必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 135.42.149.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23712
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;135.42.149.22.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030201 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 03 08:29:18 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
22.149.42.135.in-addr.arpa domain name pointer nothing.attdns.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
22.149.42.135.in-addr.arpa	name = nothing.attdns.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
59.144.48.34 attack
2020-08-04T06:51:01.813898ionos.janbro.de sshd[97953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.144.48.34  user=root
2020-08-04T06:51:04.131412ionos.janbro.de sshd[97953]: Failed password for root from 59.144.48.34 port 2088 ssh2
2020-08-04T06:54:03.298775ionos.janbro.de sshd[97973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.144.48.34  user=root
2020-08-04T06:54:05.668516ionos.janbro.de sshd[97973]: Failed password for root from 59.144.48.34 port 7646 ssh2
2020-08-04T06:57:10.319499ionos.janbro.de sshd[98000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.144.48.34  user=root
2020-08-04T06:57:12.631352ionos.janbro.de sshd[98000]: Failed password for root from 59.144.48.34 port 57489 ssh2
2020-08-04T07:00:16.653302ionos.janbro.de sshd[98025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.144.48.34  us
...
2020-08-04 16:41:28
212.64.27.53 attack
Aug  4 09:02:23 vpn01 sshd[14929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.27.53
Aug  4 09:02:26 vpn01 sshd[14929]: Failed password for invalid user P@$$vord753 from 212.64.27.53 port 55468 ssh2
...
2020-08-04 17:04:53
103.45.104.2 attackspam
Port Scan
...
2020-08-04 16:47:56
104.248.225.22 attackspam
104.248.225.22 - - \[04/Aug/2020:08:07:18 +0200\] "POST /wp-login.php HTTP/1.0" 200 4409 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
104.248.225.22 - - \[04/Aug/2020:08:07:22 +0200\] "POST /wp-login.php HTTP/1.0" 200 4241 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
104.248.225.22 - - \[04/Aug/2020:08:07:24 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-08-04 17:08:01
123.232.102.30 attackbotsspam
Aug  4 05:11:33 ns382633 sshd\[27128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.232.102.30  user=root
Aug  4 05:11:35 ns382633 sshd\[27128\]: Failed password for root from 123.232.102.30 port 49606 ssh2
Aug  4 05:44:08 ns382633 sshd\[568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.232.102.30  user=root
Aug  4 05:44:10 ns382633 sshd\[568\]: Failed password for root from 123.232.102.30 port 53616 ssh2
Aug  4 05:52:27 ns382633 sshd\[2138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.232.102.30  user=root
2020-08-04 16:49:45
218.92.0.148 attackspam
2020-08-04T09:05:00.637953shield sshd\[24004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.148  user=root
2020-08-04T09:05:02.237021shield sshd\[24004\]: Failed password for root from 218.92.0.148 port 39016 ssh2
2020-08-04T09:05:04.356829shield sshd\[24004\]: Failed password for root from 218.92.0.148 port 39016 ssh2
2020-08-04T09:05:07.710392shield sshd\[24004\]: Failed password for root from 218.92.0.148 port 39016 ssh2
2020-08-04T09:05:35.852197shield sshd\[24075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.148  user=root
2020-08-04 17:12:08
89.215.168.133 attack
Aug  3 23:52:27 mail sshd\[8477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.215.168.133  user=root
...
2020-08-04 16:49:16
218.92.0.198 attackbots
Aug  4 10:45:20 dcd-gentoo sshd[22008]: User root from 218.92.0.198 not allowed because none of user's groups are listed in AllowGroups
Aug  4 10:45:23 dcd-gentoo sshd[22008]: error: PAM: Authentication failure for illegal user root from 218.92.0.198
Aug  4 10:45:23 dcd-gentoo sshd[22008]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.198 port 13628 ssh2
...
2020-08-04 16:58:52
103.92.26.252 attackbotsspam
Failed password for root from 103.92.26.252 port 35138 ssh2
2020-08-04 17:13:53
61.155.110.210 attackbots
ssh brute force
2020-08-04 16:42:11
216.126.231.216 attackspambots
http://libirator.perfectsatisfactions.xyz/t?encv=2&v=bTFPOU52c0hoK2FYZUplN001RDZCTzRqTmJLb1ZwNUwvSHJxSVIwbGZzK1lESVIyVXZRbHZrbzJWWWMvNll3Qk15VkdERktPQkJLR2RPdWoxQ2lGeHhLU1poUzdGTlY5WWluOHIvVFJYZFM0ZGpwS1dCRHl5ZjZVTDB6RHpudlMxeFFaUGFKMk81dWNER1RrdVBEYm5wRGxLOUNyYzBpVGpXYWhUR3hjbGlseGdmaEtuWmJZZ1VSazFvcFV3MHBp
2020-08-04 17:15:21
123.21.93.87 attackspambots
Dovecot Invalid User Login Attempt.
2020-08-04 17:09:16
183.111.96.20 attack
Aug  4 10:39:40  sshd\[5491\]: User root from 183.111.96.20 not allowed because not listed in AllowUsersAug  4 10:39:42  sshd\[5491\]: Failed password for invalid user root from 183.111.96.20 port 45564 ssh2
...
2020-08-04 16:47:06
45.143.223.152 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-04 17:01:04
111.231.139.30 attackspambots
Aug  4 05:16:41 game-panel sshd[7944]: Failed password for root from 111.231.139.30 port 33537 ssh2
Aug  4 05:20:47 game-panel sshd[8072]: Failed password for root from 111.231.139.30 port 58043 ssh2
2020-08-04 16:44:30

最近上报的IP列表

215.188.78.185 241.199.120.117 12.246.39.108 173.207.33.109
43.20.105.165 129.135.236.104 139.205.177.89 48.143.135.167
120.250.126.248 44.28.248.219 36.254.49.102 253.195.94.73
74.181.225.165 243.178.255.50 47.195.193.25 65.62.250.65
108.129.145.63 39.41.121.142 182.227.95.159 202.134.103.147