必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 127.48.94.192
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61516
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;127.48.94.192.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 06:04:28 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 192.94.48.127.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 192.94.48.127.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
195.62.71.20 attack
Oct  9 21:04:02 hanapaa sshd\[15206\]: Invalid user Premium123 from 195.62.71.20
Oct  9 21:04:02 hanapaa sshd\[15206\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.62.71.20
Oct  9 21:04:04 hanapaa sshd\[15206\]: Failed password for invalid user Premium123 from 195.62.71.20 port 54270 ssh2
Oct  9 21:08:09 hanapaa sshd\[15522\]: Invalid user Grande-123 from 195.62.71.20
Oct  9 21:08:09 hanapaa sshd\[15522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.62.71.20
2019-10-10 15:56:37
77.120.163.103 attackbotsspam
email spam
2019-10-10 16:14:59
157.230.226.7 attack
Oct 10 09:48:29 jane sshd[27162]: Failed password for root from 157.230.226.7 port 47020 ssh2
...
2019-10-10 16:25:02
117.239.63.161 attack
Unauthorised access (Oct 10) SRC=117.239.63.161 LEN=52 PREC=0x20 TTL=113 ID=28395 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-10 16:09:19
35.154.103.207 attack
Oct  6 22:34:18 DNS-2 sshd[15279]: User r.r from 35.154.103.207 not allowed because not listed in AllowUsers
Oct  6 22:34:18 DNS-2 sshd[15279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.154.103.207  user=r.r
Oct  6 22:34:19 DNS-2 sshd[15279]: Failed password for invalid user r.r from 35.154.103.207 port 35219 ssh2
Oct  6 22:34:19 DNS-2 sshd[15279]: Received disconnect from 35.154.103.207 port 35219:11: Bye Bye [preauth]
Oct  6 22:34:19 DNS-2 sshd[15279]: Disconnected from 35.154.103.207 port 35219 [preauth]
Oct  6 22:40:33 DNS-2 sshd[15649]: User r.r from 35.154.103.207 not allowed because not listed in AllowUsers
Oct  6 22:40:33 DNS-2 sshd[15649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.154.103.207  user=r.r
Oct  6 22:40:35 DNS-2 ssh
.... truncated .... 

Oct  6 22:34:18 DNS-2 sshd[15279]: User r.r from 35.154.103.207 not allowed because not listed in AllowUsers
Oct  6 2........
-------------------------------
2019-10-10 15:47:34
54.39.75.1 attackbotsspam
Oct 10 09:29:42 SilenceServices sshd[16532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.75.1
Oct 10 09:29:44 SilenceServices sshd[16532]: Failed password for invalid user dodsserver from 54.39.75.1 port 36494 ssh2
Oct 10 09:32:03 SilenceServices sshd[17133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.75.1
2019-10-10 15:47:05
222.186.180.8 attackspambots
Oct 10 08:05:32 *** sshd[32438]: User root from 222.186.180.8 not allowed because not listed in AllowUsers
2019-10-10 16:06:04
148.70.18.216 attackspam
Oct  6 18:16:58 km20725 sshd[32186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.18.216  user=r.r
Oct  6 18:17:00 km20725 sshd[32186]: Failed password for r.r from 148.70.18.216 port 42144 ssh2
Oct  6 18:17:01 km20725 sshd[32186]: Received disconnect from 148.70.18.216: 11: Bye Bye [preauth]
Oct  6 18:24:09 km20725 sshd[32594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.18.216  user=r.r
Oct  6 18:24:12 km20725 sshd[32594]: Failed password for r.r from 148.70.18.216 port 59502 ssh2
Oct  6 18:24:12 km20725 sshd[32594]: Received disconnect from 148.70.18.216: 11: Bye Bye [preauth]
Oct  6 18:42:32 km20725 sshd[1857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.18.216  user=r.r
Oct  6 1
.... truncated .... 

Oct  6 18:16:58 km20725 sshd[32186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser........
-------------------------------
2019-10-10 16:14:38
221.181.24.246 attackbots
Oct 10 06:44:59 raspberrypi sshd\[15092\]: Invalid user support from 221.181.24.246Oct 10 06:45:01 raspberrypi sshd\[15092\]: Failed password for invalid user support from 221.181.24.246 port 53302 ssh2Oct 10 06:45:03 raspberrypi sshd\[15099\]: Invalid user ubnt from 221.181.24.246
...
2019-10-10 16:05:16
120.52.152.18 attack
UTC: 2019-10-09 pkts: 2
ports(tcp): 11, 119
2019-10-10 16:23:25
207.246.240.120 attackbots
langenachtfulda.de 207.246.240.120 \[10/Oct/2019:05:48:58 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4278 "-" "Mozilla/5.0 \(Windows\; U\; Windows NT 5.1\; en-US\; rv:1.9.0.1\) Gecko/2008070208 Firefox/3.0.1"
langenachtfulda.de 207.246.240.120 \[10/Oct/2019:05:49:00 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4278 "-" "Mozilla/5.0 \(Windows\; U\; Windows NT 5.1\; en-US\; rv:1.9.0.1\) Gecko/2008070208 Firefox/3.0.1"
2019-10-10 16:27:16
106.13.27.93 attackspambots
Tried sshing with brute force.
2019-10-10 15:57:32
54.37.79.94 attack
Port Scan: TCP/443
2019-10-10 16:07:51
213.32.65.111 attackbots
2019-10-10T03:49:53.421896abusebot-2.cloudsearch.cf sshd\[11184\]: Invalid user Admin@2010 from 213.32.65.111 port 56992
2019-10-10 15:52:45
124.74.248.218 attackspambots
$f2bV_matches
2019-10-10 15:59:09

最近上报的IP列表

247.21.9.64 163.11.25.11 44.39.157.169 208.146.162.92
4.109.205.103 179.74.91.72 231.201.56.15 118.187.43.34
165.240.98.4 190.71.208.91 25.154.121.161 245.108.67.195
136.215.8.224 85.224.113.116 38.47.126.145 249.28.160.59
171.248.10.183 234.6.59.170 235.182.203.10 200.103.46.146