必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.30.105.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59384
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;148.30.105.196.			IN	A

;; AUTHORITY SECTION:
.			428	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019103101 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 01 01:37:05 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
Host 196.105.30.148.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 196.105.30.148.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.91.212.81 attackbots
03/05/2020-04:47:58.413097 51.91.212.81 Protocol: 6 ET SCAN Suspicious inbound to PostgreSQL port 5432
2020-03-05 18:23:38
192.241.221.241 attack
44818/tcp 9160/tcp 5672/tcp...
[2020-02-14/03-04]22pkt,17pt.(tcp),2pt.(udp)
2020-03-05 18:15:05
109.122.59.228 attackbotsspam
Honeypot attack, port: 445, PTR: 109.122.59.228.dynamic.uch.net.
2020-03-05 18:20:15
162.62.17.164 attackbotsspam
scan z
2020-03-05 18:03:51
192.241.181.33 attackspam
[portscan] tcp/143 [IMAP]
*(RWIN=65535)(03051213)
2020-03-05 18:18:27
110.252.211.240 attackbotsspam
Honeypot attack, port: 5555, PTR: PTR record not found
2020-03-05 18:23:58
185.173.35.5 attack
67/tcp 5916/tcp 20249/tcp...
[2020-01-04/03-03]51pkt,41pt.(tcp),4pt.(udp),1tp.(icmp)
2020-03-05 18:27:10
99.48.37.218 attack
Mar  5 05:47:46 debian-2gb-nbg1-2 kernel: \[5642838.167286\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=99.48.37.218 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=47 ID=6349 PROTO=TCP SPT=46593 DPT=4567 WINDOW=32817 RES=0x00 SYN URGP=0
2020-03-05 18:35:54
194.182.82.52 attackspam
Mar  5 00:16:36 tdfoods sshd\[14892\]: Invalid user grid from 194.182.82.52
Mar  5 00:16:36 tdfoods sshd\[14892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.182.82.52
Mar  5 00:16:38 tdfoods sshd\[14892\]: Failed password for invalid user grid from 194.182.82.52 port 52754 ssh2
Mar  5 00:25:17 tdfoods sshd\[15792\]: Invalid user test3 from 194.182.82.52
Mar  5 00:25:17 tdfoods sshd\[15792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.182.82.52
2020-03-05 18:35:21
157.245.109.223 attack
leo_www
2020-03-05 17:59:52
80.82.77.240 attackspam
03/05/2020-05:13:56.514787 80.82.77.240 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-05 18:20:49
71.6.146.185 attackspam
Scanning for open ports and vulnerable services: 389,1604,5432,6969,13579,20256
2020-03-05 18:27:56
208.100.26.241 attackspam
50090/tcp 50075/tcp 50070/tcp...
[2020-02-01/03-03]215pkt,36pt.(tcp)
2020-03-05 18:21:21
198.108.67.91 attack
03/05/2020-03:01:39.479026 198.108.67.91 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-05 18:31:13
171.242.122.46 attack
1583383705 - 03/05/2020 05:48:25 Host: 171.242.122.46/171.242.122.46 Port: 445 TCP Blocked
2020-03-05 17:57:38

最近上报的IP列表

105.116.127.193 117.213.162.227 130.134.184.216 82.59.157.90
195.8.61.18 214.13.122.89 253.107.197.245 114.84.157.114
123.192.226.19 136.179.12.114 103.44.235.10 145.186.218.244
154.142.80.37 254.5.116.188 245.236.73.46 180.248.101.21
43.181.17.241 46.244.143.41 138.103.144.219 229.87.63.163