必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.21.192.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16180
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;128.21.192.49.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 12:59:24 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 49.192.21.128.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.192.21.128.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.85.42.177 attackbots
Unauthorized SSH login attempts
2019-09-22 02:19:48
192.236.199.81 attackspambots
Sep 21 15:20:10 mxgate1 postfix/postscreen[17247]: CONNECT from [192.236.199.81]:33193 to [176.31.12.44]:25
Sep 21 15:20:10 mxgate1 postfix/dnsblog[17445]: addr 192.236.199.81 listed by domain zen.spamhaus.org as 127.0.0.3
Sep 21 15:20:10 mxgate1 postfix/postscreen[17247]: PREGREET 30 after 0.11 from [192.236.199.81]:33193: EHLO 02d6fff2.backheroo.best

Sep 21 15:20:10 mxgate1 postfix/dnsblog[17446]: addr 192.236.199.81 listed by domain b.barracudacentral.org as 127.0.0.2
Sep 21 15:20:10 mxgate1 postfix/postscreen[17247]: DNSBL rank 3 for [192.236.199.81]:33193
Sep x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=192.236.199.81
2019-09-22 02:43:01
54.37.151.239 attackbots
Sep 21 18:24:54 rpi sshd[31029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.151.239 
Sep 21 18:24:57 rpi sshd[31029]: Failed password for invalid user spen from 54.37.151.239 port 51208 ssh2
2019-09-22 02:10:23
211.43.13.237 attackspam
Reported by AbuseIPDB proxy server.
2019-09-22 01:59:15
213.183.101.89 attackbotsspam
Sep 21 16:21:08 meumeu sshd[27275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.183.101.89 
Sep 21 16:21:10 meumeu sshd[27275]: Failed password for invalid user user3 from 213.183.101.89 port 56000 ssh2
Sep 21 16:25:48 meumeu sshd[27851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.183.101.89 
...
2019-09-22 02:03:11
92.118.160.41 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-21 11:45:19,841 INFO [amun_request_handler] PortScan Detected on Port: 143 (92.118.160.41)
2019-09-22 02:38:37
218.78.50.252 attack
Too many connections or unauthorized access detected from Yankee banned ip
2019-09-22 02:23:19
106.12.17.243 attackspam
Sep 21 19:58:23 rpi sshd[32353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.17.243 
Sep 21 19:58:25 rpi sshd[32353]: Failed password for invalid user hartnett from 106.12.17.243 port 38952 ssh2
2019-09-22 02:11:05
94.191.78.128 attackspambots
2019-09-21T16:35:54.541945abusebot.cloudsearch.cf sshd\[4781\]: Invalid user wv from 94.191.78.128 port 43286
2019-09-22 02:28:19
183.131.82.99 attackspam
2019-09-21T18:16:25.221607abusebot-4.cloudsearch.cf sshd\[17753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.131.82.99  user=root
2019-09-22 02:16:56
178.46.188.203 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-21 11:42:51,128 INFO [amun_request_handler] PortScan Detected on Port: 445 (178.46.188.203)
2019-09-22 02:45:28
27.117.163.21 attackbotsspam
$f2bV_matches
2019-09-22 02:44:31
218.16.63.111 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/218.16.63.111/ 
 CN - 1H : (100)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4134 
 
 IP : 218.16.63.111 
 
 CIDR : 218.16.0.0/18 
 
 PREFIX COUNT : 5430 
 
 UNIQUE IP COUNT : 106919680 
 
 
 WYKRYTE ATAKI Z ASN4134 :  
  1H - 1 
  3H - 3 
  6H - 6 
 12H - 15 
 24H - 39 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery
2019-09-22 02:20:53
49.234.233.164 attackbots
Sep 21 18:12:13 pornomens sshd\[19310\]: Invalid user cs from 49.234.233.164 port 36882
Sep 21 18:12:13 pornomens sshd\[19310\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.233.164
Sep 21 18:12:15 pornomens sshd\[19310\]: Failed password for invalid user cs from 49.234.233.164 port 36882 ssh2
...
2019-09-22 02:14:55
146.88.74.158 attackbots
Sep 21 16:28:25 MainVPS sshd[30227]: Invalid user amtszeit from 146.88.74.158 port 35151
Sep 21 16:28:25 MainVPS sshd[30227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.88.74.158
Sep 21 16:28:25 MainVPS sshd[30227]: Invalid user amtszeit from 146.88.74.158 port 35151
Sep 21 16:28:27 MainVPS sshd[30227]: Failed password for invalid user amtszeit from 146.88.74.158 port 35151 ssh2
Sep 21 16:32:52 MainVPS sshd[30594]: Invalid user kjayroe from 146.88.74.158 port 55632
...
2019-09-22 02:36:27

最近上报的IP列表

199.43.214.157 43.41.144.10 139.243.11.149 182.204.39.66
70.152.106.59 20.128.41.167 145.96.69.255 185.12.116.23
175.50.109.92 116.67.117.183 138.251.67.187 217.209.10.249
119.65.34.96 191.111.136.108 107.77.237.228 81.237.25.210
116.123.142.250 204.231.243.15 98.111.100.43 51.36.211.254