必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Malaysia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.100.149.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39790
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.100.149.234.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 15:42:53 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 234.149.100.118.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 234.149.100.118.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
91.121.156.133 attackspam
/var/log/messages:Jun 18 17:54:37 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1560880477.232:144230): pid=4003 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-server cipher=aes256-ctr ksize=256 mac=hmac-sha2-256 pfs=ecdh-sha2-nistp256 spid=4004 suid=74 rport=56144 laddr=104.167.106.93 lport=23  exe="/usr/sbin/sshd" hostname=? addr=91.121.156.133 terminal=? res=success'
/var/log/messages:Jun 18 17:54:37 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1560880477.239:144231): pid=4003 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-client cipher=aes256-ctr ksize=256 mac=hmac-sha2-256 pfs=ecdh-sha2-nistp256 spid=4004 suid=74 rport=56144 laddr=104.167.106.93 lport=23  exe="/usr/sbin/sshd" hostname=? addr=91.121.156.133 terminal=? res=success'
/var/log/messages:Jun 18 17:54:53 sanyalnet-cloud-vps fail2ban.filter[19699]: WARNING ........
-------------------------------
2019-06-22 18:26:34
185.220.102.4 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.4  user=root
Failed password for root from 185.220.102.4 port 36373 ssh2
Failed password for root from 185.220.102.4 port 36373 ssh2
Failed password for root from 185.220.102.4 port 36373 ssh2
Failed password for root from 185.220.102.4 port 36373 ssh2
2019-06-22 18:25:40
165.22.110.127 attackbotsspam
Jun 22 05:19:54 localhost sshd\[126671\]: Invalid user rong from 165.22.110.127 port 34164
Jun 22 05:19:54 localhost sshd\[126671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.110.127
Jun 22 05:19:57 localhost sshd\[126671\]: Failed password for invalid user rong from 165.22.110.127 port 34164 ssh2
Jun 22 05:21:26 localhost sshd\[126738\]: Invalid user bserver from 165.22.110.127 port 50008
Jun 22 05:21:26 localhost sshd\[126738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.110.127
...
2019-06-22 18:36:29
93.118.104.149 attack
Jun 19 12:07:07 our-server-hostname postfix/smtpd[5618]: connect from unknown[93.118.104.149]
Jun x@x
Jun 19 12:07:10 our-server-hostname postfix/smtpd[5618]: lost connection after RCPT from unknown[93.118.104.149]
Jun 19 12:07:10 our-server-hostname postfix/smtpd[5618]: disconnect from unknown[93.118.104.149]
Jun 19 12:39:24 our-server-hostname postfix/smtpd[16176]: connect from unknown[93.118.104.149]
Jun x@x
Jun x@x
Jun x@x
Jun 19 12:39:29 our-server-hostname postfix/smtpd[16176]: lost connection after RCPT from unknown[93.118.104.149]
Jun 19 12:39:29 our-server-hostname postfix/smtpd[16176]: disconnect from unknown[93.118.104.149]
Jun 19 12:52:13 our-server-hostname postfix/smtpd[24174]: connect from unknown[93.118.104.149]
Jun 19 12:52:17 our-server-hostname postfix/smtpd[24044]: connect from unknown[93.118.104.149]
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun 19 12:52:30 our-server-hostname postfix/smtpd[24174]: lost connecti........
-------------------------------
2019-06-22 17:56:24
221.229.207.213 attackspam
22.06.2019 08:24:38 Connection to port 1433 blocked by firewall
2019-06-22 18:17:52
86.42.91.227 attack
2019-06-22T08:29:14.612980abusebot-5.cloudsearch.cf sshd\[6957\]: Invalid user admin from 86.42.91.227 port 60527
2019-06-22 17:50:53
98.161.151.166 attackspam
IMAP brute force
...
2019-06-22 18:32:03
81.22.45.165 attackbotsspam
Multiport scan : 15 ports scanned 3379 3380 3381 3382 3383 3384 3385 3386 3387 3388 30306 30315 30325 30353 30366
2019-06-22 17:55:18
150.107.140.213 attackspam
Jun 17 17:21:10 xb0 sshd[5623]: Failed password for invalid user cybele from 150.107.140.213 port 42298 ssh2
Jun 17 17:21:10 xb0 sshd[5623]: Received disconnect from 150.107.140.213: 11: Bye Bye [preauth]
Jun 17 17:24:54 xb0 sshd[15729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.107.140.213  user=r.r
Jun 17 17:24:56 xb0 sshd[15729]: Failed password for r.r from 150.107.140.213 port 50988 ssh2
Jun 17 17:24:57 xb0 sshd[15729]: Received disconnect from 150.107.140.213: 11: Bye Bye [preauth]
Jun 17 17:27:12 xb0 sshd[8320]: Failed password for invalid user pgsql1 from 150.107.140.213 port 44718 ssh2
Jun 17 17:27:12 xb0 sshd[8320]: Received disconnect from 150.107.140.213: 11: Bye Bye [preauth]
Jun 17 17:29:35 xb0 sshd[13829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.107.140.213  user=mysql
Jun 17 17:29:37 xb0 sshd[13829]: Failed password for mysql from 150.107.140.213 port 38........
