必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.49.230.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42558
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.49.230.68.			IN	A

;; AUTHORITY SECTION:
.			234	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024090701 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 08 03:36:06 CST 2024
;; MSG SIZE  rcvd: 106
HOST信息:
Host 68.230.49.112.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 68.230.49.112.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
37.209.168.139 attack
Unauthorised access (Dec  1) SRC=37.209.168.139 LEN=52 PREC=0x40 TTL=118 ID=4004 DF TCP DPT=1433 WINDOW=8192 SYN
2019-12-01 14:07:17
148.101.221.160 attack
Automatic report - Port Scan Attack
2019-12-01 14:51:15
222.186.175.216 attack
Nov 30 20:40:41 kapalua sshd\[15472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216  user=root
Nov 30 20:40:43 kapalua sshd\[15472\]: Failed password for root from 222.186.175.216 port 13166 ssh2
Nov 30 20:40:46 kapalua sshd\[15472\]: Failed password for root from 222.186.175.216 port 13166 ssh2
Nov 30 20:40:49 kapalua sshd\[15472\]: Failed password for root from 222.186.175.216 port 13166 ssh2
Nov 30 20:40:58 kapalua sshd\[15516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216  user=root
2019-12-01 14:44:50
116.196.82.187 attackbots
Nov 30 14:45:19 h1637304 sshd[2209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.82.187 
Nov 30 14:45:22 h1637304 sshd[2209]: Failed password for invalid user shara from 116.196.82.187 port 33009 ssh2
Nov 30 14:45:22 h1637304 sshd[2209]: Received disconnect from 116.196.82.187: 11: Bye Bye [preauth]
Nov 30 15:20:19 h1637304 sshd[2152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.82.187 
Nov 30 15:20:21 h1637304 sshd[2152]: Failed password for invalid user pentaho from 116.196.82.187 port 44107 ssh2
Nov 30 15:20:22 h1637304 sshd[2152]: Received disconnect from 116.196.82.187: 11: Bye Bye [preauth]
Nov 30 15:23:54 h1637304 sshd[2260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.82.187 
Nov 30 15:23:56 h1637304 sshd[2260]: Failed password for invalid user zf from 116.196.82.187 port 58175 ssh2
Nov 30 15:23:57 h1637304 s........
-------------------------------
2019-12-01 14:11:53
222.127.101.155 attack
Dec  1 07:31:03 dedicated sshd[13205]: Invalid user nadjani from 222.127.101.155 port 28683
2019-12-01 14:46:08
84.174.179.132 attackspam
Nov 29 12:31:57 nandi sshd[26326]: Invalid user owncloud from 84.174.179.132
Nov 29 12:31:59 nandi sshd[26326]: Failed password for invalid user owncloud from 84.174.179.132 port 47370 ssh2
Nov 29 12:31:59 nandi sshd[26326]: Received disconnect from 84.174.179.132: 11: Bye Bye [preauth]
Nov 29 12:53:21 nandi sshd[2255]: Failed password for r.r from 84.174.179.132 port 43412 ssh2
Nov 29 12:53:21 nandi sshd[2255]: Received disconnect from 84.174.179.132: 11: Bye Bye [preauth]
Nov 29 12:56:25 nandi sshd[8093]: Invalid user lamonte from 84.174.179.132
Nov 29 12:56:26 nandi sshd[8093]: Failed password for invalid user lamonte from 84.174.179.132 port 45370 ssh2
Nov 29 12:56:27 nandi sshd[8093]: Received disconnect from 84.174.179.132: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=84.174.179.132
2019-12-01 14:08:37
159.89.162.118 attack
Dec  1 07:27:52 vps666546 sshd\[15347\]: Invalid user justin1 from 159.89.162.118 port 38550
Dec  1 07:27:52 vps666546 sshd\[15347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.162.118
Dec  1 07:27:54 vps666546 sshd\[15347\]: Failed password for invalid user justin1 from 159.89.162.118 port 38550 ssh2
Dec  1 07:31:25 vps666546 sshd\[15467\]: Invalid user archan from 159.89.162.118 port 45554
Dec  1 07:31:25 vps666546 sshd\[15467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.162.118
...
2019-12-01 14:43:08
106.13.18.86 attackspambots
Dec  1 07:30:47 lnxded63 sshd[19795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.18.86
2019-12-01 14:44:22
120.32.37.145 attackspambots
Invalid user postgres from 120.32.37.145 port 19076
2019-12-01 14:18:42
109.194.175.27 attackspam
Nov 30 20:09:03 php1 sshd\[30746\]: Invalid user mostovac from 109.194.175.27
Nov 30 20:09:03 php1 sshd\[30746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.175.27
Nov 30 20:09:04 php1 sshd\[30746\]: Failed password for invalid user mostovac from 109.194.175.27 port 37436 ssh2
Nov 30 20:12:47 php1 sshd\[31182\]: Invalid user arkel from 109.194.175.27
Nov 30 20:12:47 php1 sshd\[31182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.175.27
2019-12-01 14:23:15
221.14.146.222 attack
" "
2019-12-01 14:46:25
116.228.53.227 attack
Dec  1 06:53:49 server sshd\[20481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.228.53.227  user=mysql
Dec  1 06:53:51 server sshd\[20481\]: Failed password for mysql from 116.228.53.227 port 50252 ssh2
Dec  1 06:57:04 server sshd\[20835\]: Invalid user ubnt from 116.228.53.227 port 54598
Dec  1 06:57:04 server sshd\[20835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.228.53.227
Dec  1 06:57:06 server sshd\[20835\]: Failed password for invalid user ubnt from 116.228.53.227 port 54598 ssh2
2019-12-01 14:09:38
200.39.15.145 spambotsattackproxynormal
Intentaron entrar a.i correo electrónico
2019-12-01 14:30:41
110.44.124.132 attack
...
2019-12-01 14:55:25
46.229.168.146 attackspambots
Unauthorized access detected from banned ip
2019-12-01 14:29:53

最近上报的IP列表

112.49.249.92 112.49.160.75 112.49.195.132 112.49.18.241
112.49.151.73 112.49.145.238 112.49.153.50 112.49.139.143
112.57.133.246 112.49.131.191 112.5.91.32 112.49.205.173
112.5.186.226 112.49.187.52 112.49.144.102 112.49.145.76
112.49.122.1 112.49.129.81 112.49.120.26 112.48.85.200