必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.142.105.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20102
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.142.105.0.			IN	A

;; AUTHORITY SECTION:
.			154	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 05:09:32 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 0.105.142.149.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 0.105.142.149.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
183.195.106.190 attackspambots
Sep  5 21:07:16 extapp sshd[3951]: Invalid user 123 from 183.195.106.190
Sep  5 21:07:19 extapp sshd[3951]: Failed password for invalid user 123 from 183.195.106.190 port 42194 ssh2
Sep  5 21:11:05 extapp sshd[5572]: Invalid user 1qaz2wsx from 183.195.106.190


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=183.195.106.190
2019-09-06 06:35:32
167.99.38.73 attack
firewall-block, port(s): 7128/tcp
2019-09-06 06:32:03
178.62.202.119 attack
fire
2019-09-06 06:09:11
187.63.73.56 attack
Sep  5 22:05:56 web8 sshd\[19177\]: Invalid user vbox from 187.63.73.56
Sep  5 22:05:56 web8 sshd\[19177\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.63.73.56
Sep  5 22:05:58 web8 sshd\[19177\]: Failed password for invalid user vbox from 187.63.73.56 port 35800 ssh2
Sep  5 22:11:34 web8 sshd\[22082\]: Invalid user minecraft from 187.63.73.56
Sep  5 22:11:34 web8 sshd\[22082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.63.73.56
2019-09-06 06:19:10
148.70.246.130 attackbots
Sep  5 21:28:27 localhost sshd\[28169\]: Invalid user testsftp from 148.70.246.130 port 57576
Sep  5 21:28:27 localhost sshd\[28169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.246.130
Sep  5 21:28:29 localhost sshd\[28169\]: Failed password for invalid user testsftp from 148.70.246.130 port 57576 ssh2
2019-09-06 06:29:10
218.98.40.141 attack
Bruteforce on SSH Honeypot
2019-09-06 06:07:56
46.101.93.69 attack
2019-09-06T04:13:04.746801enmeeting.mahidol.ac.th sshd\[29031\]: Invalid user musicbot from 46.101.93.69 port 34296
2019-09-06T04:13:04.767803enmeeting.mahidol.ac.th sshd\[29031\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.93.69
2019-09-06T04:13:07.213348enmeeting.mahidol.ac.th sshd\[29031\]: Failed password for invalid user musicbot from 46.101.93.69 port 34296 ssh2
...
2019-09-06 06:13:56
78.169.28.202 attackspam
Automatic report - Port Scan Attack
2019-09-06 06:21:59
178.128.55.52 attackbots
$f2bV_matches
2019-09-06 06:17:49
51.38.179.179 attackspam
Sep  5 21:03:29 dev0-dcde-rnet sshd[22278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.179.179
Sep  5 21:03:32 dev0-dcde-rnet sshd[22278]: Failed password for invalid user 123456 from 51.38.179.179 port 59618 ssh2
Sep  5 21:07:32 dev0-dcde-rnet sshd[22310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.179.179
2019-09-06 06:33:51
24.135.145.8 attack
Sep  5 21:59:47 pkdns2 sshd\[65021\]: Invalid user bot from 24.135.145.8Sep  5 21:59:49 pkdns2 sshd\[65021\]: Failed password for invalid user bot from 24.135.145.8 port 35464 ssh2Sep  5 22:04:02 pkdns2 sshd\[65196\]: Invalid user 123 from 24.135.145.8Sep  5 22:04:04 pkdns2 sshd\[65196\]: Failed password for invalid user 123 from 24.135.145.8 port 52260 ssh2Sep  5 22:08:20 pkdns2 sshd\[65374\]: Invalid user 123 from 24.135.145.8Sep  5 22:08:22 pkdns2 sshd\[65374\]: Failed password for invalid user 123 from 24.135.145.8 port 40936 ssh2
...
2019-09-06 06:02:34
194.204.214.167 attackbotsspam
SMB Server BruteForce Attack
2019-09-06 06:11:16
218.98.26.162 attackbotsspam
2019-09-05T21:40:45.303610Z e3617fd9e692 New connection: 218.98.26.162:46802 (172.17.0.6:2222) [session: e3617fd9e692]
2019-09-05T22:35:53.764471Z 06a33d63544d New connection: 218.98.26.162:15417 (172.17.0.6:2222) [session: 06a33d63544d]
2019-09-06 06:36:57
187.112.122.90 attackspam
Lines containing failures of 187.112.122.90
Sep  5 18:12:20 install sshd[14004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.112.122.90  user=www-data
Sep  5 18:12:22 install sshd[14004]: Failed password for www-data from 187.112.122.90 port 40446 ssh2
Sep  5 18:12:22 install sshd[14004]: Received disconnect from 187.112.122.90 port 40446:11: Bye Bye [preauth]
Sep  5 18:12:22 install sshd[14004]: Disconnected from authenticating user www-data 187.112.122.90 port 40446 [preauth]
Sep  5 18:17:36 install sshd[14980]: Invalid user ubuntu from 187.112.122.90 port 26143
Sep  5 18:17:36 install sshd[14980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.112.122.90
Sep  5 18:17:38 install sshd[14980]: Failed password for invalid user ubuntu from 187.112.122.90 port 26143 ssh2
Sep  5 18:17:38 install sshd[14980]: Received disconnect from 187.112.122.90 port 26143:11: Bye Bye [preauth]
Sep........
------------------------------
2019-09-06 06:37:26
106.52.24.184 attackbotsspam
Sep  5 11:17:57 hcbb sshd\[2165\]: Invalid user web from 106.52.24.184
Sep  5 11:17:57 hcbb sshd\[2165\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.24.184
Sep  5 11:17:59 hcbb sshd\[2165\]: Failed password for invalid user web from 106.52.24.184 port 55946 ssh2
Sep  5 11:22:52 hcbb sshd\[2621\]: Invalid user admin from 106.52.24.184
Sep  5 11:22:52 hcbb sshd\[2621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.24.184
2019-09-06 06:25:24

最近上报的IP列表

118.172.148.5 118.172.148.56 118.172.148.60 118.172.148.65
118.172.148.68 13.49.2.14 13.49.202.6 13.49.194.166
13.49.19.130 13.49.209.127 13.49.200.72 13.49.205.147
13.49.207.15 13.49.209.217 13.49.214.121 13.49.21.201
13.49.205.252 118.172.148.70 13.49.22.0 13.49.228.169