必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.190.109.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14974
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.190.109.215.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121700 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 17 16:22:18 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 215.109.190.148.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 215.109.190.148.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.38.42.39 attack
xmlrpc attack
2019-09-25 05:40:46
159.203.182.127 attack
Invalid user gituser from 159.203.182.127 port 54169
2019-09-25 05:05:17
58.213.198.77 attackspambots
Sep 24 14:31:40 MainVPS sshd[27379]: Invalid user vonzant from 58.213.198.77 port 41328
Sep 24 14:31:40 MainVPS sshd[27379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.198.77
Sep 24 14:31:40 MainVPS sshd[27379]: Invalid user vonzant from 58.213.198.77 port 41328
Sep 24 14:31:42 MainVPS sshd[27379]: Failed password for invalid user vonzant from 58.213.198.77 port 41328 ssh2
Sep 24 14:34:46 MainVPS sshd[27577]: Invalid user rootme from 58.213.198.77 port 39400
...
2019-09-25 05:15:20
49.88.112.80 attack
Sep 25 03:04:53 areeb-Workstation sshd[31516]: Failed password for root from 49.88.112.80 port 56667 ssh2
...
2019-09-25 05:44:22
94.177.163.133 attack
Sep 24 23:14:08 cp sshd[12742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.163.133
Sep 24 23:14:11 cp sshd[12742]: Failed password for invalid user j0k3r from 94.177.163.133 port 56248 ssh2
Sep 24 23:17:48 cp sshd[14605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.163.133
2019-09-25 05:33:36
190.131.225.195 attack
Sep 24 17:12:35 ny01 sshd[2413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.131.225.195
Sep 24 17:12:37 ny01 sshd[2413]: Failed password for invalid user 123456 from 190.131.225.195 port 58770 ssh2
Sep 24 17:17:52 ny01 sshd[3254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.131.225.195
2019-09-25 05:31:47
211.24.103.163 attack
Sep 24 11:13:24 tdfoods sshd\[20834\]: Invalid user webmail from 211.24.103.163
Sep 24 11:13:24 tdfoods sshd\[20834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.24.103.163
Sep 24 11:13:26 tdfoods sshd\[20834\]: Failed password for invalid user webmail from 211.24.103.163 port 60954 ssh2
Sep 24 11:17:58 tdfoods sshd\[21242\]: Invalid user akhilesh from 211.24.103.163
Sep 24 11:17:58 tdfoods sshd\[21242\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.24.103.163
2019-09-25 05:26:25
111.231.89.162 attackspambots
Sep 25 00:10:04 pkdns2 sshd\[4392\]: Invalid user bi from 111.231.89.162Sep 25 00:10:06 pkdns2 sshd\[4392\]: Failed password for invalid user bi from 111.231.89.162 port 49390 ssh2Sep 25 00:14:04 pkdns2 sshd\[4599\]: Invalid user pvm from 111.231.89.162Sep 25 00:14:06 pkdns2 sshd\[4599\]: Failed password for invalid user pvm from 111.231.89.162 port 54756 ssh2Sep 25 00:18:01 pkdns2 sshd\[4757\]: Invalid user hcchang from 111.231.89.162Sep 25 00:18:04 pkdns2 sshd\[4757\]: Failed password for invalid user hcchang from 111.231.89.162 port 60124 ssh2
...
2019-09-25 05:21:43
125.123.153.2 attackspambots
22/tcp 22/tcp 22/tcp
[2019-09-22/23]3pkt
2019-09-25 05:32:18
222.186.42.15 attackbots
Sep 24 23:31:35 lnxded63 sshd[24318]: Failed password for root from 222.186.42.15 port 29584 ssh2
Sep 24 23:31:35 lnxded63 sshd[24318]: Failed password for root from 222.186.42.15 port 29584 ssh2
2019-09-25 05:39:36
51.38.129.120 attackbotsspam
Sep 24 23:17:45 MK-Soft-VM5 sshd[29360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.129.120 
Sep 24 23:17:47 MK-Soft-VM5 sshd[29360]: Failed password for invalid user mailtest from 51.38.129.120 port 40502 ssh2
...
2019-09-25 05:34:29
222.186.52.124 attackspambots
2019-09-22 07:07:18 -> 2019-09-24 13:55:53 : 140 login attempts (222.186.52.124)
2019-09-25 05:22:35
164.39.7.99 attackspambots
xmlrpc attack
2019-09-25 05:26:37
114.40.109.136 attackbotsspam
23/tcp 23/tcp 23/tcp...
[2019-09-22/24]4pkt,1pt.(tcp)
2019-09-25 05:35:20
62.193.6.15 attackbots
*Port Scan* detected from 62.193.6.15 (IR/Iran/62.193.6.15.dpi.ir). 4 hits in the last 50 seconds
2019-09-25 05:34:04

最近上报的IP列表

168.129.105.124 26.197.71.240 68.94.159.44 146.40.243.125
150.78.69.11 134.181.62.6 130.133.140.101 157.133.83.40
85.250.40.206 65.10.108.104 35.237.95.237 64.233.176.59
10.235.218.194 4.128.19.200 111.37.56.52 187.224.91.233
99.191.170.218 135.63.54.45 85.98.99.22 44.138.106.152