必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.99.233.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30569
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.99.233.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 19:01:10 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 149.233.99.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.233.99.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
182.91.0.90 attackspam
TCP port 22 (SSH) attempt blocked by firewall. [2019-07-08 03:03:36]
2019-07-08 09:08:30
78.128.113.67 attackspambots
Jul  8 01:55:23 mail postfix/smtpd\[24354\]: warning: unknown\[78.128.113.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  8 01:55:31 mail postfix/smtpd\[24354\]: warning: unknown\[78.128.113.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  8 02:35:38 mail postfix/smtpd\[27537\]: warning: unknown\[78.128.113.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-08 08:39:00
106.13.72.28 attack
web-1 [ssh] SSH Attack
2019-07-08 08:29:52
185.232.67.13 attackspam
07.07.2019 23:43:58 Connection to port 1723 blocked by firewall
2019-07-08 09:03:03
124.158.5.112 attackspambots
Jul  7 23:30:59 MK-Soft-VM4 sshd\[13712\]: Invalid user billy from 124.158.5.112 port 48054
Jul  7 23:30:59 MK-Soft-VM4 sshd\[13712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.158.5.112
Jul  7 23:31:01 MK-Soft-VM4 sshd\[13712\]: Failed password for invalid user billy from 124.158.5.112 port 48054 ssh2
...
2019-07-08 08:40:47
78.134.65.66 attackspambots
port scan and connect, tcp 23 (telnet)
2019-07-08 09:05:36
218.206.171.6 attackbotsspam
Port Scan 3389
2019-07-08 08:46:07
185.211.245.170 attackbots
Jul  7 20:36:10 web1 postfix/smtpd[31186]: warning: unknown[185.211.245.170]: SASL LOGIN authentication failed: authentication failure
...
2019-07-08 08:38:24
115.78.232.152 attack
Jul  8 02:18:49 minden010 sshd[14860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.78.232.152
Jul  8 02:18:51 minden010 sshd[14860]: Failed password for invalid user student from 115.78.232.152 port 64116 ssh2
Jul  8 02:21:25 minden010 sshd[15767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.78.232.152
...
2019-07-08 08:54:16
129.213.172.170 attack
Jul  7 20:43:24 debian sshd\[4830\]: Invalid user utente from 129.213.172.170 port 35497
Jul  7 20:43:24 debian sshd\[4830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.172.170
Jul  7 20:43:26 debian sshd\[4830\]: Failed password for invalid user utente from 129.213.172.170 port 35497 ssh2
...
2019-07-08 08:44:47
188.165.0.128 attackbots
ENG,WP GET /wp-login.php
2019-07-08 08:26:20
80.49.151.121 attackspam
SSH Brute Force
2019-07-08 08:22:01
139.59.56.121 attack
Jul  8 01:11:46 ArkNodeAT sshd\[7253\]: Invalid user carol from 139.59.56.121
Jul  8 01:11:46 ArkNodeAT sshd\[7253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.56.121
Jul  8 01:11:47 ArkNodeAT sshd\[7253\]: Failed password for invalid user carol from 139.59.56.121 port 40872 ssh2
2019-07-08 08:34:53
92.118.37.84 attackbotsspam
Jul  8 00:13:29 mail kernel: [3042658.165750] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=92.118.37.84 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=61242 PROTO=TCP SPT=41610 DPT=39402 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul  8 00:13:33 mail kernel: [3042661.885059] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=92.118.37.84 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=48964 PROTO=TCP SPT=41610 DPT=32492 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul  8 00:15:09 mail kernel: [3042758.708549] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=92.118.37.84 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=55492 PROTO=TCP SPT=41610 DPT=65150 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul  8 00:16:34 mail kernel: [3042843.158705] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=92.118.37.84 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=63976 PROTO=TCP SPT=41610 DPT=22200 WINDOW=1024 RES=0x00 SYN
2019-07-08 08:36:14
141.98.80.31 attackbots
2019-07-08T06:11:39.790975enmeeting.mahidol.ac.th sshd\[22016\]: Invalid user admin from 141.98.80.31 port 36390
2019-07-08T06:11:39.805071enmeeting.mahidol.ac.th sshd\[22016\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.80.31
2019-07-08T06:11:41.435070enmeeting.mahidol.ac.th sshd\[22016\]: Failed password for invalid user admin from 141.98.80.31 port 36390 ssh2
...
2019-07-08 08:47:42

最近上报的IP列表

231.69.113.14 23.154.201.59 100.53.77.134 219.62.18.31
38.115.61.237 204.9.201.28 35.135.148.224 230.202.125.191
251.80.138.190 84.12.177.21 115.20.147.226 130.195.124.50
235.91.65.255 2.15.105.151 189.11.66.46 148.173.129.91
6.155.172.44 70.228.90.120 108.76.247.65 233.222.17.6