必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 126.49.48.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37606
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;126.49.48.106.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030100 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 02 00:22:47 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
106.48.49.126.in-addr.arpa domain name pointer softbank126049048106.bbtec.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
106.48.49.126.in-addr.arpa	name = softbank126049048106.bbtec.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
77.122.5.5 attackspam
Port 1433 Scan
2019-12-05 05:35:13
162.219.250.25 attack
162.219.250.25 - - [04/Dec/2019:20:15:12 +0100] "POST /wp-login.php HTTP/1.1" 200 3123 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
162.219.250.25 - - [04/Dec/2019:20:15:13 +0100] "POST /wp-login.php HTTP/1.1" 200 3102 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-12-05 05:38:32
5.135.165.51 attackbots
$f2bV_matches
2019-12-05 05:11:25
220.120.106.254 attack
Dec  4 23:08:28 server sshd\[385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.120.106.254  user=root
Dec  4 23:08:30 server sshd\[385\]: Failed password for root from 220.120.106.254 port 58152 ssh2
Dec  4 23:18:56 server sshd\[3299\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.120.106.254  user=root
Dec  4 23:18:58 server sshd\[3299\]: Failed password for root from 220.120.106.254 port 38786 ssh2
Dec  4 23:26:04 server sshd\[5657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.120.106.254  user=root
...
2019-12-05 05:23:42
159.89.134.199 attackspam
Dec  4 22:29:37 legacy sshd[11147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.134.199
Dec  4 22:29:39 legacy sshd[11147]: Failed password for invalid user lisa from 159.89.134.199 port 58554 ssh2
Dec  4 22:35:01 legacy sshd[11411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.134.199
...
2019-12-05 05:37:17
180.76.142.91 attackbots
Dec  4 22:25:47 meumeu sshd[15522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.142.91 
Dec  4 22:25:49 meumeu sshd[15522]: Failed password for invalid user alvi from 180.76.142.91 port 58026 ssh2
Dec  4 22:31:45 meumeu sshd[16482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.142.91 
...
2019-12-05 05:48:22
206.72.198.39 attack
Dec  4 01:11:35 amida sshd[393445]: reveeclipse mapping checking getaddrinfo for altgen.inteeclipserver.net [206.72.198.39] failed - POSSIBLE BREAK-IN ATTEMPT!
Dec  4 01:11:35 amida sshd[393445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.72.198.39  user=backup
Dec  4 01:11:37 amida sshd[393445]: Failed password for backup from 206.72.198.39 port 35874 ssh2
Dec  4 01:11:37 amida sshd[393445]: Received disconnect from 206.72.198.39: 11: Bye Bye [preauth]
Dec  4 01:19:54 amida sshd[395067]: reveeclipse mapping checking getaddrinfo for altgen.inteeclipserver.net [206.72.198.39] failed - POSSIBLE BREAK-IN ATTEMPT!
Dec  4 01:19:54 amida sshd[395067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.72.198.39  user=sync
Dec  4 01:19:56 amida sshd[395067]: Failed password for sync from 206.72.198.39 port 38324 ssh2
Dec  4 01:19:56 amida sshd[395067]: Received disconnect from 206.72.198.........
-------------------------------
2019-12-05 05:26:22
157.55.39.240 attackspambots
Automatic report - Banned IP Access
2019-12-05 05:48:06
196.219.173.109 attack
Dec  4 21:57:47 legacy sshd[9316]: Failed password for root from 196.219.173.109 port 54536 ssh2
Dec  4 22:04:54 legacy sshd[9799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.219.173.109
Dec  4 22:04:56 legacy sshd[9799]: Failed password for invalid user hl from 196.219.173.109 port 37084 ssh2
...
2019-12-05 05:23:58
182.176.121.236 attackspam
Automatic report - Banned IP Access
2019-12-05 05:41:15
104.236.63.99 attackspambots
Dec  4 13:19:35 mockhub sshd[15715]: Failed password for root from 104.236.63.99 port 34762 ssh2
Dec  4 13:25:12 mockhub sshd[15906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.63.99
...
2019-12-05 05:29:40
106.13.173.141 attack
Unauthorized SSH login attempts
2019-12-05 05:31:58
222.186.42.4 attackspambots
Dec  2 09:46:32 microserver sshd[56083]: Failed none for root from 222.186.42.4 port 36094 ssh2
Dec  2 09:46:32 microserver sshd[56083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.4  user=root
Dec  2 09:46:35 microserver sshd[56083]: Failed password for root from 222.186.42.4 port 36094 ssh2
Dec  2 09:46:38 microserver sshd[56083]: Failed password for root from 222.186.42.4 port 36094 ssh2
Dec  2 09:46:41 microserver sshd[56083]: Failed password for root from 222.186.42.4 port 36094 ssh2
Dec  2 10:12:20 microserver sshd[60106]: Failed none for root from 222.186.42.4 port 49472 ssh2
Dec  2 10:12:20 microserver sshd[60106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.4  user=root
Dec  2 10:12:22 microserver sshd[60106]: Failed password for root from 222.186.42.4 port 49472 ssh2
Dec  2 10:12:25 microserver sshd[60106]: Failed password for root from 222.186.42.4 port 49472 ssh2
Dec  2 10:12:29 microserve
2019-12-05 05:39:37
164.132.57.16 attackbots
Dec  4 21:30:14 fr01 sshd[30716]: Invalid user home from 164.132.57.16
Dec  4 21:30:14 fr01 sshd[30716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.57.16
Dec  4 21:30:14 fr01 sshd[30716]: Invalid user home from 164.132.57.16
Dec  4 21:30:16 fr01 sshd[30716]: Failed password for invalid user home from 164.132.57.16 port 42932 ssh2
...
2019-12-05 05:29:26
45.60.106.167 attackbots
IDENTITY THEFT ATTEMPT BY AMAZON.COM PRETENDING TO BE COX.NET WITH AN AMAZONAWS.COM WEB PAGE AND TWO COX REPLY TO ADDRESSES OF mcgeejc@cox.net AND info@cox.net
2019-12-05 05:17:40

最近上报的IP列表

73.242.12.90 163.116.192.199 55.117.17.221 99.52.96.202
247.237.177.125 42.186.180.123 226.178.201.111 133.108.200.234
53.235.119.214 190.181.47.241 147.241.140.162 242.40.3.50
172.242.204.68 220.249.142.186 19.185.75.15 46.147.136.196
172.229.147.152 212.96.146.14 205.231.78.5 158.179.25.248