必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.141.49.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58225
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.141.49.168.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022301 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 07:41:26 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
168.49.141.116.in-addr.arpa domain name pointer 168.49.141.116.adsl-pool.jlccptt.net.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
168.49.141.116.in-addr.arpa	name = 168.49.141.116.adsl-pool.jlccptt.net.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
221.7.213.133 attack
Sep 21 08:57:59 icinga sshd[2383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.7.213.133
Sep 21 08:58:01 icinga sshd[2383]: Failed password for invalid user mai from 221.7.213.133 port 51905 ssh2
...
2019-09-21 16:49:10
125.161.169.34 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-21 03:03:01,841 INFO [amun_request_handler] PortScan Detected on Port: 445 (125.161.169.34)
2019-09-21 16:18:12
78.128.113.18 attack
RDP Brute-Force
2019-09-21 16:36:02
118.70.81.108 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-21 02:59:13,274 INFO [amun_request_handler] PortScan Detected on Port: 445 (118.70.81.108)
2019-09-21 16:29:40
103.84.186.137 attackbots
C1,WP GET /comic/wp-login.php
2019-09-21 16:12:01
119.29.203.106 attackbotsspam
Sep 20 22:24:46 auw2 sshd\[30668\]: Invalid user veroxcode from 119.29.203.106
Sep 20 22:24:47 auw2 sshd\[30668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.203.106
Sep 20 22:24:48 auw2 sshd\[30668\]: Failed password for invalid user veroxcode from 119.29.203.106 port 54892 ssh2
Sep 20 22:30:40 auw2 sshd\[31221\]: Invalid user master from 119.29.203.106
Sep 20 22:30:40 auw2 sshd\[31221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.203.106
2019-09-21 16:37:55
141.255.152.2 attackbots
SMB Server BruteForce Attack
2019-09-21 16:53:45
92.242.240.17 attack
Sep 21 09:43:15 microserver sshd[42461]: Invalid user admin from 92.242.240.17 port 56932
Sep 21 09:43:15 microserver sshd[42461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.242.240.17
Sep 21 09:43:17 microserver sshd[42461]: Failed password for invalid user admin from 92.242.240.17 port 56932 ssh2
Sep 21 09:47:31 microserver sshd[43092]: Invalid user nagios from 92.242.240.17 port 42146
Sep 21 09:47:31 microserver sshd[43092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.242.240.17
Sep 21 10:00:08 microserver sshd[44857]: Invalid user joomla from 92.242.240.17 port 54238
Sep 21 10:00:08 microserver sshd[44857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.242.240.17
Sep 21 10:00:11 microserver sshd[44857]: Failed password for invalid user joomla from 92.242.240.17 port 54238 ssh2
Sep 21 10:04:28 microserver sshd[45219]: pam_unix(sshd:auth): authentication failure; lognam
2019-09-21 16:31:02
159.203.193.245 attackbotsspam
" "
2019-09-21 16:51:17
95.168.180.70 attackspam
\[2019-09-21 02:28:15\] SECURITY\[2283\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-21T02:28:15.621-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="90010048525260159",SessionID="0x7fcd8c62a6d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/95.168.180.70/9556",ACLName="no_extension_match"
\[2019-09-21 02:31:39\] SECURITY\[2283\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-21T02:31:39.915-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="101548525260159",SessionID="0x7fcd8ca44b78",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/95.168.180.70/9166",ACLName="no_extension_match"
\[2019-09-21 02:35:03\] SECURITY\[2283\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-21T02:35:03.643-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="101948525260159",SessionID="0x7fcd8c23c548",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/95.168.180.70/8017",ACLName="no_exte
2019-09-21 16:30:35
123.25.15.253 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-21 03:00:22,765 INFO [amun_request_handler] PortScan Detected on Port: 445 (123.25.15.253)
2019-09-21 16:22:19
2.140.78.1 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/2.140.78.1/ 
 ES - 1H : (11)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : ES 
 NAME ASN : ASN3352 
 
 IP : 2.140.78.1 
 
 CIDR : 2.140.0.0/16 
 
 PREFIX COUNT : 662 
 
 UNIQUE IP COUNT : 10540800 
 
 
 WYKRYTE ATAKI Z ASN3352 :  
  1H - 1 
  3H - 1 
  6H - 2 
 12H - 3 
 24H - 5 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery
2019-09-21 16:46:09
79.137.72.98 attack
Sep 21 10:12:40 SilenceServices sshd[18669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.72.98
Sep 21 10:12:42 SilenceServices sshd[18669]: Failed password for invalid user zl from 79.137.72.98 port 41011 ssh2
Sep 21 10:16:46 SilenceServices sshd[19809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.72.98
2019-09-21 16:28:40
124.47.14.14 attackbotsspam
Sep 21 03:51:08 www_kotimaassa_fi sshd[20341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.47.14.14
Sep 21 03:51:10 www_kotimaassa_fi sshd[20341]: Failed password for invalid user altri from 124.47.14.14 port 36060 ssh2
...
2019-09-21 16:39:19
222.188.29.161 attack
Sep 21 06:51:13 pkdns2 sshd\[23466\]: Invalid user admin from 222.188.29.161Sep 21 06:51:15 pkdns2 sshd\[23466\]: Failed password for invalid user admin from 222.188.29.161 port 48950 ssh2Sep 21 06:51:19 pkdns2 sshd\[23466\]: Failed password for invalid user admin from 222.188.29.161 port 48950 ssh2Sep 21 06:51:23 pkdns2 sshd\[23466\]: Failed password for invalid user admin from 222.188.29.161 port 48950 ssh2Sep 21 06:51:28 pkdns2 sshd\[23466\]: Failed password for invalid user admin from 222.188.29.161 port 48950 ssh2Sep 21 06:51:33 pkdns2 sshd\[23466\]: Failed password for invalid user admin from 222.188.29.161 port 48950 ssh2
...
2019-09-21 16:19:08

最近上报的IP列表

80.221.167.81 88.35.239.224 230.90.5.235 40.14.128.29
12.239.194.77 217.177.14.191 137.28.42.134 123.156.7.132
41.156.49.166 246.135.195.216 33.51.131.241 31.181.244.141
245.99.175.188 133.238.150.126 2.254.203.154 168.3.248.45
212.111.131.186 114.170.0.209 127.79.192.220 18.102.85.139