必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Viet Nam

运营商(isp): Viettel Corporation

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.5.49.102
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42569
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;117.5.49.102.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062201 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 22 23:00:27 CST 2019
;; MSG SIZE  rcvd: 116
HOST信息:
102.49.5.117.in-addr.arpa domain name pointer localhost.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
102.49.5.117.in-addr.arpa	name = localhost.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
31.168.58.123 attackspambots
Automatic report - Banned IP Access
2020-05-10 19:54:17
159.65.136.196 attackbots
May 10 12:05:07 srv01 sshd[14398]: Invalid user us from 159.65.136.196 port 52306
May 10 12:05:07 srv01 sshd[14398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.136.196
May 10 12:05:07 srv01 sshd[14398]: Invalid user us from 159.65.136.196 port 52306
May 10 12:05:10 srv01 sshd[14398]: Failed password for invalid user us from 159.65.136.196 port 52306 ssh2
May 10 12:09:09 srv01 sshd[14693]: Invalid user kelly from 159.65.136.196 port 59650
...
2020-05-10 19:32:46
37.187.101.66 attackbots
May 10 10:36:11 [host] sshd[27273]: Invalid user c
May 10 10:36:11 [host] sshd[27273]: pam_unix(sshd:
May 10 10:36:13 [host] sshd[27273]: Failed passwor
2020-05-10 19:43:18
202.188.20.123 attack
detected by Fail2Ban
2020-05-10 19:41:31
91.121.183.15 attackspam
91.121.183.15 - - [10/May/2020:13:55:22 +0200] "POST /wp-login.php HTTP/1.1" 200 5338 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
91.121.183.15 - - [10/May/2020:13:57:11 +0200] "POST /wp-login.php HTTP/1.1" 200 5338 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
91.121.183.15 - - [10/May/2020:13:58:47 +0200] "POST /wp-login.php HTTP/1.1" 200 5338 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
91.121.183.15 - - [10/May/2020:14:00:22 +0200] "POST /wp-login.php HTTP/1.1" 200 5338 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
91.121.183.15 - - [10/May/2020:14:01:49 +0200] "POST /wp-login.php HTTP/1.1" 200 5338 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safar
...
2020-05-10 20:04:48
62.90.226.188 attackspam
5x Failed Password
2020-05-10 19:57:14
189.203.233.206 attackspam
20/5/10@01:40:10: FAIL: Alarm-Network address from=189.203.233.206
20/5/10@01:40:10: FAIL: Alarm-Network address from=189.203.233.206
...
2020-05-10 19:56:57
175.193.13.3 attackspam
May 10 06:30:45 OPSO sshd\[18336\]: Invalid user ftpuser from 175.193.13.3 port 33508
May 10 06:30:45 OPSO sshd\[18336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.193.13.3
May 10 06:30:47 OPSO sshd\[18336\]: Failed password for invalid user ftpuser from 175.193.13.3 port 33508 ssh2
May 10 06:34:59 OPSO sshd\[18871\]: Invalid user struts1 from 175.193.13.3 port 40330
May 10 06:34:59 OPSO sshd\[18871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.193.13.3
2020-05-10 19:43:05
106.12.211.254 attackbotsspam
May 10 06:54:42 ns3033917 sshd[2794]: Invalid user test from 106.12.211.254 port 46822
May 10 06:54:44 ns3033917 sshd[2794]: Failed password for invalid user test from 106.12.211.254 port 46822 ssh2
May 10 07:17:54 ns3033917 sshd[3069]: Invalid user dbsnmp from 106.12.211.254 port 37456
...
2020-05-10 19:33:06
181.30.28.219 attackspambots
" "
2020-05-10 19:29:34
79.137.84.214 attackbots
79.137.84.214 - - [10/May/2020:11:18:09 +0200] "GET /wp-login.php HTTP/1.1" 200 6124 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
79.137.84.214 - - [10/May/2020:11:18:11 +0200] "POST /wp-login.php HTTP/1.1" 200 6354 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
79.137.84.214 - - [10/May/2020:11:18:12 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-10 19:50:19
170.210.121.208 attackbots
May 10 05:06:06 r.ca sshd[18688]: Failed password for invalid user aq from 170.210.121.208 port 42720 ssh2
2020-05-10 19:53:52
152.32.130.48 attackbots
May 10 08:15:26 OPSO sshd\[6805\]: Invalid user fauro from 152.32.130.48 port 54996
May 10 08:15:26 OPSO sshd\[6805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.130.48
May 10 08:15:29 OPSO sshd\[6805\]: Failed password for invalid user fauro from 152.32.130.48 port 54996 ssh2
May 10 08:19:22 OPSO sshd\[7565\]: Invalid user lion from 152.32.130.48 port 36034
May 10 08:19:22 OPSO sshd\[7565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.130.48
2020-05-10 19:51:45
170.106.3.225 attack
May 10 05:36:45 mail sshd\[7627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.3.225  user=root
...
2020-05-10 19:50:52
197.44.49.170 attackbotsspam
Unauthorized connection attempt detected from IP address 197.44.49.170 to port 80
2020-05-10 20:07:17

最近上报的IP列表

210.135.79.95 120.59.240.93 211.72.1.19 93.120.57.115
103.50.154.4 114.32.86.21 14.90.122.221 84.2.118.227
148.63.34.162 47.106.161.248 218.42.68.22 139.211.83.206
171.13.251.210 166.32.133.197 81.9.223.123 68.111.135.255
209.153.247.88 110.76.234.74 170.2.167.188 210.35.35.200