必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Columbus

省份(region): Ohio

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.11.52.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36776
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;148.11.52.204.			IN	A

;; AUTHORITY SECTION:
.			372	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019123101 1800 900 604800 86400

;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 01 20:14:56 CST 2020
;; MSG SIZE  rcvd: 117
HOST信息:
Host 204.52.11.148.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 204.52.11.148.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
219.74.19.228 attackbotsspam
Netlink GPON Router Remote Command Execution Vulnerability
2020-07-07 07:32:20
200.77.177.128 attackspam
(smtpauth) Failed SMTP AUTH login from 200.77.177.128 (BR/Brazil/dynamic-200-77-177-128.v4.wnnet.com.br): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-07 01:30:49 plain authenticator failed for ([200.77.177.128]) [200.77.177.128]: 535 Incorrect authentication data (set_id=info)
2020-07-07 07:25:56
177.159.12.202 attack
Unauthorized connection attempt from IP address 177.159.12.202 on Port 445(SMB)
2020-07-07 07:41:42
54.39.133.91 attackspam
srv02 Mass scanning activity detected Target: 12329  ..
2020-07-07 07:39:34
180.164.22.252 attackbotsspam
Jul  6 23:27:59 piServer sshd[28953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.164.22.252 
Jul  6 23:28:01 piServer sshd[28953]: Failed password for invalid user admin from 180.164.22.252 port 44412 ssh2
Jul  6 23:30:59 piServer sshd[29263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.164.22.252 
...
2020-07-07 07:26:17
190.12.28.238 attackbotsspam
Unauthorized connection attempt from IP address 190.12.28.238 on Port 445(SMB)
2020-07-07 07:11:21
92.222.79.157 attackbots
Jul  6 22:31:52 localhost sshd[112950]: Invalid user zabbix from 92.222.79.157 port 57058
Jul  6 22:31:52 localhost sshd[112950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.ip-92-222-79.eu
Jul  6 22:31:52 localhost sshd[112950]: Invalid user zabbix from 92.222.79.157 port 57058
Jul  6 22:31:54 localhost sshd[112950]: Failed password for invalid user zabbix from 92.222.79.157 port 57058 ssh2
Jul  6 22:35:27 localhost sshd[113398]: Invalid user hwserver from 92.222.79.157 port 52080
...
2020-07-07 07:29:25
222.101.206.56 attack
2020-07-06T23:57:13.402137mail.standpoint.com.ua sshd[31664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.101.206.56
2020-07-06T23:57:13.399039mail.standpoint.com.ua sshd[31664]: Invalid user zk from 222.101.206.56 port 39744
2020-07-06T23:57:15.257782mail.standpoint.com.ua sshd[31664]: Failed password for invalid user zk from 222.101.206.56 port 39744 ssh2
2020-07-07T00:00:03.553040mail.standpoint.com.ua sshd[32010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.101.206.56  user=root
2020-07-07T00:00:05.745107mail.standpoint.com.ua sshd[32010]: Failed password for root from 222.101.206.56 port 54008 ssh2
...
2020-07-07 07:24:54
75.109.199.102 attackspambots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-07-06T20:55:04Z and 2020-07-06T21:01:08Z
2020-07-07 07:16:46
208.109.12.218 attackspam
[munged]::443 208.109.12.218 - - [06/Jul/2020:23:00:44 +0200] "POST /[munged]: HTTP/1.1" 200 9215 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 208.109.12.218 - - [06/Jul/2020:23:00:46 +0200] "POST /[munged]: HTTP/1.1" 200 9215 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 208.109.12.218 - - [06/Jul/2020:23:00:48 +0200] "POST /[munged]: HTTP/1.1" 200 9215 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 208.109.12.218 - - [06/Jul/2020:23:00:50 +0200] "POST /[munged]: HTTP/1.1" 200 9215 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 208.109.12.218 - - [06/Jul/2020:23:00:52 +0200] "POST /[munged]: HTTP/1.1" 200 7506 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 208.109.12.218 - - [06/Jul/2020:23:00:55 +0200] "POST /[munged]: HTTP/1.1" 200 7648 "-" "Mozilla/5.0 (X11
2020-07-07 07:18:22
87.251.74.18 attackspam
[portscan] Port scan
2020-07-07 07:34:55
223.247.140.89 attackbots
2020-07-06T21:02:34.078685ionos.janbro.de sshd[87972]: Invalid user dinghao from 223.247.140.89 port 36660
2020-07-06T21:02:35.810410ionos.janbro.de sshd[87972]: Failed password for invalid user dinghao from 223.247.140.89 port 36660 ssh2
2020-07-06T21:05:34.274996ionos.janbro.de sshd[87975]: Invalid user alba from 223.247.140.89 port 57538
2020-07-06T21:05:34.337154ionos.janbro.de sshd[87975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.140.89
2020-07-06T21:05:34.274996ionos.janbro.de sshd[87975]: Invalid user alba from 223.247.140.89 port 57538
2020-07-06T21:05:36.304562ionos.janbro.de sshd[87975]: Failed password for invalid user alba from 223.247.140.89 port 57538 ssh2
2020-07-06T21:08:32.327471ionos.janbro.de sshd[87990]: Invalid user ubuntu from 223.247.140.89 port 50188
2020-07-06T21:08:32.445416ionos.janbro.de sshd[87990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.140.89
20
...
2020-07-07 07:13:55
62.240.25.34 attackbots
62.240.25.34 - - [06/Jul/2020:22:38:41 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
62.240.25.34 - - [06/Jul/2020:22:38:42 +0100] "POST /wp-login.php HTTP/1.1" 200 5808 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
62.240.25.34 - - [06/Jul/2020:22:43:01 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
...
2020-07-07 07:33:37
46.38.148.6 attack
2020-07-06 22:55:06 auth_plain authenticator failed for (User) [46.38.148.6]: 535 Incorrect authentication data (set_id=mysites@csmailer.org)
2020-07-06 22:55:36 auth_plain authenticator failed for (User) [46.38.148.6]: 535 Incorrect authentication data (set_id=cdr@csmailer.org)
2020-07-06 22:56:05 auth_plain authenticator failed for (User) [46.38.148.6]: 535 Incorrect authentication data (set_id=dc2@csmailer.org)
2020-07-06 22:56:34 auth_plain authenticator failed for (User) [46.38.148.6]: 535 Incorrect authentication data (set_id=race@csmailer.org)
2020-07-06 22:57:03 auth_plain authenticator failed for (User) [46.38.148.6]: 535 Incorrect authentication data (set_id=digilib@csmailer.org)
...
2020-07-07 07:35:45
110.49.40.3 attackspam
Unauthorized connection attempt from IP address 110.49.40.3 on Port 445(SMB)
2020-07-07 07:10:21

最近上报的IP列表

171.113.169.149 183.51.193.32 40.167.182.42 182.138.163.139
50.179.89.149 186.99.155.6 124.242.68.89 182.105.101.242
57.215.34.24 147.35.50.20 101.242.230.118 140.33.137.226
175.195.207.100 98.99.59.35 166.217.8.209 61.241.102.105
128.53.190.188 43.206.76.35 120.176.250.25 150.180.34.69