必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.179.242.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47374
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.179.242.148.		IN	A

;; AUTHORITY SECTION:
.			179	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 12:30:54 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 148.242.179.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.242.179.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
109.134.8.174 attack
2020-06-05T03:54:39.115897abusebot-4.cloudsearch.cf sshd[8774]: Invalid user pi from 109.134.8.174 port 39644
2020-06-05T03:54:39.120517abusebot-4.cloudsearch.cf sshd[8776]: Invalid user pi from 109.134.8.174 port 39646
2020-06-05T03:54:39.154035abusebot-4.cloudsearch.cf sshd[8776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.134.8.174
2020-06-05T03:54:39.120517abusebot-4.cloudsearch.cf sshd[8776]: Invalid user pi from 109.134.8.174 port 39646
2020-06-05T03:54:41.169674abusebot-4.cloudsearch.cf sshd[8776]: Failed password for invalid user pi from 109.134.8.174 port 39646 ssh2
2020-06-05T03:54:39.190961abusebot-4.cloudsearch.cf sshd[8774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.134.8.174
2020-06-05T03:54:39.115897abusebot-4.cloudsearch.cf sshd[8774]: Invalid user pi from 109.134.8.174 port 39644
2020-06-05T03:54:41.206586abusebot-4.cloudsearch.cf sshd[8774]: Failed password for invalid u
...
2020-06-05 15:34:50
79.124.62.82 attackbotsspam
firewall-block, port(s): 3031/tcp, 5580/tcp, 6020/tcp
2020-06-05 16:01:22
149.56.99.85 attack
2020-06-05T08:44[Censored Hostname] sshd[2725389]: Failed password for sshd from 149.56.99.85 port 41408 ssh2
2020-06-05T08:44[Censored Hostname] sshd[2725389]: Failed password for sshd from 149.56.99.85 port 41408 ssh2
2020-06-05T08:44[Censored Hostname] sshd[2725389]: Failed password for sshd from 149.56.99.85 port 41408 ssh2[...]
2020-06-05 16:01:54
2.61.159.218 attack
(RU/Russia/-) SMTP Bruteforcing attempts
2020-06-05 16:06:19
89.248.160.150 attackbotsspam
 UDP 89.248.160.150:40516 -> port 45261, len 57
2020-06-05 16:10:36
123.232.102.30 attackbots
Jun  5 05:51:17 sip sshd[546385]: Failed password for root from 123.232.102.30 port 48032 ssh2
Jun  5 05:53:42 sip sshd[546405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.232.102.30  user=root
Jun  5 05:53:45 sip sshd[546405]: Failed password for root from 123.232.102.30 port 42058 ssh2
...
2020-06-05 16:09:51
83.24.177.193 attackbotsspam
Jun  5 15:22:37 localhost sshd[3554093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.24.177.193  user=root
Jun  5 15:22:39 localhost sshd[3554093]: Failed password for root from 83.24.177.193 port 55380 ssh2
...
2020-06-05 15:46:00
120.31.143.209 attackspam
Invalid user dnyakundi from 120.31.143.209 port 34130
2020-06-05 15:40:31
190.119.190.122 attack
Jun  5 08:01:21 legacy sshd[20012]: Failed password for root from 190.119.190.122 port 35610 ssh2
Jun  5 08:05:20 legacy sshd[20126]: Failed password for root from 190.119.190.122 port 40004 ssh2
...
2020-06-05 15:58:55
31.170.53.175 attackbots
(IR/Iran/-) SMTP Bruteforcing attempts
2020-06-05 15:50:46
46.101.40.21 attack
Jun  5 07:58:37 abendstille sshd\[29498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.40.21  user=root
Jun  5 07:58:40 abendstille sshd\[29498\]: Failed password for root from 46.101.40.21 port 36884 ssh2
Jun  5 08:02:11 abendstille sshd\[32765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.40.21  user=root
Jun  5 08:02:13 abendstille sshd\[32765\]: Failed password for root from 46.101.40.21 port 41510 ssh2
Jun  5 08:05:38 abendstille sshd\[3534\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.40.21  user=root
...
2020-06-05 16:11:38
185.220.101.138 attack
[MK-Root1] Blocked by UFW
2020-06-05 16:04:41
222.186.175.215 attackspambots
Jun  5 07:24:45 localhost sshd[72867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215  user=root
Jun  5 07:24:47 localhost sshd[72867]: Failed password for root from 222.186.175.215 port 54924 ssh2
Jun  5 07:24:51 localhost sshd[72867]: Failed password for root from 222.186.175.215 port 54924 ssh2
Jun  5 07:24:45 localhost sshd[72867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215  user=root
Jun  5 07:24:47 localhost sshd[72867]: Failed password for root from 222.186.175.215 port 54924 ssh2
Jun  5 07:24:51 localhost sshd[72867]: Failed password for root from 222.186.175.215 port 54924 ssh2
Jun  5 07:24:45 localhost sshd[72867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215  user=root
Jun  5 07:24:47 localhost sshd[72867]: Failed password for root from 222.186.175.215 port 54924 ssh2
Jun  5 07:24:51 localhost sshd[72
...
2020-06-05 15:39:39
218.92.0.212 attackspam
SSH Brute-Force attacks
2020-06-05 15:47:31
164.52.24.180 attackspambots
" "
2020-06-05 16:06:38

最近上报的IP列表

119.179.242.147 119.179.242.157 119.179.242.171 119.179.242.175
119.179.242.185 119.179.242.58 119.179.242.7 119.179.242.9
119.179.242.99 119.179.243.176 119.179.243.197 119.179.243.31
119.179.243.48 119.179.243.56 119.179.243.82 119.179.243.9
119.179.248.204 119.179.250.107 119.179.250.139 119.179.250.91