必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.149.194.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63161
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.149.194.51.			IN	A

;; AUTHORITY SECTION:
.			595	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022400 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 24 15:49:53 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 51.194.149.148.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 51.194.149.148.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
118.238.4.201 attackbotsspam
Automatic report - Banned IP Access
2019-09-25 18:05:12
139.59.41.154 attackspam
Sep 25 09:33:57 localhost sshd\[30615\]: Invalid user steam from 139.59.41.154 port 39482
Sep 25 09:33:57 localhost sshd\[30615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.41.154
Sep 25 09:33:59 localhost sshd\[30615\]: Failed password for invalid user steam from 139.59.41.154 port 39482 ssh2
2019-09-25 18:30:24
144.76.71.176 attackspambots
20 attempts against mh-misbehave-ban on creek.magehost.pro
2019-09-25 18:14:18
139.59.77.237 attack
$f2bV_matches
2019-09-25 18:36:30
180.163.236.10 attackspambots
www.lust-auf-land.com 180.163.236.10 \[25/Sep/2019:06:04:27 +0200\] "POST /wp-login.php HTTP/1.1" 200 5531 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
www.lust-auf-land.com 180.163.236.10 \[25/Sep/2019:06:04:30 +0200\] "POST /wp-login.php HTTP/1.1" 200 5787 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-09-25 18:34:29
180.127.77.94 attackbots
Sep 25 05:48:15 server postfix/smtpd[32696]: NOQUEUE: reject: RCPT from unknown[180.127.77.94]: 554 5.7.1 Service unavailable; Client host [180.127.77.94] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/180.127.77.94 / https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=
2019-09-25 18:18:46
80.211.82.228 attackspambots
Invalid user alex from 80.211.82.228 port 56694
2019-09-25 18:22:55
112.85.42.185 attack
Multiple scans on port 22 from this IP: 112.85.42.185
2019-09-25 18:43:26
27.13.7.34 attackspam
Unauthorised access (Sep 25) SRC=27.13.7.34 LEN=40 TTL=48 ID=44098 TCP DPT=8080 WINDOW=37503 SYN 
Unauthorised access (Sep 24) SRC=27.13.7.34 LEN=40 TTL=47 ID=61509 TCP DPT=8080 WINDOW=37503 SYN 
Unauthorised access (Sep 24) SRC=27.13.7.34 LEN=40 TTL=47 ID=55804 TCP DPT=8080 WINDOW=37503 SYN 
Unauthorised access (Sep 22) SRC=27.13.7.34 LEN=40 TTL=48 ID=51634 TCP DPT=8080 WINDOW=37503 SYN
2019-09-25 18:35:58
51.77.140.111 attackspam
2019-09-25T05:50:49.161196abusebot-7.cloudsearch.cf sshd\[9331\]: Invalid user ubuntu from 51.77.140.111 port 46126
2019-09-25 18:44:11
94.191.50.114 attackbotsspam
ssh brute force
2019-09-25 18:38:14
197.85.191.178 attackbotsspam
Sep 24 22:28:17 auw2 sshd\[28221\]: Invalid user test from 197.85.191.178
Sep 24 22:28:17 auw2 sshd\[28221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.85.191.178
Sep 24 22:28:19 auw2 sshd\[28221\]: Failed password for invalid user test from 197.85.191.178 port 42080 ssh2
Sep 24 22:33:21 auw2 sshd\[28720\]: Invalid user kampu from 197.85.191.178
Sep 24 22:33:21 auw2 sshd\[28720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.85.191.178
2019-09-25 18:28:37
89.248.162.168 attack
09/25/2019-12:17:37.747101 89.248.162.168 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 98
2019-09-25 18:20:03
49.88.112.55 attack
Sep 25 11:52:21 ArkNodeAT sshd\[21748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.55  user=root
Sep 25 11:52:23 ArkNodeAT sshd\[21748\]: Failed password for root from 49.88.112.55 port 33698 ssh2
Sep 25 11:52:39 ArkNodeAT sshd\[21756\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.55  user=root
2019-09-25 18:07:27
179.188.38.23 attackbots
Scanning and Vuln Attempts
2019-09-25 18:40:24

最近上报的IP列表

1.193.244.178 1.193.244.185 1.193.244.186 1.193.244.188
1.193.244.192 1.193.244.194 1.193.244.196 1.193.244.204
1.193.244.208 1.193.244.214 1.193.244.217 1.193.244.220
146.222.140.172 1.193.244.222 1.193.244.224 1.193.244.230
1.193.244.235 1.193.244.238 1.193.244.24 1.193.244.246