必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Coram

省份(region): New York

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): SUNY at Stony Brook

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.49.2.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29510
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;129.49.2.45.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052100 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed May 22 01:07:46 CST 2019
;; MSG SIZE  rcvd: 115

HOST信息:
45.2.49.129.in-addr.arpa domain name pointer joesws1.cc.stonybrook.edu.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
45.2.49.129.in-addr.arpa	name = joesws1.cc.stonybrook.edu.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
94.102.51.98 attackbots
Port scan on 3 port(s): 2466 3489 3491
2019-10-16 14:13:47
181.28.94.205 attack
2019-10-16T07:37:34.707840  sshd[24858]: Invalid user jair from 181.28.94.205 port 34666
2019-10-16T07:37:34.721013  sshd[24858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.28.94.205
2019-10-16T07:37:34.707840  sshd[24858]: Invalid user jair from 181.28.94.205 port 34666
2019-10-16T07:37:37.316013  sshd[24858]: Failed password for invalid user jair from 181.28.94.205 port 34666 ssh2
2019-10-16T07:42:18.752372  sshd[24887]: Invalid user diradmin from 181.28.94.205 port 45294
...
2019-10-16 14:37:23
106.12.176.3 attackspambots
Oct 16 08:00:43 OPSO sshd\[13092\]: Invalid user H@123 from 106.12.176.3 port 57828
Oct 16 08:00:43 OPSO sshd\[13092\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.176.3
Oct 16 08:00:45 OPSO sshd\[13092\]: Failed password for invalid user H@123 from 106.12.176.3 port 57828 ssh2
Oct 16 08:05:25 OPSO sshd\[14026\]: Invalid user primrose from 106.12.176.3 port 39408
Oct 16 08:05:25 OPSO sshd\[14026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.176.3
2019-10-16 14:26:29
46.229.168.142 attackbotsspam
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools
2019-10-16 14:21:55
190.191.194.9 attackbotsspam
2019-10-16T07:11:30.639143lon01.zurich-datacenter.net sshd\[27598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.191.194.9  user=root
2019-10-16T07:11:32.190585lon01.zurich-datacenter.net sshd\[27598\]: Failed password for root from 190.191.194.9 port 57191 ssh2
2019-10-16T07:16:01.281301lon01.zurich-datacenter.net sshd\[27696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.191.194.9  user=root
2019-10-16T07:16:03.033909lon01.zurich-datacenter.net sshd\[27696\]: Failed password for root from 190.191.194.9 port 48237 ssh2
2019-10-16T07:20:42.354811lon01.zurich-datacenter.net sshd\[27774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.191.194.9  user=root
...
2019-10-16 14:19:09
117.63.192.42 attackspam
Oct 15 23:23:05 esmtp postfix/smtpd[7782]: lost connection after AUTH from unknown[117.63.192.42]
Oct 15 23:23:07 esmtp postfix/smtpd[7782]: lost connection after AUTH from unknown[117.63.192.42]
Oct 15 23:23:08 esmtp postfix/smtpd[8011]: lost connection after AUTH from unknown[117.63.192.42]
Oct 15 23:23:08 esmtp postfix/smtpd[7782]: lost connection after AUTH from unknown[117.63.192.42]
Oct 15 23:23:10 esmtp postfix/smtpd[7782]: lost connection after AUTH from unknown[117.63.192.42]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=117.63.192.42
2019-10-16 14:03:12
2600:380:9a56:aed1:5124:afd4:ee5b:5600 attackspam
cell phone with email hacking
2019-10-16 14:26:16
45.55.177.170 attack
$f2bV_matches
2019-10-16 14:28:47
218.27.204.33 attack
Oct 16 09:58:01 microserver sshd[24614]: Invalid user toby from 218.27.204.33 port 33036
Oct 16 09:58:01 microserver sshd[24614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.27.204.33
Oct 16 09:58:03 microserver sshd[24614]: Failed password for invalid user toby from 218.27.204.33 port 33036 ssh2
Oct 16 10:03:25 microserver sshd[25309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.27.204.33  user=root
Oct 16 10:03:26 microserver sshd[25309]: Failed password for root from 218.27.204.33 port 40504 ssh2
2019-10-16 14:04:56
149.56.96.78 attack
Oct 16 06:51:09 SilenceServices sshd[4298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.96.78
Oct 16 06:51:11 SilenceServices sshd[4298]: Failed password for invalid user psb from 149.56.96.78 port 17106 ssh2
Oct 16 06:55:12 SilenceServices sshd[5716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.96.78
2019-10-16 14:31:00
134.209.83.191 attackbotsspam
Automatic report - SSH Brute-Force Attack
2019-10-16 14:31:14
165.22.130.8 attackbotsspam
Oct 16 08:50:14 server sshd\[3230\]: Failed password for invalid user user from 165.22.130.8 port 45064 ssh2
Oct 16 08:57:27 server sshd\[5370\]: Invalid user disklessadmin from 165.22.130.8
Oct 16 08:57:27 server sshd\[5370\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.130.8 
Oct 16 08:57:30 server sshd\[5370\]: Failed password for invalid user disklessadmin from 165.22.130.8 port 41230 ssh2
Oct 16 09:11:50 server sshd\[10408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.130.8  user=root
...
2019-10-16 14:40:47
45.237.140.120 attackbotsspam
Oct 16 06:19:31 game-panel sshd[15653]: Failed password for root from 45.237.140.120 port 40445 ssh2
Oct 16 06:24:23 game-panel sshd[15787]: Failed password for root from 45.237.140.120 port 41223 ssh2
2019-10-16 14:33:24
31.179.183.30 attackbots
Oct 16 07:52:42 mout sshd[11217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.179.183.30  user=root
Oct 16 07:52:44 mout sshd[11217]: Failed password for root from 31.179.183.30 port 47974 ssh2
2019-10-16 14:05:14
222.186.173.201 attackbots
10/16/2019-02:30:49.453120 222.186.173.201 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-16 14:38:39

最近上报的IP列表

104.16.108.137 74.228.19.170 91.165.43.225 2.10.182.184
191.119.20.255 90.51.54.46 38.216.66.251 198.216.146.91
205.228.17.72 209.85.221.65 89.1.211.104 54.173.19.79
35.80.216.135 205.212.4.154 31.197.213.251 65.242.101.253
176.146.18.175 6.15.33.139 46.101.170.54 208.166.226.227