必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
114.119.150.142 attack
badbot
2020-01-14 09:12:10
114.119.150.103 attack
badbot
2020-01-13 22:55:36
114.119.150.154 attackbots
badbot
2020-01-13 21:30:37
114.119.150.93 attackbotsspam
badbot
2020-01-11 18:54:19
114.119.150.18 attackbotsspam
badbot
2020-01-10 07:21:59
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.119.150.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1293
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.119.150.249.		IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 14:19:53 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
249.150.119.114.in-addr.arpa domain name pointer petalbot-114-119-150-249.petalsearch.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
249.150.119.114.in-addr.arpa	name = petalbot-114-119-150-249.petalsearch.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
212.70.149.67 attack
Aug 10 17:04:20 web02.agentur-b-2.de postfix/smtps/smtpd[3128480]: warning: unknown[212.70.149.67]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 10 17:04:26 web02.agentur-b-2.de postfix/smtps/smtpd[3128480]: lost connection after AUTH from unknown[212.70.149.67]
Aug 10 17:06:06 web02.agentur-b-2.de postfix/smtps/smtpd[3128480]: warning: unknown[212.70.149.67]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 10 17:06:13 web02.agentur-b-2.de postfix/smtps/smtpd[3128480]: lost connection after AUTH from unknown[212.70.149.67]
Aug 10 17:07:53 web02.agentur-b-2.de postfix/smtps/smtpd[3128480]: warning: unknown[212.70.149.67]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-08-10 23:55:12
110.175.128.62 attackbotsspam
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-11 00:13:33
222.186.61.115 attack
 TCP (SYN) 222.186.61.115:52429 -> port 81, len 44
2020-08-10 23:45:51
125.21.227.181 attackbotsspam
Aug 10 14:00:14 vpn01 sshd[15846]: Failed password for root from 125.21.227.181 port 59312 ssh2
...
2020-08-10 23:50:15
49.83.151.151 attack
Lines containing failures of 49.83.151.151
Aug 10 13:53:35 nbi-636 sshd[32623]: Bad protocol version identification '' from 49.83.151.151 port 54644
Aug 10 13:53:38 nbi-636 sshd[32629]: Invalid user admin from 49.83.151.151 port 54935
Aug 10 13:53:38 nbi-636 sshd[32629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.83.151.151 
Aug 10 13:53:40 nbi-636 sshd[32629]: Failed password for invalid user admin from 49.83.151.151 port 54935 ssh2
Aug 10 13:53:42 nbi-636 sshd[32629]: Connection closed by invalid user admin 49.83.151.151 port 54935 [preauth]
Aug 10 13:53:45 nbi-636 sshd[32634]: Invalid user admin from 49.83.151.151 port 56797
Aug 10 13:53:45 nbi-636 sshd[32634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.83.151.151 
Aug 10 13:53:47 nbi-636 sshd[32634]: Failed password for invalid user admin from 49.83.151.151 port 56797 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/vi
2020-08-11 00:11:08
111.88.245.203 attackspam
2020-08-10 13:50:17 plain_virtual_exim authenticator failed for ([111.88.245.203]) [111.88.245.203]: 535 Incorrect authentication data