-------------------------------
2019-06-22 18:06:03
186.215.11.153 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-22 18:27:45
218.92.0.207 attackbotsspam
Jun 22 11:34:45 MK-Soft-Root2 sshd\[18340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.207  user=root
Jun 22 11:34:48 MK-Soft-Root2 sshd\[18340\]: Failed password for root from 218.92.0.207 port 41996 ssh2
Jun 22 11:34:50 MK-Soft-Root2 sshd\[18340\]: Failed password for root from 218.92.0.207 port 41996 ssh2
...
2019-06-22 18:23:53
134.209.115.206 attackbots
Jun 22 09:19:27 DAAP sshd[26370]: Invalid user zhun from 134.209.115.206 port 43010
Jun 22 09:19:27 DAAP sshd[26370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.115.206
Jun 22 09:19:27 DAAP sshd[26370]: Invalid user zhun from 134.209.115.206 port 43010
Jun 22 09:19:29 DAAP sshd[26370]: Failed password for invalid user zhun from 134.209.115.206 port 43010 ssh2
Jun 22 09:29:06 DAAP sshd[26433]: Invalid user cuan from 134.209.115.206 port 45958
...
2019-06-22 17:56:05
45.82.153.2 attack
Jun 22 11:57:53 h2177944 kernel: \[2541459.207426\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.82.153.2 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=55969 PROTO=TCP SPT=51416 DPT=2506 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 22 12:02:14 h2177944 kernel: \[2541719.442763\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.82.153.2 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=22230 PROTO=TCP SPT=51416 DPT=3342 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 22 12:05:26 h2177944 kernel: \[2541912.093943\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.82.153.2 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=987 PROTO=TCP SPT=51416 DPT=3368 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 22 12:10:24 h2177944 kernel: \[2542209.856953\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.82.153.2 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=52719 PROTO=TCP SPT=51416 DPT=3247 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 22 12:11:13 h2177944 kernel: \[2542258.968597\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.82.153.2 DST=85.214.117.9 LEN=40 TOS=
2019-06-22 18:22:11
85.195.93.252 attackspam
Jun 21 16:36:16 mxgate1 postfix/postscreen[9125]: CONNECT from [85.195.93.252]:47810 to [176.31.12.44]:25
Jun 21 16:36:22 mxgate1 postfix/postscreen[9125]: PASS NEW [85.195.93.252]:47810
Jun 21 16:36:26 mxgate1 postfix/smtpd[9210]: connect from shancomm.com[85.195.93.252]
Jun x@x
Jun 21 16:36:27 mxgate1 postfix/smtpd[9210]: disconnect from shancomm.com[85.195.93.252] ehlo=2 starttls=1 mail=1 rcpt=0/1 data=0/1 eclipset=1 quhostname=1 commands=6/8
Jun 21 16:43:28 mxgate1 postfix/postscreen[9125]: CONNECT from [85.195.93.252]:41973 to [176.31.12.44]:25
Jun 21 16:43:29 mxgate1 postfix/postscreen[9125]: PASS OLD [85.195.93.252]:41973
Jun 21 16:43:29 mxgate1 postfix/smtpd[9224]: connect from shancomm.com[85.195.93.252]
Jun x@x
Jun 21 16:43:29 mxgate1 postfix/smtpd[9224]: disconnect from shancomm.com[85.195.93.252] ehlo=2 starttls=1 mail=1 rcpt=0/1 data=0/1 eclipset=1 quhostname=1 commands=6/8
Jun 21 16:50:37 mxgate1 postfix/postscreen[9125]: CONNECT from [85.195.93.252]:48950........
-------------------------------
2019-06-22 17:37:59
51.254.206.149 attackbotsspam
leo_www
2019-06-22 18:21:37

最近上报的IP列表

56.8.70.232 194.100.118.25 185.251.4.108 31.133.189.77
192.178.127.211 135.174.162.165 88.26.26.80 207.180.177.227
25.109.1.190 179.71.72.19 43.36.42.140 220.220.207.174
61.100.29.84 92.59.255.70 8.172.31.196 173.203.168.100
54.29.102.181 230.246.176.104 251.216.230.17 56.68.136.192