必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.20.20.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54208
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.20.20.9.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 00:42:26 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 9.20.20.148.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 9.20.20.148.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
181.143.72.66 attackspam
Oct 24 06:57:28 icinga sshd[13774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.143.72.66
Oct 24 06:57:31 icinga sshd[13774]: Failed password for invalid user nginx from 181.143.72.66 port 10619 ssh2
...
2019-10-24 13:29:33
202.59.89.106 attack
1433/tcp 1433/tcp
[2019-10-19/24]2pkt
2019-10-24 14:03:26
51.75.22.154 attackbots
Oct 24 07:38:47 SilenceServices sshd[19145]: Failed password for root from 51.75.22.154 port 50256 ssh2
Oct 24 07:42:50 SilenceServices sshd[20292]: Failed password for root from 51.75.22.154 port 32830 ssh2
2019-10-24 13:53:36
119.28.222.88 attack
Oct 24 05:11:07 venus sshd\[17136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.222.88  user=root
Oct 24 05:11:09 venus sshd\[17136\]: Failed password for root from 119.28.222.88 port 35756 ssh2
Oct 24 05:15:46 venus sshd\[17195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.222.88  user=root
...
2019-10-24 13:25:53
197.0.202.199 attack
DATE:2019-10-24 05:54:03, IP:197.0.202.199, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2019-10-24 13:43:54
62.210.149.30 attackbots
\[2019-10-24 01:38:07\] SECURITY\[2046\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-24T01:38:07.108-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01115183806824",SessionID="0x7f6130804e48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.149.30/57381",ACLName="no_extension_match"
\[2019-10-24 01:47:42\] SECURITY\[2046\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-24T01:47:42.778-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0015183806824",SessionID="0x7f6130804e48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.149.30/60656",ACLName="no_extension_match"
\[2019-10-24 01:47:54\] SECURITY\[2046\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-24T01:47:54.117-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="915183806824",SessionID="0x7f613013d028",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.149.30/58343",ACLName="no_extension
2019-10-24 13:53:04
104.236.214.8 attack
3x Failed Password
2019-10-24 14:03:01
117.50.38.202 attackbotsspam
Oct 23 19:04:47 auw2 sshd\[7094\]: Invalid user qwerty123 from 117.50.38.202
Oct 23 19:04:47 auw2 sshd\[7094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.38.202
Oct 23 19:04:48 auw2 sshd\[7094\]: Failed password for invalid user qwerty123 from 117.50.38.202 port 58804 ssh2
Oct 23 19:10:41 auw2 sshd\[7740\]: Invalid user Passw0rd from 117.50.38.202
Oct 23 19:10:41 auw2 sshd\[7740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.38.202
2019-10-24 13:20:05
112.29.140.222 attackspam
Hack attempt
2019-10-24 13:28:10
106.13.135.156 attackbots
Oct 24 07:13:22 www sshd\[40659\]: Invalid user user from 106.13.135.156
Oct 24 07:13:22 www sshd\[40659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.135.156
Oct 24 07:13:24 www sshd\[40659\]: Failed password for invalid user user from 106.13.135.156 port 34994 ssh2
...
2019-10-24 13:45:12
182.253.222.199 attack
Oct 24 05:49:35 giegler sshd[20960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.222.199  user=root
Oct 24 05:49:37 giegler sshd[20960]: Failed password for root from 182.253.222.199 port 59216 ssh2
Oct 24 05:53:47 giegler sshd[21010]: Invalid user kaushik from 182.253.222.199 port 47136
Oct 24 05:53:47 giegler sshd[21010]: Invalid user kaushik from 182.253.222.199 port 47136
2019-10-24 13:58:14
50.62.177.206 attack
Automatic report - XMLRPC Attack
2019-10-24 13:59:14
222.160.65.50 attack
1433/tcp 1433/tcp
[2019-10-22/23]2pkt
2019-10-24 14:02:40
45.227.253.139 attackspam
Oct 24 07:22:02 relay postfix/smtpd\[14967\]: warning: unknown\[45.227.253.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 24 07:22:03 relay postfix/smtpd\[16995\]: warning: unknown\[45.227.253.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 24 07:22:22 relay postfix/smtpd\[18772\]: warning: unknown\[45.227.253.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 24 07:23:31 relay postfix/smtpd\[7431\]: warning: unknown\[45.227.253.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 24 07:23:38 relay postfix/smtpd\[18772\]: warning: unknown\[45.227.253.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-10-24 13:26:14
125.71.216.44 attack
1433/tcp 1433/tcp 1433/tcp
[2019-10-20/24]3pkt
2019-10-24 13:52:21

最近上报的IP列表

51.56.82.154 43.222.82.137 78.140.73.90 144.146.152.181
222.228.14.8 59.131.51.168 78.209.182.244 189.36.107.187
239.15.47.131 72.103.250.80 25.144.46.250 64.33.2.111
143.108.73.63 108.66.201.207 235.49.112.130 248.70.83.185
7.178.40.221 33.86.54.41 226.23.155.77 42.180.172.217