必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Hong Kong

运营商(isp): Hong Kong Telecommunications (HKT) Limited

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
类型 评论内容 时间
attackbots
port scan and connect, tcp 23 (telnet)
2019-08-29 04:42:40
相同子网IP讨论:
IP 类型 评论内容 时间
116.49.240.123 attack
Unauthorized connection attempt detected from IP address 116.49.240.123 to port 5555 [J]
2020-01-27 01:33:45
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.49.240.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11751
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;116.49.240.5.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082802 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Aug 29 04:42:35 CST 2019
;; MSG SIZE  rcvd: 116
HOST信息:
5.240.49.116.in-addr.arpa domain name pointer n11649240005.netvigator.com.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
5.240.49.116.in-addr.arpa	name = n11649240005.netvigator.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
123.108.249.82 attack
proto=tcp  .  spt=33241  .  dpt=25  .     (Found on   Dark List de Oct 07)     (433)
2019-10-07 15:28:26
185.13.32.112 attackspambots
B: Magento admin pass test (wrong country)
2019-10-07 14:59:18
101.226.241.58 attack
firewall-block, port(s): 445/tcp
2019-10-07 15:09:32
58.186.110.45 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 07-10-2019 04:50:25.
2019-10-07 14:53:29
180.251.191.173 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 07-10-2019 04:50:22.
2019-10-07 14:58:08
125.212.203.113 attackspam
Automatic report - SSH Brute-Force Attack
2019-10-07 15:26:05
128.71.137.99 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 07-10-2019 04:50:19.
2019-10-07 15:02:13
103.87.25.201 attackbotsspam
Oct  7 09:16:00 meumeu sshd[27220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.87.25.201 
Oct  7 09:16:01 meumeu sshd[27220]: Failed password for invalid user Beauty@123 from 103.87.25.201 port 36374 ssh2
Oct  7 09:21:07 meumeu sshd[27851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.87.25.201 
...
2019-10-07 15:27:35
190.1.131.212 attackspam
Automatic report - SSH Brute-Force Attack
2019-10-07 15:07:36
178.45.219.60 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 07-10-2019 04:50:21.
2019-10-07 14:58:36
14.186.252.232 attackbotsspam
Oct  7 05:50:12 [munged] sshd[7133]: Failed password for root from 14.186.252.232 port 50815 ssh2
2019-10-07 15:09:09
118.96.81.32 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 07-10-2019 04:50:19.
2019-10-07 15:03:31
50.87.248.100 attack
rumsingen.mit-polly.de 50.87.248.100 \[07/Oct/2019:05:50:12 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 3563 "-" "Mozilla/5.0 \(Windows\; U\; Windows NT 5.1\; en-US\; rv:1.9.0.1\) Gecko/2008070208 Firefox/3.0.1"
rumsingen.mit-polly.de 50.87.248.100 \[07/Oct/2019:05:50:16 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 3563 "-" "Mozilla/5.0 \(Windows\; U\; Windows NT 5.1\; en-US\; rv:1.9.0.1\) Gecko/2008070208 Firefox/3.0.1"
2019-10-07 15:05:22
118.25.143.199 attackbots
Oct  7 10:18:54 server sshd\[6816\]: User root from 118.25.143.199 not allowed because listed in DenyUsers
Oct  7 10:18:54 server sshd\[6816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.143.199  user=root
Oct  7 10:18:57 server sshd\[6816\]: Failed password for invalid user root from 118.25.143.199 port 50722 ssh2
Oct  7 10:23:24 server sshd\[20236\]: User root from 118.25.143.199 not allowed because listed in DenyUsers
Oct  7 10:23:24 server sshd\[20236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.143.199  user=root
2019-10-07 15:30:09
95.246.220.194 attackspam
Automatic report - Port Scan Attack
2019-10-07 15:11:16

最近上报的IP列表

143.140.48.0 217.141.180.78 122.195.253.157 180.126.227.161
1.18.73.84 138.121.128.19 2607:f298:5:111b::be0:a660 113.111.82.231
101.164.65.216 145.131.21.23 209.97.174.81 123.235.242.117
134.209.107.206 62.75.208.167 114.237.229.103 37.230.116.97
124.160.33.62 2.222.184.134 54.36.149.88 170.202.155.238