必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): SoftBank

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 126.149.233.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50557
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;126.149.233.105.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 09:48:33 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
105.233.149.126.in-addr.arpa domain name pointer ai126149233105.54.access-internet.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
105.233.149.126.in-addr.arpa	name = ai126149233105.54.access-internet.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
125.67.237.251 attack
2019-09-11T10:00:46.518860abusebot-4.cloudsearch.cf sshd\[20253\]: Invalid user teamspeak3 from 125.67.237.251 port 45076
2019-09-11 18:01:32
185.129.62.62 attackspam
SSH Brute-Forcing (ownc)
2019-09-11 19:33:40
193.112.58.212 attackspam
2019-09-11T12:03:25.135944lon01.zurich-datacenter.net sshd\[20180\]: Invalid user sshuser from 193.112.58.212 port 37368
2019-09-11T12:03:25.140942lon01.zurich-datacenter.net sshd\[20180\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.58.212
2019-09-11T12:03:27.996734lon01.zurich-datacenter.net sshd\[20180\]: Failed password for invalid user sshuser from 193.112.58.212 port 37368 ssh2
2019-09-11T12:08:05.450544lon01.zurich-datacenter.net sshd\[20302\]: Invalid user proxyuser from 193.112.58.212 port 50470
2019-09-11T12:08:05.455734lon01.zurich-datacenter.net sshd\[20302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.58.212
...
2019-09-11 19:08:21
27.97.81.168 attackbots
Brute force attempt
2019-09-11 19:02:46
142.93.237.140 attackspambots
2019-09-11T10:50:51.194137abusebot-6.cloudsearch.cf sshd\[14439\]: Invalid user user1 from 142.93.237.140 port 42648
2019-09-11 19:06:06
104.248.116.140 attackspam
Sep 11 09:54:23 web8 sshd\[22148\]: Invalid user admin from 104.248.116.140
Sep 11 09:54:23 web8 sshd\[22148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.116.140
Sep 11 09:54:25 web8 sshd\[22148\]: Failed password for invalid user admin from 104.248.116.140 port 54438 ssh2
Sep 11 10:00:08 web8 sshd\[24887\]: Invalid user xguest from 104.248.116.140
Sep 11 10:00:08 web8 sshd\[24887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.116.140
2019-09-11 18:10:11
117.30.73.202 attack
Sep 11 12:47:46 site3 sshd\[218953\]: Invalid user svnadmin from 117.30.73.202
Sep 11 12:47:46 site3 sshd\[218953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.30.73.202
Sep 11 12:47:48 site3 sshd\[218953\]: Failed password for invalid user svnadmin from 117.30.73.202 port 56750 ssh2
Sep 11 12:54:09 site3 sshd\[219020\]: Invalid user biadmin from 117.30.73.202
Sep 11 12:54:09 site3 sshd\[219020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.30.73.202
...
2019-09-11 18:11:31
68.183.29.124 attack
Invalid user username from 68.183.29.124 port 41922
2019-09-11 19:30:11
212.176.114.10 attack
Sep 11 09:56:15 lnxded63 sshd[24951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.176.114.10
2019-09-11 18:08:44
217.182.74.116 attack
Automatic report - Banned IP Access
2019-09-11 19:22:05
51.83.78.109 attackspambots
Sep 11 11:45:41 SilenceServices sshd[26931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.78.109
Sep 11 11:45:42 SilenceServices sshd[26931]: Failed password for invalid user manager from 51.83.78.109 port 41666 ssh2
Sep 11 11:51:45 SilenceServices sshd[29183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.78.109
2019-09-11 18:05:52
109.202.0.162 attackspam
/setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=busybox&curpath=/¤tsetting.htm=1
2019-09-11 19:34:17
167.71.231.150 attack
167.71.231.150:27452 - - [10/Sep/2019:20:17:29 +0200] "GET /wp-login.php HTTP/1.1" 404 293
2019-09-11 17:58:05
149.129.173.223 attackspambots
SSH invalid-user multiple login try
2019-09-11 19:16:33
23.129.64.100 attackbotsspam
ssh failed login
2019-09-11 18:50:38

最近上报的IP列表

162.174.250.67 32.38.236.203 252.130.93.206 17.238.252.29
60.160.144.82 129.243.23.225 44.167.249.229 12.92.192.180
31.147.24.228 16.39.79.67 148.220.34.51 241.110.67.148
198.252.194.57 88.45.96.231 216.204.100.203 71.97.71.19
194.178.3.249 17.53.131.48 236.105.191.13 60.143.132.183