必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 143.13.224.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55923
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;143.13.224.49.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 23:45:18 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 49.224.13.143.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.224.13.143.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.175.93.105 attack
Feb 18 06:02:40 debian-2gb-nbg1-2 kernel: \[4261376.500926\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.175.93.105 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=48627 PROTO=TCP SPT=40424 DPT=10202 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-18 13:04:10
81.22.45.106 attackspam
02/17/2020-20:00:28.393431 81.22.45.106 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 83
2020-02-18 09:54:53
72.43.141.7 attackbots
2019-12-24T22:43:59.589919suse-nuc sshd[12805]: Invalid user caponi from 72.43.141.7 port 24406
...
2020-02-18 09:54:20
194.150.68.145 attackspam
Feb 18 00:58:54 server sshd\[4722\]: Invalid user cyrus from 194.150.68.145
Feb 18 00:58:54 server sshd\[4722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.150.68.145 
Feb 18 00:58:55 server sshd\[4722\]: Failed password for invalid user cyrus from 194.150.68.145 port 54082 ssh2
Feb 18 01:08:51 server sshd\[6574\]: Invalid user theodora from 194.150.68.145
Feb 18 01:08:51 server sshd\[6574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.150.68.145 
...
2020-02-18 09:47:38
45.73.13.205 attack
port scan and connect, tcp 1433 (ms-sql-s)
2020-02-18 09:55:09
51.75.17.228 attackbots
Feb 17 19:04:53 firewall sshd[21730]: Invalid user liuhan from 51.75.17.228
Feb 17 19:04:55 firewall sshd[21730]: Failed password for invalid user liuhan from 51.75.17.228 port 32884 ssh2
Feb 17 19:08:50 firewall sshd[21854]: Invalid user sxh from 51.75.17.228
...
2020-02-18 09:51:09
103.89.91.177 attackbotsspam
Port probing on unauthorized port 3389
2020-02-18 09:57:05
114.67.74.139 attack
Feb 18 01:14:04 srv-ubuntu-dev3 sshd[89306]: Invalid user freund from 114.67.74.139
Feb 18 01:14:04 srv-ubuntu-dev3 sshd[89306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.74.139
Feb 18 01:14:04 srv-ubuntu-dev3 sshd[89306]: Invalid user freund from 114.67.74.139
Feb 18 01:14:07 srv-ubuntu-dev3 sshd[89306]: Failed password for invalid user freund from 114.67.74.139 port 40540 ssh2
Feb 18 01:17:39 srv-ubuntu-dev3 sshd[89608]: Invalid user ubuntu from 114.67.74.139
Feb 18 01:17:39 srv-ubuntu-dev3 sshd[89608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.74.139
Feb 18 01:17:39 srv-ubuntu-dev3 sshd[89608]: Invalid user ubuntu from 114.67.74.139
Feb 18 01:17:41 srv-ubuntu-dev3 sshd[89608]: Failed password for invalid user ubuntu from 114.67.74.139 port 39850 ssh2
Feb 18 01:21:36 srv-ubuntu-dev3 sshd[90059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rho
...
2020-02-18 09:43:39
71.90.35.79 attack
2019-09-12T10:31:27.395921suse-nuc sshd[23330]: error: maximum authentication attempts exceeded for root from 71.90.35.79 port 36402 ssh2 [preauth]
...
2020-02-18 10:01:50
72.204.226.123 attackspambots
2019-12-12T12:38:37.976374suse-nuc sshd[4121]: Invalid user pi from 72.204.226.123 port 58192
...
2020-02-18 09:55:55
49.145.198.248 spamproxy
i cant access facebook website
2020-02-18 11:50:46
113.252.19.216 attackspam
1581977322 - 02/17/2020 23:08:42 Host: 113.252.19.216/113.252.19.216 Port: 445 TCP Blocked
2020-02-18 10:01:18
71.46.255.70 attackspam
2020-01-13T18:27:25.568145suse-nuc sshd[26339]: Invalid user josh from 71.46.255.70 port 35084
...
2020-02-18 10:04:38
67.205.138.125 attack
2019-09-07T09:34:00.153395-07:00 suse-nuc sshd[25029]: Invalid user ed from 67.205.138.125 port 51348
...
2020-02-18 09:44:12
45.186.181.50 attack
Automatic report - Port Scan Attack
2020-02-18 10:11:42

最近上报的IP列表

14.79.41.178 125.17.27.62 250.43.246.47 107.111.180.149
180.160.154.166 197.139.181.29 25.128.187.148 165.162.121.190
182.225.223.226 185.237.119.155 37.11.226.249 61.200.47.91
247.131.21.153 144.227.16.126 161.37.185.81 234.214.115.40
205.227.151.5 137.182.230.4 5.5.122.202 216.55.200.8