必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.197.164.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59819
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.197.164.149.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021000 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 14:42:37 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 149.164.197.141.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 149.164.197.141.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
217.93.11.92 attackbotsspam
Jul 19 05:57:40 debian-2gb-nbg1-2 kernel: \[17389606.582391\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=217.93.11.92 DST=195.201.40.59 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=41435 DF PROTO=TCP SPT=54514 DPT=22 WINDOW=64240 RES=0x00 SYN URGP=0
2020-07-19 13:33:44
64.227.105.226 attackbotsspam
Jul 19 07:45:16 meumeu sshd[1004895]: Invalid user pc from 64.227.105.226 port 55851
Jul 19 07:45:16 meumeu sshd[1004895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.105.226 
Jul 19 07:45:16 meumeu sshd[1004895]: Invalid user pc from 64.227.105.226 port 55851
Jul 19 07:45:18 meumeu sshd[1004895]: Failed password for invalid user pc from 64.227.105.226 port 55851 ssh2
Jul 19 07:47:53 meumeu sshd[1004988]: Invalid user odoo8 from 64.227.105.226 port 32304
Jul 19 07:47:53 meumeu sshd[1004988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.105.226 
Jul 19 07:47:53 meumeu sshd[1004988]: Invalid user odoo8 from 64.227.105.226 port 32304
Jul 19 07:47:55 meumeu sshd[1004988]: Failed password for invalid user odoo8 from 64.227.105.226 port 32304 ssh2
Jul 19 07:50:34 meumeu sshd[1005081]: Invalid user fj from 64.227.105.226 port 8753
...
2020-07-19 13:52:35
185.85.238.244 attackbots
CMS (WordPress or Joomla) login attempt.
2020-07-19 13:32:52
61.177.172.168 attackspam
Jul 19 08:10:33 vps sshd[426483]: Failed password for root from 61.177.172.168 port 60075 ssh2
Jul 19 08:10:35 vps sshd[426483]: Failed password for root from 61.177.172.168 port 60075 ssh2
Jul 19 08:10:39 vps sshd[426483]: Failed password for root from 61.177.172.168 port 60075 ssh2
Jul 19 08:10:41 vps sshd[426483]: Failed password for root from 61.177.172.168 port 60075 ssh2
Jul 19 08:10:45 vps sshd[426483]: Failed password for root from 61.177.172.168 port 60075 ssh2
...
2020-07-19 14:12:42
46.101.120.8 attack
xmlrpc attack
2020-07-19 13:44:37
52.229.56.138 attackbotsspam
Jul 19 05:57:15 webctf sshd[20297]: error: maximum authentication attempts exceeded for invalid user root from 52.229.56.138 port 42982 ssh2 [preauth]
Jul 19 05:57:16 webctf sshd[20300]: User root from 52.229.56.138 not allowed because not listed in AllowUsers
Jul 19 05:57:16 webctf sshd[20300]: User root from 52.229.56.138 not allowed because not listed in AllowUsers
Jul 19 05:57:16 webctf sshd[20300]: error: maximum authentication attempts exceeded for invalid user root from 52.229.56.138 port 43052 ssh2 [preauth]
Jul 19 05:57:17 webctf sshd[20302]: User root from 52.229.56.138 not allowed because not listed in AllowUsers
Jul 19 05:57:17 webctf sshd[20302]: User root from 52.229.56.138 not allowed because not listed in AllowUsers
Jul 19 05:57:18 webctf sshd[20302]: error: maximum authentication attempts exceeded for invalid user root from 52.229.56.138 port 43146 ssh2 [preauth]
Jul 19 05:57:19 webctf sshd[20328]: User root from 52.229.56.138 not allowed because not listed in AllowUse
...
2020-07-19 13:50:14
14.192.238.106 attackbotsspam
SSH brute force attempt
2020-07-19 13:54:30
194.4.58.105 attack
Jul 19 00:58:49 NPSTNNYC01T sshd[23576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.4.58.105
Jul 19 00:58:51 NPSTNNYC01T sshd[23576]: Failed password for invalid user test03 from 194.4.58.105 port 42788 ssh2
Jul 19 01:03:02 NPSTNNYC01T sshd[23953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.4.58.105
...
