必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.68.149.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8032
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.68.149.22.			IN	A

;; AUTHORITY SECTION:
.			166	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023102300 1800 900 604800 86400

;; Query time: 90 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 23 21:11:54 CST 2023
;; MSG SIZE  rcvd: 106
HOST信息:
Host 22.149.68.124.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 22.149.68.124.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
188.166.239.94 attackspambots
WP Authentication failure
2019-07-12 02:47:08
110.244.90.233 attackspam
" "
2019-07-12 02:54:33
185.176.27.18 attackspambots
11.07.2019 18:16:23 Connection to port 29390 blocked by firewall
2019-07-12 03:05:46
123.27.45.238 attack
Jul 11 16:03:42 mxgate1 postfix/postscreen[28941]: CONNECT from [123.27.45.238]:15280 to [176.31.12.44]:25
Jul 11 16:03:42 mxgate1 postfix/dnsblog[28945]: addr 123.27.45.238 listed by domain zen.spamhaus.org as 127.0.0.11
Jul 11 16:03:42 mxgate1 postfix/dnsblog[28945]: addr 123.27.45.238 listed by domain zen.spamhaus.org as 127.0.0.4
Jul 11 16:03:42 mxgate1 postfix/dnsblog[28945]: addr 123.27.45.238 listed by domain zen.spamhaus.org as 127.0.0.3
Jul 11 16:03:42 mxgate1 postfix/dnsblog[28946]: addr 123.27.45.238 listed by domain cbl.abuseat.org as 127.0.0.2
Jul 11 16:03:42 mxgate1 postfix/dnsblog[28943]: addr 123.27.45.238 listed by domain b.barracudacentral.org as 127.0.0.2
Jul 11 16:03:48 mxgate1 postfix/postscreen[28941]: DNSBL rank 4 for [123.27.45.238]:15280
Jul 11 16:03:49 mxgate1 postfix/postscreen[28941]: NOQUEUE: reject: RCPT from [123.27.45.238]:15280: 550 5.7.1 Service unavailable; client [123.27.45.238] blocked using zen.spamhaus.org; from=x@x helo=
2019-07-12 03:12:15
46.105.30.20 attackspambots
Jul 11 20:23:21 mail sshd\[12619\]: Invalid user dick from 46.105.30.20
Jul 11 20:23:21 mail sshd\[12619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.30.20
Jul 11 20:23:22 mail sshd\[12619\]: Failed password for invalid user dick from 46.105.30.20 port 59254 ssh2
...
2019-07-12 02:58:32
54.149.191.238 attackspambots
TCP src-port=5287   dst-port=25    spam-sorbs         (455)
2019-07-12 03:14:36
151.80.140.13 attack
May 20 19:18:54 server sshd\[22885\]: Invalid user bn from 151.80.140.13
May 20 19:18:54 server sshd\[22885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.140.13
May 20 19:18:57 server sshd\[22885\]: Failed password for invalid user bn from 151.80.140.13 port 60460 ssh2
...
2019-07-12 03:03:35
222.72.140.18 attack
web-1 [ssh] SSH Attack
2019-07-12 03:10:47
148.70.2.5 attackbots
Jul 10 22:38:51 s02-markstaller sshd[23124]: Invalid user fabien from 148.70.2.5
Jul 10 22:38:53 s02-markstaller sshd[23124]: Failed password for invalid user fabien from 148.70.2.5 port 59454 ssh2
Jul 10 22:41:20 s02-markstaller sshd[23262]: Invalid user test from 148.70.2.5
Jul 10 22:41:22 s02-markstaller sshd[23262]: Failed password for invalid user test from 148.70.2.5 port 52160 ssh2
Jul 10 22:42:59 s02-markstaller sshd[23323]: Invalid user libuuid from 148.70.2.5
Jul 10 22:43:01 s02-markstaller sshd[23323]: Failed password for invalid user libuuid from 148.70.2.5 port 39356 ssh2
Jul 10 22:44:38 s02-markstaller sshd[23371]: Invalid user ts3 from 148.70.2.5
Jul 10 22:44:40 s02-markstaller sshd[23371]: Failed password for invalid user ts3 from 148.70.2.5 port 54792 ssh2
Jul 10 22:46:12 s02-markstaller sshd[23450]: Invalid user web from 148.70.2.5
Jul 10 22:46:14 s02-markstaller sshd[23450]: Failed password for invalid user web from 148.70.2.5 port 41984 ssh2
Jul 10 22........
------------------------------
2019-07-12 03:10:02
152.250.252.179 attackspambots
Jun  3 16:38:18 server sshd\[99567\]: Invalid user qichang from 152.250.252.179
Jun  3 16:38:18 server sshd\[99567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.250.252.179
Jun  3 16:38:20 server sshd\[99567\]: Failed password for invalid user qichang from 152.250.252.179 port 37164 ssh2
...
2019-07-12 02:48:53
153.199.225.63 attackspambots
Jun  4 23:38:40 server sshd\[155103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.199.225.63  user=root
Jun  4 23:38:42 server sshd\[155103\]: Failed password for root from 153.199.225.63 port 53788 ssh2
Jun  4 23:39:03 server sshd\[155103\]: Failed password for root from 153.199.225.63 port 53788 ssh2
...
2019-07-12 02:45:32
150.109.52.125 attackspam
Apr 10 12:07:05 server sshd\[73408\]: Invalid user jboss from 150.109.52.125
Apr 10 12:07:05 server sshd\[73408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.52.125
Apr 10 12:07:07 server sshd\[73408\]: Failed password for invalid user jboss from 150.109.52.125 port 38326 ssh2
...
2019-07-12 03:11:20
148.70.77.22 attack
Jul  5 20:44:29 server sshd\[215661\]: Invalid user titan from 148.70.77.22
Jul  5 20:44:29 server sshd\[215661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.77.22
Jul  5 20:44:31 server sshd\[215661\]: Failed password for invalid user titan from 148.70.77.22 port 47186 ssh2
...
2019-07-12 03:23:48
149.202.59.85 attack
May 14 22:15:50 server sshd\[227631\]: Invalid user im from 149.202.59.85
May 14 22:15:50 server sshd\[227631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.59.85
May 14 22:15:52 server sshd\[227631\]: Failed password for invalid user im from 149.202.59.85 port 45343 ssh2
...
2019-07-12 03:19:48
185.211.245.170 attackbots
Jul 11 20:07:40 relay postfix/smtpd\[10674\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 11 20:18:19 relay postfix/smtpd\[21720\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 11 20:18:29 relay postfix/smtpd\[10674\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 11 20:18:58 relay postfix/smtpd\[23577\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 11 20:19:20 relay postfix/smtpd\[23577\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-07-12 02:43:10

最近上报的IP列表

241.194.241.5 187.175.123.154 40.30.117.194 203.211.93.60
3.33.221.48 7.207.102.55 94.126.203.68 84.119.18.37
27.165.109.161 13.83.140.91 147.79.202.234 179.178.11.14
148.97.31.172 72.12.13.164 86.60.195.214 233.239.61.32
103.96.12.254 169.64.17.169 97.21.71.15 155.191.96.127