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=111.88.245.203
2020-08-10 23:47:07
216.104.200.173 attackbots
Lines containing failures of 216.104.200.173
Aug 10 13:52:43 shared04 sshd[6877]: Did not receive identification string from 216.104.200.173 port 60618
Aug 10 13:52:48 shared04 sshd[6881]: Invalid user 666666 from 216.104.200.173 port 61093
Aug 10 13:52:48 shared04 sshd[6881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.104.200.173
Aug 10 13:52:50 shared04 sshd[6881]: Failed password for invalid user 666666 from 216.104.200.173 port 61093 ssh2
Aug 10 13:52:51 shared04 sshd[6881]: Connection closed by invalid user 666666 216.104.200.173 port 61093 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=216.104.200.173
2020-08-10 23:53:41
165.16.178.4 attackbotsspam
" "
2020-08-11 00:03:42
1.196.238.130 attack
Aug 10 07:25:32 Server1 sshd[17355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.196.238.130  user=r.r
Aug 10 07:25:34 Server1 sshd[17355]: Failed password for r.r from 1.196.238.130 port 60522 ssh2
Aug 10 07:25:34 Server1 sshd[17355]: Received disconnect from 1.196.238.130 port 60522:11: Bye Bye [preauth]
Aug 10 07:25:34 Server1 sshd[17355]: Disconnected from authenticating user r.r 1.196.238.130 port 60522 [preauth]
Aug 10 07:48:07 Server1 sshd[17748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.196.238.130  user=r.r
Aug 10 07:48:09 Server1 sshd[17748]: Failed password for r.r from 1.196.238.130 port 39678 ssh2
Aug 10 07:48:10 Server1 sshd[17748]: Received disconnect from 1.196.238.130 port 39678:11: Bye Bye [preauth]
Aug 10 07:48:10 Server1 sshd[17748]: Disconnected from authenticating user r.r 1.196.238.130 port 39678 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/v
2020-08-10 23:45:16
154.70.208.66 attack
Aug 10 14:03:19 vps sshd[30127]: Failed password for root from 154.70.208.66 port 42448 ssh2
Aug 10 14:05:02 vps sshd[30215]: Failed password for root from 154.70.208.66 port 52292 ssh2
...
2020-08-10 23:38:23
145.239.11.166 attackbots
[2020-08-10 11:25:13] NOTICE[1185][C-000005b4] chan_sip.c: Call from '' (145.239.11.166:20975) to extension '00447441399590' rejected because extension not found in context 'public'.
[2020-08-10 11:25:13] SECURITY[1203] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-10T11:25:13.057-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00447441399590",SessionID="0x7f10c405a408",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/145.239.11.166/5060",ACLName="no_extension_match"
[2020-08-10 11:26:00] NOTICE[1185][C-000005b6] chan_sip.c: Call from '' (145.239.11.166:41724) to extension '00447441399590' rejected because extension not found in context 'public'.
[2020-08-10 11:26:00] SECURITY[1203] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-10T11:26:00.935-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00447441399590",SessionID="0x7f10c405a408",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/14
...
2020-08-10 23:46:10
167.172.38.238 attackbotsspam
Aug 10 16:37:07 ns382633 sshd\[4273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.38.238  user=root
Aug 10 16:37:10 ns382633 sshd\[4273\]: Failed password for root from 167.172.38.238 port 42876 ssh2
Aug 10 16:51:19 ns382633 sshd\[6735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.38.238  user=root
Aug 10 16:51:22 ns382633 sshd\[6735\]: Failed password for root from 167.172.38.238 port 33204 ssh2
Aug 10 16:55:08 ns382633 sshd\[7354\]: Invalid user \~\#\$%\^\&\*\(\),.\; from 167.172.38.238 port 44428
Aug 10 16:55:08 ns382633 sshd\[7354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.38.238
2020-08-10 23:30:58
89.248.172.16 attack
 TCP (SYN) 89.248.172.16:24858 -> port 2067, len 44
2020-08-10 23:39:23
106.55.163.249 attackbotsspam
Aug 10 14:21:46 piServer sshd[2772]: Failed password for root from 106.55.163.249 port 54368 ssh2
Aug 10 14:24:48 piServer sshd[3040]: Failed password for root from 106.55.163.249 port 59860 ssh2
...
2020-08-10 23:58:13
217.182.73.36 attackbots
Automatic report generated by Wazuh
2020-08-10 23:47:31

最近上报的IP列表

114.119.130.30 139.194.167.251 78.85.161.148 112.94.253.177
192.152.152.6 35.165.149.131 176.8.82.75 125.108.180.223
92.63.32.139 183.143.153.81 98.152.68.206 201.156.218.49
61.129.101.64 201.150.174.89 49.216.16.215 104.244.76.127
1.24.220.139 217.24.155.122 192.241.210.54 151.242.225.0