必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Switzerland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.228.149.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49600
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.228.149.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 12:32:16 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 42.149.228.146.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.149.228.146.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.12.56.88 attack
Sep 20 22:20:02 MainVPS sshd[12832]: Invalid user admin from 106.12.56.88 port 36598
Sep 20 22:20:02 MainVPS sshd[12832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.56.88
Sep 20 22:20:02 MainVPS sshd[12832]: Invalid user admin from 106.12.56.88 port 36598
Sep 20 22:20:04 MainVPS sshd[12832]: Failed password for invalid user admin from 106.12.56.88 port 36598 ssh2
Sep 20 22:25:07 MainVPS sshd[13204]: Invalid user ranjeet from 106.12.56.88 port 48994
...
2019-09-21 06:28:58
95.123.194.76 attackspam
" "
2019-09-21 06:33:33
106.12.13.138 attack
Sep 20 12:09:56 hiderm sshd\[10899\]: Invalid user dnsadrc from 106.12.13.138
Sep 20 12:09:56 hiderm sshd\[10899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.13.138
Sep 20 12:09:58 hiderm sshd\[10899\]: Failed password for invalid user dnsadrc from 106.12.13.138 port 33062 ssh2
Sep 20 12:13:43 hiderm sshd\[11262\]: Invalid user oracle from 106.12.13.138
Sep 20 12:13:43 hiderm sshd\[11262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.13.138
2019-09-21 06:30:59
24.63.224.206 attack
Sep 21 01:15:52 hosting sshd[18686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-24-63-224-206.hsd1.ma.comcast.net  user=admin
Sep 21 01:15:54 hosting sshd[18686]: Failed password for admin from 24.63.224.206 port 41005 ssh2
...
2019-09-21 06:19:08
180.250.115.98 attackbots
Sep 20 18:34:49 TORMINT sshd\[22357\]: Invalid user tony from 180.250.115.98
Sep 20 18:34:49 TORMINT sshd\[22357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.115.98
Sep 20 18:34:51 TORMINT sshd\[22357\]: Failed password for invalid user tony from 180.250.115.98 port 55190 ssh2
...
2019-09-21 06:46:47
199.249.230.69 attackbots
xmlrpc attack
2019-09-21 06:40:53
209.17.96.178 attackbotsspam
port scan and connect, tcp 22 (ssh)
2019-09-21 06:37:21
177.53.9.41 attackspambots
proto=tcp  .  spt=51617  .  dpt=25  .     (listed on Blocklist de  Sep 20)     (1466)
2019-09-21 06:48:09
106.12.114.173 attack
Sep 20 18:09:40 ny01 sshd[13898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.114.173
Sep 20 18:09:42 ny01 sshd[13898]: Failed password for invalid user goran from 106.12.114.173 port 42056 ssh2
Sep 20 18:14:32 ny01 sshd[14804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.114.173
2019-09-21 06:26:07
165.22.103.58 attack
Sep 20 23:23:14 bouncer sshd\[23078\]: Invalid user nagios from 165.22.103.58 port 43262
Sep 20 23:23:14 bouncer sshd\[23078\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.103.58 
Sep 20 23:23:15 bouncer sshd\[23078\]: Failed password for invalid user nagios from 165.22.103.58 port 43262 ssh2
...
2019-09-21 06:21:28
210.21.226.2 attackbots
Sep 20 08:46:21 tdfoods sshd\[30663\]: Invalid user foster from 210.21.226.2
Sep 20 08:46:21 tdfoods sshd\[30663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.21.226.2
Sep 20 08:46:23 tdfoods sshd\[30663\]: Failed password for invalid user foster from 210.21.226.2 port 60767 ssh2
Sep 20 08:49:33 tdfoods sshd\[30954\]: Invalid user xuan from 210.21.226.2
Sep 20 08:49:33 tdfoods sshd\[30954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.21.226.2
2019-09-21 06:27:06
185.244.42.11 attackspam
" "
2019-09-21 06:12:29
201.238.239.151 attackbots
Sep 20 08:59:23 friendsofhawaii sshd\[28279\]: Invalid user tn from 201.238.239.151
Sep 20 08:59:23 friendsofhawaii sshd\[28279\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.238.239.151
Sep 20 08:59:24 friendsofhawaii sshd\[28279\]: Failed password for invalid user tn from 201.238.239.151 port 34773 ssh2
Sep 20 09:04:34 friendsofhawaii sshd\[28749\]: Invalid user centos from 201.238.239.151
Sep 20 09:04:34 friendsofhawaii sshd\[28749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.238.239.151
2019-09-21 06:48:42
154.72.199.38 attackbotsspam
proto=tcp  .  spt=46414  .  dpt=25  .     (listed on Blocklist de  Sep 20)     (1467)
2019-09-21 06:45:34
66.249.64.30 attackspam
Automatic report - Banned IP Access
2019-09-21 06:13:18

最近上报的IP列表

56.8.59.3 76.238.102.28 215.136.164.120 163.247.134.206
202.112.207.103 252.145.79.250 51.32.7.137 138.33.121.14
124.154.243.223 105.26.94.76 23.202.171.149 200.37.192.15
224.202.227.194 248.57.192.252 244.166.130.215 51.16.88.74
126.79.94.222 167.61.47.7 115.228.12.226 128.189.213.194