abusebot-2.cloudsearch.cf sshd\[18463\]: Invalid user c_log from 197.85.191.178 port 49202
2019-09-15 17:20:32
218.249.154.130 attackbotsspam
2019-09-15T08:53:47.284370abusebot-2.cloudsearch.cf sshd\[18650\]: Invalid user password123 from 218.249.154.130 port 58595
2019-09-15 16:53:56
196.13.207.52 attack
Sep 15 05:24:48 mail1 sshd\[8972\]: Invalid user medieval from 196.13.207.52 port 45734
Sep 15 05:24:48 mail1 sshd\[8972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.13.207.52
Sep 15 05:24:50 mail1 sshd\[8972\]: Failed password for invalid user medieval from 196.13.207.52 port 45734 ssh2
Sep 15 05:40:16 mail1 sshd\[16082\]: Invalid user sinusbot from 196.13.207.52 port 58130
Sep 15 05:40:16 mail1 sshd\[16082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.13.207.52
...
2019-09-15 17:24:38
95.85.60.251 attackbotsspam
Automatic report - Banned IP Access
2019-09-15 17:30:03
222.186.15.110 attackbots
2019-09-15T09:26:45.076853abusebot-8.cloudsearch.cf sshd\[22396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.110  user=root
2019-09-15 17:33:10
139.59.17.118 attackspam
Sep 15 02:52:08 *** sshd[22817]: Invalid user admin from 139.59.17.118
2019-09-15 16:59:12
157.230.97.200 attackbotsspam
Sep 15 05:37:36 OPSO sshd\[31653\]: Invalid user gitlab-runner from 157.230.97.200 port 42732
Sep 15 05:37:36 OPSO sshd\[31653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.97.200
Sep 15 05:37:38 OPSO sshd\[31653\]: Failed password for invalid user gitlab-runner from 157.230.97.200 port 42732 ssh2
Sep 15 05:41:56 OPSO sshd\[32337\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.97.200  user=admin
Sep 15 05:41:58 OPSO sshd\[32337\]: Failed password for admin from 157.230.97.200 port 32918 ssh2
2019-09-15 17:34:32
34.209.105.222 attackspam
WordPress wp-login brute force :: 34.209.105.222 0.044 BYPASS [15/Sep/2019:18:41:23  1000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 4634 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36"
2019-09-15 17:53:11
138.68.218.135 attackspam
Hits on port : 8080
2019-09-15 17:40:19
175.211.112.246 attackspam
SSH scan ::
2019-09-15 17:32:27
176.236.25.148 attackbots
Telnetd brute force attack detected by fail2ban
2019-09-15 17:10:02
23.241.82.132 attackspam
Automatic report - Port Scan Attack
2019-09-15 17:18:12
40.73.59.55 attackbots
Sep 15 08:32:14 hcbbdb sshd\[31440\]: Invalid user du from 40.73.59.55
Sep 15 08:32:14 hcbbdb sshd\[31440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.59.55
Sep 15 08:32:16 hcbbdb sshd\[31440\]: Failed password for invalid user du from 40.73.59.55 port 34564 ssh2
Sep 15 08:37:32 hcbbdb sshd\[32000\]: Invalid user john from 40.73.59.55
Sep 15 08:37:32 hcbbdb sshd\[32000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.59.55
2019-09-15 16:49:28
178.128.158.199 attackbotsspam
Sep 15 10:38:22 [host] sshd[30951]: Invalid user test6 from 178.128.158.199
Sep 15 10:38:22 [host] sshd[30951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.158.199
Sep 15 10:38:24 [host] sshd[30951]: Failed password for invalid user test6 from 178.128.158.199 port 54458 ssh2
2019-09-15 17:09:37

最近上报的IP列表

69.171.249.113 104.14.85.136 143.87.236.17 93.179.249.140
193.218.78.66 50.252.108.135 216.180.217.130 157.55.86.21
45.8.129.6 197.215.203.109 48.183.101.3 123.236.193.178
185.28.244.172 75.208.195.146 103.43.243.166 3.38.94.12
91.97.138.144 86.193.150.67 74.82.180.99 126.151.149.100