必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
149.18.30.244 spam
Stop logging in my accounts lil bro
2024-02-12 17:52:20
149.18.30.78 spam
Please stop trying to log into my Steam.
2023-03-27 23:32:18
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.18.30.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61652
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.18.30.103.			IN	A

;; AUTHORITY SECTION:
.			570	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022101100 1800 900 604800 86400

;; Query time: 124 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 11 22:41:23 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 103.30.18.149.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 103.30.18.149.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
116.203.202.45 attackspambots
Sep 27 16:17:49 bouncer sshd\[23660\]: Invalid user azure123 from 116.203.202.45 port 56710
Sep 27 16:17:49 bouncer sshd\[23660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.203.202.45 
Sep 27 16:17:51 bouncer sshd\[23660\]: Failed password for invalid user azure123 from 116.203.202.45 port 56710 ssh2
...
2019-09-27 22:19:36
140.114.27.95 attack
Sep 27 14:05:48 game-panel sshd[10189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.114.27.95
Sep 27 14:05:50 game-panel sshd[10189]: Failed password for invalid user dbadmin from 140.114.27.95 port 58702 ssh2
Sep 27 14:10:44 game-panel sshd[10453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.114.27.95
2019-09-27 22:25:01
69.10.52.142 attack
Sep 27 07:54:44 aat-srv002 sshd[16017]: Failed password for root from 69.10.52.142 port 60294 ssh2
Sep 27 07:58:45 aat-srv002 sshd[16162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.10.52.142
Sep 27 07:58:47 aat-srv002 sshd[16162]: Failed password for invalid user guest from 69.10.52.142 port 42082 ssh2
...
2019-09-27 21:54:36
162.144.119.35 attackbotsspam
Sep 27 13:40:18 venus sshd\[19061\]: Invalid user audelaevent from 162.144.119.35 port 53802
Sep 27 13:40:18 venus sshd\[19061\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.144.119.35
Sep 27 13:40:19 venus sshd\[19061\]: Failed password for invalid user audelaevent from 162.144.119.35 port 53802 ssh2
...
2019-09-27 21:46:47
88.208.217.12 attack
Sep 27 15:34:45 vmd17057 sshd\[9417\]: Invalid user admin from 88.208.217.12 port 27656
Sep 27 15:34:45 vmd17057 sshd\[9417\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.208.217.12
Sep 27 15:34:47 vmd17057 sshd\[9417\]: Failed password for invalid user admin from 88.208.217.12 port 27656 ssh2
...
2019-09-27 21:40:29
51.254.99.208 attack
2019-09-27T13:52:53.473537abusebot-6.cloudsearch.cf sshd\[24457\]: Invalid user diag from 51.254.99.208 port 33292
2019-09-27 22:01:27
77.247.109.72 attackbotsspam
\[2019-09-27 09:31:31\] NOTICE\[1948\] chan_sip.c: Registration from '"2001" \' failed for '77.247.109.72:5619' - Wrong password
\[2019-09-27 09:31:31\] SECURITY\[2006\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-09-27T09:31:31.863-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="2001",SessionID="0x7f1e1c2bed58",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.109.72/5619",Challenge="3a23eda5",ReceivedChallenge="3a23eda5",ReceivedHash="9a01fce4f881a0f9881d5b6d6096355a"
\[2019-09-27 09:31:32\] NOTICE\[1948\] chan_sip.c: Registration from '"2001" \' failed for '77.247.109.72:5619' - Wrong password
\[2019-09-27 09:31:32\] SECURITY\[2006\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-09-27T09:31:32.067-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="2001",SessionID="0x7f1e1c129868",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UD
2019-09-27 21:45:46
14.63.174.149 attack
Sep 27 13:35:24 venus sshd\[18904\]: Invalid user sinusbot from 14.63.174.149 port 55390
Sep 27 13:35:24 venus sshd\[18904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.174.149
Sep 27 13:35:26 venus sshd\[18904\]: Failed password for invalid user sinusbot from 14.63.174.149 port 55390 ssh2
...
2019-09-27 22:03:29
218.92.0.204 attack
2019-09-27T13:15:20.526957abusebot-8.cloudsearch.cf sshd\[8528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.204  user=root
2019-09-27 21:35:30
84.33.93.48 attackspam
$f2bV_matches
2019-09-27 21:40:59
122.159.107.185 attack
Automated reporting of FTP Brute Force
2019-09-27 22:22:52
103.231.160.98 attackbots
3389BruteforceFW21
2019-09-27 22:15:04
37.193.108.101 attackspam
Sep 27 14:00:24 web8 sshd\[9091\]: Invalid user postgres from 37.193.108.101
Sep 27 14:00:24 web8 sshd\[9091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.193.108.101
Sep 27 14:00:26 web8 sshd\[9091\]: Failed password for invalid user postgres from 37.193.108.101 port 59338 ssh2
Sep 27 14:05:10 web8 sshd\[11313\]: Invalid user yy from 37.193.108.101
Sep 27 14:05:10 web8 sshd\[11313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.193.108.101
2019-09-27 22:07:32
177.135.101.93 attackspam
Automatic report - Banned IP Access
2019-09-27 21:37:36
139.99.221.61 attack
Sep 27 15:18:01 ns3110291 sshd\[8934\]: Invalid user user from 139.99.221.61
Sep 27 15:18:01 ns3110291 sshd\[8934\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61 
Sep 27 15:18:03 ns3110291 sshd\[8934\]: Failed password for invalid user user from 139.99.221.61 port 45549 ssh2
Sep 27 15:23:15 ns3110291 sshd\[9153\]: Invalid user timemachine from 139.99.221.61
Sep 27 15:23:15 ns3110291 sshd\[9153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61 
...
2019-09-27 22:21:45

最近上报的IP列表

110.182.96.2 23.94.180.15 159.192.207.247 59.126.224.30
45.190.158.2 89.46.223.59 45.252.251.43 49.254.130.48
49.254.73.13 45.192.138.55 45.134.224.131 81.170.246.36
176.106.122.56 79.151.85.74 119.91.61.108 194.110.150.21
83.171.255.241 40.126.64.23 45.130.60.78 88.218.47.15