必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.175.21.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1227
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.175.21.1.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 05:46:59 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 1.21.175.148.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 148.175.21.1.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
177.8.255.105 attackspam
Tried sshing with brute force.
2019-10-19 16:27:01
218.234.206.107 attack
Oct 19 07:04:14 www sshd\[27032\]: Invalid user wildfly from 218.234.206.107Oct 19 07:04:16 www sshd\[27032\]: Failed password for invalid user wildfly from 218.234.206.107 port 40612 ssh2Oct 19 07:08:39 www sshd\[27189\]: Failed password for root from 218.234.206.107 port 51184 ssh2
...
2019-10-19 16:21:30
89.252.167.70 attackbotsspam
" "
2019-10-19 16:19:10
182.18.4.84 attackbotsspam
10/19/2019-05:51:37.031308 182.18.4.84 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-10-19 16:14:13
218.2.234.6 attackspam
Oct 19 06:22:20 server sshd\[7700\]: Invalid user codwawserver from 218.2.234.6
Oct 19 06:22:20 server sshd\[7700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.2.234.6 
Oct 19 06:22:23 server sshd\[7700\]: Failed password for invalid user codwawserver from 218.2.234.6 port 43073 ssh2
Oct 19 06:52:17 server sshd\[15915\]: Invalid user trendimsa1.0 from 218.2.234.6
Oct 19 06:52:17 server sshd\[15915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.2.234.6 
...
2019-10-19 15:51:53
159.89.160.91 attackspambots
Oct 19 05:47:33 apollo sshd\[7060\]: Failed password for root from 159.89.160.91 port 39804 ssh2Oct 19 05:52:07 apollo sshd\[7062\]: Invalid user demo from 159.89.160.91Oct 19 05:52:09 apollo sshd\[7062\]: Failed password for invalid user demo from 159.89.160.91 port 55106 ssh2
...
2019-10-19 15:56:35
178.62.237.38 attackspam
2019-10-19T07:21:56.846421abusebot.cloudsearch.cf sshd\[4888\]: Invalid user ajeya from 178.62.237.38 port 54428
2019-10-19 15:49:14
52.137.63.154 attackbotsspam
2019-10-19T03:52:06.559521abusebot-3.cloudsearch.cf sshd\[11577\]: Invalid user qq48900851 from 52.137.63.154 port 36282
2019-10-19 15:59:13
185.153.197.116 attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-10-19 16:02:07
220.129.147.159 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/220.129.147.159/ 
 
 TW - 1H : (134)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 220.129.147.159 
 
 CIDR : 220.129.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 ATTACKS DETECTED ASN3462 :  
  1H - 4 
  3H - 12 
  6H - 24 
 12H - 50 
 24H - 124 
 
 DateTime : 2019-10-19 05:51:48 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-19 16:04:11
167.99.194.54 attackspambots
Oct 19 05:39:50 herz-der-gamer sshd[7151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.194.54  user=root
Oct 19 05:39:51 herz-der-gamer sshd[7151]: Failed password for root from 167.99.194.54 port 48102 ssh2
Oct 19 05:51:38 herz-der-gamer sshd[7260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.194.54  user=root
Oct 19 05:51:40 herz-der-gamer sshd[7260]: Failed password for root from 167.99.194.54 port 47010 ssh2
...
2019-10-19 16:10:07
80.88.88.181 attackspambots
Oct 19 07:23:44 legacy sshd[31967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.88.88.181
Oct 19 07:23:45 legacy sshd[31967]: Failed password for invalid user icecast from 80.88.88.181 port 33974 ssh2
Oct 19 07:27:46 legacy sshd[32080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.88.88.181
...
2019-10-19 15:48:07
54.39.75.1 attack
Oct 19 09:59:35 vps647732 sshd[10804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.75.1
Oct 19 09:59:37 vps647732 sshd[10804]: Failed password for invalid user robot from 54.39.75.1 port 52202 ssh2
...
2019-10-19 16:00:20
83.48.29.116 attackbots
Invalid user odroid from 83.48.29.116 port 11891
2019-10-19 16:20:40
106.13.128.71 attack
2019-10-19T09:07:14.186563  sshd[1904]: Invalid user admin2 from 106.13.128.71 port 59626
2019-10-19T09:07:14.201890  sshd[1904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.128.71
2019-10-19T09:07:14.186563  sshd[1904]: Invalid user admin2 from 106.13.128.71 port 59626
2019-10-19T09:07:16.022245  sshd[1904]: Failed password for invalid user admin2 from 106.13.128.71 port 59626 ssh2
2019-10-19T09:12:26.293297  sshd[1936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.128.71  user=root
2019-10-19T09:12:28.610707  sshd[1936]: Failed password for root from 106.13.128.71 port 40830 ssh2
...
2019-10-19 16:24:27

最近上报的IP列表

217.211.197.157 99.245.82.186 21.176.24.179 73.98.6.185
121.188.51.138 226.182.138.195 225.214.157.99 211.165.213.156
96.24.40.12 224.11.170.24 7.168.215.239 125.43.127.108
144.168.187.80 117.201.115.163 17.202.132.142 240.240.206.148
150.222.86.153 87.223.60.76 122.35.239.182 28.16.119.103