必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea (the Republic of)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.56.82.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29578
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.56.82.48.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 04:10:29 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 48.82.56.124.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.82.56.124.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.85.42.180 attackbotsspam
Sep  4 17:48:11 jane sshd[24350]: Failed password for root from 112.85.42.180 port 41853 ssh2
Sep  4 17:48:15 jane sshd[24350]: Failed password for root from 112.85.42.180 port 41853 ssh2
...
2020-09-04 23:50:23
201.48.26.193 attackbotsspam
Honeypot attack, port: 445, PTR: 201-048-026-193.static.ctbctelecom.com.br.
2020-09-04 23:52:24
61.91.57.150 attack
Icarus honeypot on github
2020-09-04 23:57:22
199.175.43.118 attackbots
 TCP (SYN) 199.175.43.118:48966 -> port 1433, len 40
2020-09-05 00:07:36
82.55.217.156 attackbots
Sep  2 10:47:21 xxxx sshd[19700]: Invalid user pi from 82.55.217.156
Sep  2 10:47:21 xxxx sshd[19700]: Failed none for invalid user pi from 82.55.217.156 port 53156 ssh2
Sep  2 10:47:21 xxxx sshd[19702]: Invalid user pi from 82.55.217.156
Sep  2 10:47:21 xxxx sshd[19702]: Failed none for invalid user pi from 82.55.217.156 port 53158 ssh2
Sep  2 10:47:21 xxxx sshd[19700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=host-82-55-217-156.retail.telecomhostnamealia.hostname 
Sep  2 10:47:21 xxxx sshd[19702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=host-82-55-217-156.retail.telecomhostnamealia.hostname 
Sep  2 10:47:23 xxxx sshd[19700]: Failed password for invalid user pi from 82.55.217.156 port 53156 ssh2
Sep  2 10:47:23 xxxx sshd[19702]: Failed password for invalid user pi from 82.55.217.156 port 53158 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=82.55.217.156
2020-09-05 00:13:38
185.127.24.58 attackbots
exim abuse
2020-09-05 00:26:20
67.6.254.157 attack
SSH/22 MH Probe, BF, Hack -
2020-09-05 00:15:16
197.43.34.141 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-09-04 23:52:56
212.70.149.20 attack
Sep  4 17:12:44 mail postfix/smtpd\[28616\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep  4 17:13:09 mail postfix/smtpd\[28233\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep  4 17:13:35 mail postfix/smtpd\[28233\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep  4 17:43:49 mail postfix/smtpd\[29310\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-09-04 23:43:15
63.83.79.154 attack
Lines containing failures of 63.83.79.154
Sep  2 10:42:22 v2hgb postfix/smtpd[24059]: connect from chase.heceemlak.com[63.83.79.154]
Sep x@x
Sep  2 10:42:23 v2hgb postfix/smtpd[24059]: disconnect from chase.heceemlak.com[63.83.79.154] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=63.83.79.154
2020-09-04 23:56:06
189.192.100.139 attackspambots
Invalid user tzq from 189.192.100.139 port 56190
2020-09-04 23:58:55
139.199.10.43 attack
 TCP (SYN) 139.199.10.43:56883 -> port 445, len 44
2020-09-04 23:42:53
183.2.102.19 attackspam
Lines containing failures of 183.2.102.19
Sep  2 04:40:06 newdogma sshd[28433]: Invalid user csvn from 183.2.102.19 port 40690
Sep  2 04:40:06 newdogma sshd[28433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.2.102.19 
Sep  2 04:40:08 newdogma sshd[28433]: Failed password for invalid user csvn from 183.2.102.19 port 40690 ssh2
Sep  2 04:40:10 newdogma sshd[28433]: Received disconnect from 183.2.102.19 port 40690:11: Bye Bye [preauth]
Sep  2 04:40:10 newdogma sshd[28433]: Disconnected from invalid user csvn 183.2.102.19 port 40690 [preauth]
Sep  2 04:45:26 newdogma sshd[29511]: Invalid user michael from 183.2.102.19 port 37776
Sep  2 04:45:26 newdogma sshd[29511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.2.102.19 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=183.2.102.19
2020-09-05 00:05:09
85.209.0.251 attackbots
IP blocked
2020-09-05 00:32:41
192.241.229.86 attackspam
Port scanning [2 denied]
2020-09-05 00:25:48

最近上报的IP列表

76.6.33.159 167.79.77.185 31.102.177.209 206.221.138.131
96.15.129.10 206.40.16.94 134.52.119.2 163.217.52.81
147.225.108.152 12.211.72.41 71.92.136.7 45.17.79.149
51.167.40.25 18.23.35.52 52.223.58.226 243.101.189.228
93.179.60.194 226.212.30.110 80.85.158.110 200.55.154.146