必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Portugal

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.48.129.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61441
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.48.129.215.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 22:00:32 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
215.129.48.109.in-addr.arpa domain name pointer a109-48-129-215.cpe.netcabo.pt.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
215.129.48.109.in-addr.arpa	name = a109-48-129-215.cpe.netcabo.pt.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
191.250.215.132 attackbots
Nov 30 14:48:08 *** sshd[10754]: Address 191.250.215.132 maps to 191.250.215.132.dynamic.adsl.gvt.net.br, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Nov 30 14:48:08 *** sshd[10754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.250.215.132  user=daemon
Nov 30 14:48:11 *** sshd[10754]: Failed password for daemon from 191.250.215.132 port 39257 ssh2
Nov 30 14:48:11 *** sshd[10754]: Received disconnect from 191.250.215.132: 11: Bye Bye [preauth]
Nov 30 15:10:40 *** sshd[14624]: Address 191.250.215.132 maps to 191.250.215.132.dynamic.adsl.gvt.net.br, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Nov 30 15:10:40 *** sshd[14624]: Invalid user baur from 191.250.215.132
Nov 30 15:10:40 *** sshd[14624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.250.215.132 
Nov 30 15:10:42 *** sshd[14624]: Failed password for invalid user baur from ........
-------------------------------
2019-12-01 02:37:56
14.116.222.170 attackspam
Nov 30 15:27:20 MainVPS sshd[28737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.222.170  user=root
Nov 30 15:27:21 MainVPS sshd[28737]: Failed password for root from 14.116.222.170 port 40796 ssh2
Nov 30 15:33:02 MainVPS sshd[6713]: Invalid user hkouno from 14.116.222.170 port 58429
Nov 30 15:33:02 MainVPS sshd[6713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.222.170
Nov 30 15:33:02 MainVPS sshd[6713]: Invalid user hkouno from 14.116.222.170 port 58429
Nov 30 15:33:04 MainVPS sshd[6713]: Failed password for invalid user hkouno from 14.116.222.170 port 58429 ssh2
...
2019-12-01 02:47:30
34.66.181.238 attackspam
Invalid user bosque from 34.66.181.238 port 50898
2019-12-01 02:35:44
177.220.135.10 attackspambots
F2B jail: sshd. Time: 2019-11-30 16:37:17, Reported by: VKReport
2019-12-01 02:41:05
49.207.100.177 attackspambots
Brute force SMTP login attempted.
...
2019-12-01 02:49:49
181.40.122.2 attackspambots
Nov 30 19:19:57 MainVPS sshd[26367]: Invalid user web from 181.40.122.2 port 6535
Nov 30 19:19:57 MainVPS sshd[26367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.40.122.2
Nov 30 19:19:57 MainVPS sshd[26367]: Invalid user web from 181.40.122.2 port 6535
Nov 30 19:20:00 MainVPS sshd[26367]: Failed password for invalid user web from 181.40.122.2 port 6535 ssh2
Nov 30 19:23:38 MainVPS sshd[639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.40.122.2  user=root
Nov 30 19:23:40 MainVPS sshd[639]: Failed password for root from 181.40.122.2 port 24110 ssh2
...
2019-12-01 02:51:35
27.74.24.3 attackspam
Telnet/23 MH Probe, BF, Hack -
2019-12-01 02:08:47
95.26.230.89 attack
Automatic report - Port Scan Attack
2019-12-01 02:40:34
200.87.178.137 attackbotsspam
Nov 30 17:30:02 localhost sshd\[10754\]: Invalid user llorca from 200.87.178.137 port 54842
Nov 30 17:30:02 localhost sshd\[10754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.87.178.137
Nov 30 17:30:04 localhost sshd\[10754\]: Failed password for invalid user llorca from 200.87.178.137 port 54842 ssh2
2019-12-01 02:25:39
2a03:4000:2b:105f:e8e3:f3ff:fe25:b6d3 attack
11/30/2019-19:09:06.297793 2a03:4000:002b:105f:e8e3:f3ff:fe25:b6d3 Protocol: 6 SURICATA TLS invalid record/traffic
2019-12-01 02:22:28
178.79.7.4 attack
Nov 30 15:33:30 srv01 sshd[10014]: Invalid user ubnt from 178.79.7.4 port 57386
Nov 30 15:33:30 srv01 sshd[10014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.79.7.4
Nov 30 15:33:30 srv01 sshd[10014]: Invalid user ubnt from 178.79.7.4 port 57386
Nov 30 15:33:32 srv01 sshd[10014]: Failed password for invalid user ubnt from 178.79.7.4 port 57386 ssh2
Nov 30 15:33:30 srv01 sshd[10014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.79.7.4
Nov 30 15:33:30 srv01 sshd[10014]: Invalid user ubnt from 178.79.7.4 port 57386
Nov 30 15:33:32 srv01 sshd[10014]: Failed password for invalid user ubnt from 178.79.7.4 port 57386 ssh2
...
2019-12-01 02:26:34
117.43.10.99 attackspam
Telnet/23 MH Probe, BF, Hack -
2019-12-01 02:44:00
88.214.26.102 attackbotsspam
11/30/2019-13:33:23.180603 88.214.26.102 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-01 02:48:32
5.196.18.169 attackspam
Nov 30 17:34:13 icinga sshd[2426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.18.169
Nov 30 17:34:15 icinga sshd[2426]: Failed password for invalid user wangcheng!@#!@# from 5.196.18.169 port 60210 ssh2
...
2019-12-01 02:41:46
218.4.234.74 attack
Nov 30 19:33:20 MK-Soft-VM7 sshd[2867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.4.234.74 
Nov 30 19:33:22 MK-Soft-VM7 sshd[2867]: Failed password for invalid user linux from 218.4.234.74 port 2642 ssh2
...
2019-12-01 02:42:39

最近上报的IP列表

242.52.89.98 173.82.95.164 155.81.69.53 68.106.198.120
15.111.50.75 56.151.165.59 169.229.211.162 216.59.177.251
198.217.162.115 134.226.151.33 190.209.125.186 140.220.39.162
227.61.140.45 85.211.217.17 107.145.64.125 17.75.33.21
192.46.121.52 71.151.98.84 201.188.184.136 110.35.217.115