2020-07-19 13:58:44
75.141.199.233 attackbots
Jul 19 06:57:20 server2 sshd\[28161\]: Invalid user admin from 75.141.199.233
Jul 19 06:57:21 server2 sshd\[28163\]: User root from 075-141-199-233.res.spectrum.com not allowed because not listed in AllowUsers
Jul 19 06:57:23 server2 sshd\[28165\]: Invalid user admin from 75.141.199.233
Jul 19 06:57:25 server2 sshd\[28167\]: Invalid user admin from 75.141.199.233
Jul 19 06:57:26 server2 sshd\[28169\]: Invalid user admin from 75.141.199.233
Jul 19 06:57:28 server2 sshd\[28171\]: User apache from 075-141-199-233.res.spectrum.com not allowed because not listed in AllowUsers
2020-07-19 13:43:22
120.70.98.195 attackspambots
2020-07-19T04:32:09.499356abusebot-6.cloudsearch.cf sshd[1100]: Invalid user qi from 120.70.98.195 port 54281
2020-07-19T04:32:09.503575abusebot-6.cloudsearch.cf sshd[1100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.98.195
2020-07-19T04:32:09.499356abusebot-6.cloudsearch.cf sshd[1100]: Invalid user qi from 120.70.98.195 port 54281
2020-07-19T04:32:11.539835abusebot-6.cloudsearch.cf sshd[1100]: Failed password for invalid user qi from 120.70.98.195 port 54281 ssh2
2020-07-19T04:36:16.237020abusebot-6.cloudsearch.cf sshd[1107]: Invalid user lab from 120.70.98.195 port 46696
2020-07-19T04:36:16.241477abusebot-6.cloudsearch.cf sshd[1107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.98.195
2020-07-19T04:36:16.237020abusebot-6.cloudsearch.cf sshd[1107]: Invalid user lab from 120.70.98.195 port 46696
2020-07-19T04:36:18.187234abusebot-6.cloudsearch.cf sshd[1107]: Failed password for invalid
...
2020-07-19 14:16:59
210.57.208.9 attack
210.57.208.9 - - [19/Jul/2020:05:48:13 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
210.57.208.9 - - [19/Jul/2020:05:57:14 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-19 13:57:29
178.32.219.66 attackspambots
Jul 19 07:34:59 mout sshd[11045]: Invalid user ela from 178.32.219.66 port 35252
2020-07-19 14:14:30
111.231.231.22 attackspambots
Jul 19 07:10:53 meumeu sshd[999529]: Invalid user student from 111.231.231.22 port 50300
Jul 19 07:10:53 meumeu sshd[999529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.231.22 
Jul 19 07:10:53 meumeu sshd[999529]: Invalid user student from 111.231.231.22 port 50300
Jul 19 07:10:55 meumeu sshd[999529]: Failed password for invalid user student from 111.231.231.22 port 50300 ssh2
Jul 19 07:14:29 meumeu sshd[999677]: Invalid user vnc from 111.231.231.22 port 60440
Jul 19 07:14:29 meumeu sshd[999677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.231.22 
Jul 19 07:14:29 meumeu sshd[999677]: Invalid user vnc from 111.231.231.22 port 60440
Jul 19 07:14:31 meumeu sshd[999677]: Failed password for invalid user vnc from 111.231.231.22 port 60440 ssh2
Jul 19 07:18:10 meumeu sshd[999778]: Invalid user ihor from 111.231.231.22 port 42352
...
2020-07-19 13:38:51
181.48.18.130 attackspam
Jul 19 00:50:42 NPSTNNYC01T sshd[22681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.18.130
Jul 19 00:50:44 NPSTNNYC01T sshd[22681]: Failed password for invalid user mapr from 181.48.18.130 port 56614 ssh2
Jul 19 00:55:41 NPSTNNYC01T sshd[23208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.18.130
...
2020-07-19 14:10:41
175.24.36.114 attackspam
Invalid user hjb from 175.24.36.114 port 40266
2020-07-19 14:16:16

最近上报的IP列表

163.129.212.224 234.45.212.185 132.101.237.45 100.68.248.153
76.50.175.160 212.193.14.139 94.97.185.104 64.254.139.11
209.10.27.147 126.129.13.46 131.87.65.196 143.147.222.151
66.136.194.49 27.47.85.69 151.186.117.214 41.62.204.22
195.223.44.61 217.227.30.7 3.207.218.243 150.44.196.171