必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.137.120.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61573
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.137.120.75.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 04:55:07 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 75.120.137.149.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 149.137.120.75.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.153.198.249 attackbots
Honeypot hit, critical abuseConfidenceScore, incoming Traffic from this IP
2019-12-24 16:22:45
113.186.215.123 attackspam
Unauthorized connection attempt detected from IP address 113.186.215.123 to port 445
2019-12-24 16:24:52
103.44.116.36 attack
Honeypot attack, port: 445, PTR: 103.44.116.36.server.swastikinternet.com.
2019-12-24 16:08:32
103.129.47.51 attackbots
TCP Port: 25      invalid blocked  dnsbl-sorbs also barracuda and zen-spamhaus           (217)
2019-12-24 16:16:19
189.236.3.127 attackbotsspam
Honeypot attack, port: 81, PTR: dsl-189-236-3-127-dyn.prod-infinitum.com.mx.
2019-12-24 15:57:29
49.88.112.66 attack
Dec 24 08:20:23 MK-Soft-VM4 sshd[23889]: Failed password for root from 49.88.112.66 port 41939 ssh2
Dec 24 08:20:26 MK-Soft-VM4 sshd[23889]: Failed password for root from 49.88.112.66 port 41939 ssh2
...
2019-12-24 15:47:40
178.128.20.9 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-24 15:51:22
108.27.36.189 attackspambots
firewall-block, port(s): 1433/tcp
2019-12-24 15:53:34
183.82.251.119 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 24-12-2019 07:20:10.
2019-12-24 16:04:12
74.82.47.8 attackbots
firewall-block, port(s): 50075/tcp
2019-12-24 16:09:03
223.247.223.39 attack
Dec 24 07:20:14 *** sshd[3686]: Invalid user Offline from 223.247.223.39
2019-12-24 15:56:32
180.249.181.3 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-12-24 16:00:30
218.24.108.178 attackspam
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-12-24 16:15:15
104.131.91.148 attack
Dec 24 08:42:24 * sshd[21862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.91.148
Dec 24 08:42:27 * sshd[21862]: Failed password for invalid user fusaro from 104.131.91.148 port 46467 ssh2
2019-12-24 16:26:09
185.62.85.150 attackbotsspam
Dec 24 08:42:23 localhost sshd\[4564\]: Invalid user vps from 185.62.85.150 port 51638
Dec 24 08:42:23 localhost sshd\[4564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.62.85.150
Dec 24 08:42:25 localhost sshd\[4564\]: Failed password for invalid user vps from 185.62.85.150 port 51638 ssh2
2019-12-24 15:50:57

最近上报的IP列表

145.10.13.65 5.234.225.35 201.30.135.10 174.212.168.136
32.65.168.161 119.144.222.102 189.252.149.37 35.140.231.195
45.173.125.133 122.14.74.245 90.205.162.95 42.247.190.185
83.33.47.183 238.124.75.242 172.109.38.247 92.41.111.5
148.33.120.216 12.17.20.24 161.52.79.157 214.110.139.244