必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.10.47.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34210
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.10.47.221.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 13:54:37 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 221.47.10.149.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 221.47.10.149.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.254.23.81 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 09:03:59,232 INFO [shellcode_manager] (222.254.23.81) no match, writing hexdump (cd0cdbdd75edde73f2ee56e5381e48ce :2207385) - MS17010 (EternalBlue)
2019-07-04 20:04:09
36.152.17.36 attackspambots
Jul  4 12:53:40 bouncer sshd\[7740\]: Invalid user comptable from 36.152.17.36 port 35413
Jul  4 12:53:40 bouncer sshd\[7740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.152.17.36 
Jul  4 12:53:42 bouncer sshd\[7740\]: Failed password for invalid user comptable from 36.152.17.36 port 35413 ssh2
...
2019-07-04 19:19:22
157.230.40.177 attack
Failed password for invalid user openbravo from 157.230.40.177 port 60588 ssh2
Invalid user ftpuser from 157.230.40.177 port 57770
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.40.177
Failed password for invalid user ftpuser from 157.230.40.177 port 57770 ssh2
Invalid user michielan from 157.230.40.177 port 54950
2019-07-04 19:54:47
65.132.59.34 attack
Scanning unused Default website or suspicious access to valid sites from IP marked as abusive
2019-07-04 19:26:48
51.255.28.62 attack
51.255.28.62 - - [04/Jul/2019:02:08:44 -0400] "GET /?page=products&action=../../../../../../../../../etc/passwd%00&manufacturerID=127&productID=9050Z-TSS&linkID=8215&duplicate=0 HTTP/1.1" 200 17258 "https://californiafaucetsupply.com/?page=products&action=../../../../../../../../../etc/passwd%00&manufacturerID=127&productID=9050Z-TSS&linkID=8215&duplicate=0" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0"
...
2019-07-04 19:24:14
153.35.54.150 attack
22/tcp
[2019-07-04]1pkt
2019-07-04 19:33:06
34.80.248.171 attackbotsspam
Jul  4 13:07:45 rpi sshd[10823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.80.248.171 
Jul  4 13:07:47 rpi sshd[10823]: Failed password for invalid user halflife from 34.80.248.171 port 55772 ssh2
2019-07-04 19:13:08
213.230.114.145 attackbotsspam
2019-07-04 05:53:42 H=(145.64.uzpak.uz) [213.230.114.145]:25482 I=[10.100.18.23]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=213.230.114.145)
2019-07-04 05:53:42 unexpected disconnection while reading SMTP command from (145.64.uzpak.uz) [213.230.114.145]:25482 I=[10.100.18.23]:25 (error: Connection reset by peer)
2019-07-04 07:45:57 H=(145.64.uzpak.uz) [213.230.114.145]:52974 I=[10.100.18.23]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=213.230.114.145)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=213.230.114.145
2019-07-04 19:50:45
46.3.96.66 attack
Multiport scan : 14 ports scanned 8121 8122 8124 8125 8126 8129 8130 8131 8132 8137 8138 8352 8354 8355
2019-07-04 20:03:35
94.34.40.83 attack
Jul  4 07:46:35 smtp sshd[27847]: Invalid user admin from 94.34.40.83
Jul  4 07:46:37 smtp sshd[27847]: Failed password for invalid user admin from 94.34.40.83 port 41991 ssh2
Jul  4 07:46:39 smtp sshd[27847]: Failed password for invalid user admin from 94.34.40.83 port 41991 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=94.34.40.83
2019-07-04 19:57:54
183.52.106.139 attackbots
Jul  4 01:42:27 eola postfix/smtpd[7790]: connect from unknown[183.52.106.139]
Jul  4 01:42:27 eola postfix/smtpd[7793]: connect from unknown[183.52.106.139]
Jul  4 01:42:28 eola postfix/smtpd[7790]: lost connection after AUTH from unknown[183.52.106.139]
Jul  4 01:42:28 eola postfix/smtpd[7790]: disconnect from unknown[183.52.106.139] ehlo=1 auth=0/1 commands=1/2
Jul  4 01:42:29 eola postfix/smtpd[7790]: connect from unknown[183.52.106.139]
Jul  4 01:42:32 eola postfix/smtpd[7790]: lost connection after AUTH from unknown[183.52.106.139]
Jul  4 01:42:32 eola postfix/smtpd[7790]: disconnect from unknown[183.52.106.139] ehlo=1 auth=0/1 commands=1/2
Jul  4 01:42:34 eola postfix/smtpd[7790]: connect from unknown[183.52.106.139]
Jul  4 01:42:36 eola postfix/smtpd[7790]: lost connection after AUTH from unknown[183.52.106.139]
Jul  4 01:42:36 eola postfix/smtpd[7790]: disconnect from unknown[183.52.106.139] ehlo=1 auth=0/1 commands=1/2
Jul  4 01:42:37 eola postfix/smtpd[7790]:........
-------------------------------
2019-07-04 19:31:27
182.184.44.6 attack
leo_www
2019-07-04 19:53:41
103.4.167.101 attack
Jul  4 09:12:27 rpi sshd[8646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.4.167.101 
Jul  4 09:12:29 rpi sshd[8646]: Failed password for invalid user weldon from 103.4.167.101 port 57944 ssh2
2019-07-04 19:10:35
113.23.31.249 attackbotsspam
2019-07-04 06:08:18 H=([113.23.31.249]) [113.23.31.249]:13839 I=[10.100.18.23]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=113.23.31.249)
2019-07-04 06:08:20 unexpected disconnection while reading SMTP command from ([113.23.31.249]) [113.23.31.249]:13839 I=[10.100.18.23]:25 (error: Connection reset by peer)
2019-07-04 07:47:17 H=([113.23.31.249]) [113.23.31.249]:22271 I=[10.100.18.23]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=113.23.31.249)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.23.31.249
2019-07-04 20:07:30
36.74.75.31 attackspambots
Tried sshing with brute force.
2019-07-04 19:34:21

最近上报的IP列表

53.128.240.231 110.244.109.93 215.181.185.11 119.237.123.81
211.61.60.49 177.54.144.156 44.97.141.78 236.52.152.241
203.219.14.56 101.148.99.246 68.147.88.90 122.17.169.30
131.62.149.171 234.113.31.69 35.138.18.203 228.245.7.211
26.247.231.154 124.154.179.157 19.35.35.236 213.175.61.242