必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.49.117.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50519
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.49.117.106.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022201 1800 900 604800 86400

;; Query time: 122 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 05:04:11 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 106.117.49.130.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 106.117.49.130.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
200.196.47.214 attackbots
Nov 22 15:26:45 pl2server sshd[12622]: reveeclipse mapping checking getaddrinfo for 200-196-47-214.spdlink.com.br [200.196.47.214] failed - POSSIBLE BREAK-IN ATTEMPT!
Nov 22 15:26:45 pl2server sshd[12622]: Invalid user admin from 200.196.47.214
Nov 22 15:26:45 pl2server sshd[12622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.196.47.214
Nov 22 15:26:47 pl2server sshd[12622]: Failed password for invalid user admin from 200.196.47.214 port 53137 ssh2
Nov 22 15:26:48 pl2server sshd[12622]: Connection closed by 200.196.47.214 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=200.196.47.214
2019-11-23 06:06:07
212.64.54.49 attackspambots
Nov 22 22:15:06 roki sshd[26547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.54.49  user=root
Nov 22 22:15:08 roki sshd[26547]: Failed password for root from 212.64.54.49 port 45402 ssh2
Nov 22 22:28:43 roki sshd[27424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.54.49  user=backup
Nov 22 22:28:45 roki sshd[27424]: Failed password for backup from 212.64.54.49 port 41844 ssh2
Nov 22 22:32:34 roki sshd[27681]: Invalid user cms from 212.64.54.49
Nov 22 22:32:34 roki sshd[27681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.54.49
...
2019-11-23 05:51:46
152.136.165.226 attackspambots
Nov 20 23:09:22 linuxrulz sshd[31705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.165.226  user=r.r
Nov 20 23:09:24 linuxrulz sshd[31705]: Failed password for r.r from 152.136.165.226 port 37750 ssh2
Nov 20 23:09:25 linuxrulz sshd[31705]: Received disconnect from 152.136.165.226 port 37750:11: Bye Bye [preauth]
Nov 20 23:09:25 linuxrulz sshd[31705]: Disconnected from 152.136.165.226 port 37750 [preauth]
Nov 20 23:26:28 linuxrulz sshd[1867]: Invalid user kafka from 152.136.165.226 port 56226
Nov 20 23:26:28 linuxrulz sshd[1867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.165.226
Nov 20 23:26:30 linuxrulz sshd[1867]: Failed password for invalid user kafka from 152.136.165.226 port 56226 ssh2
Nov 20 23:26:30 linuxrulz sshd[1867]: Received disconnect from 152.136.165.226 port 56226:11: Bye Bye [preauth]
Nov 20 23:26:30 linuxrulz sshd[1867]: Disconnected from 152.136.165........
-------------------------------
2019-11-23 06:20:12
168.128.86.35 attackbots
Nov 22 22:00:53 venus sshd\[15957\]: Invalid user gloom from 168.128.86.35 port 38470
Nov 22 22:00:53 venus sshd\[15957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.128.86.35
Nov 22 22:00:55 venus sshd\[15957\]: Failed password for invalid user gloom from 168.128.86.35 port 38470 ssh2
...
2019-11-23 06:18:09
178.128.158.113 attackspam
SSH bruteforce
2019-11-23 06:19:15
173.252.87.46 attackspam
Esta usando el facebook de una amiga para robar informacion.
2019-11-23 05:57:09
103.92.104.235 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/103.92.104.235/ 
 
 ID - 1H : (11)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : ID 
 NAME ASN : ASN136109 
 
 IP : 103.92.104.235 
 
 CIDR : 103.92.104.0/24 
 
 PREFIX COUNT : 1 
 
 UNIQUE IP COUNT : 256 
 
 
 ATTACKS DETECTED ASN136109 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-22 17:50:40 
 
 INFO : Port SSH 22 Scan Detected and Blocked by ADMIN  - data recovery
2019-11-23 05:58:39
189.83.255.68 attackbotsspam
Automatic report - Port Scan Attack
2019-11-23 06:01:49
81.22.45.25 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 77 - port: 3400 proto: TCP cat: Misc Attack
2019-11-23 05:47:09
139.217.98.39 attackspambots
Nov 22 21:58:51 w sshd[27159]: Invalid user xbian from 139.217.98.39
Nov 22 21:58:51 w sshd[27159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.217.98.39 
Nov 22 21:58:53 w sshd[27159]: Failed password for invalid user xbian from 139.217.98.39 port 58660 ssh2
Nov 22 21:58:54 w sshd[27159]: Received disconnect from 139.217.98.39: 11: Bye Bye [preauth]
Nov 22 22:20:39 w sshd[27372]: Invalid user sales from 139.217.98.39
Nov 22 22:20:39 w sshd[27372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.217.98.39 
Nov 22 22:20:42 w sshd[27372]: Failed password for invalid user sales from 139.217.98.39 port 33114 ssh2
Nov 22 22:20:42 w sshd[27372]: Received disconnect from 139.217.98.39: 11: Bye Bye [preauth]
Nov 22 22:25:58 w sshd[27392]: Invalid user chantry from 139.217.98.39
Nov 22 22:25:58 w sshd[27392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser........
-------------------------------
2019-11-23 06:03:43
168.194.160.14 attackbotsspam
Nov 22 20:43:29 sauna sshd[172947]: Failed password for root from 168.194.160.14 port 58097 ssh2
...
2019-11-23 05:45:20
220.76.107.50 attack
Nov 22 21:54:24 venus sshd\[15858\]: Invalid user va from 220.76.107.50 port 41948
Nov 22 21:54:24 venus sshd\[15858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.107.50
Nov 22 21:54:27 venus sshd\[15858\]: Failed password for invalid user va from 220.76.107.50 port 41948 ssh2
...
2019-11-23 05:58:05
219.153.31.186 attackbotsspam
Nov 22 18:23:10 ldap01vmsma01 sshd[21938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.153.31.186
Nov 22 18:23:12 ldap01vmsma01 sshd[21938]: Failed password for invalid user haugnes from 219.153.31.186 port 40559 ssh2
...
2019-11-23 05:51:29
91.134.141.89 attack
Nov 22 21:03:59 SilenceServices sshd[13920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.141.89
Nov 22 21:04:01 SilenceServices sshd[13920]: Failed password for invalid user abele from 91.134.141.89 port 54740 ssh2
Nov 22 21:07:00 SilenceServices sshd[17703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.141.89
2019-11-23 06:26:20
177.93.66.85 attack
Nov 22 15:26:54 pl2server sshd[12639]: reveeclipse mapping checking getaddrinfo for max-tdma-177-93-66-85.yune.com.br [177.93.66.85] failed - POSSIBLE BREAK-IN ATTEMPT!
Nov 22 15:26:54 pl2server sshd[12639]: Invalid user admin from 177.93.66.85
Nov 22 15:26:54 pl2server sshd[12639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.93.66.85
Nov 22 15:26:56 pl2server sshd[12639]: Failed password for invalid user admin from 177.93.66.85 port 49340 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=177.93.66.85
2019-11-23 06:07:58

最近上报的IP列表

7.29.13.192 231.175.253.251 67.149.84.239 52.72.46.76
239.222.19.50 150.197.74.144 7.254.209.20 139.191.104.84
153.183.198.69 195.211.183.238 13.228.95.126 154.135.197.250
67.37.156.26 215.16.157.82 100.82.254.20 129.1.45.151
41.68.61.214 48.35.148.71 108.87.83.117 84.242.97.131