必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.189.224.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39605
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.189.224.150.		IN	A

;; AUTHORITY SECTION:
.			482	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 01:04:32 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 150.224.189.149.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 150.224.189.149.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
74.82.47.23 attack
Found on   Github Combined on 3 lists    / proto=6  .  srcport=38964  .  dstport=8443  .     (3231)
2020-09-22 04:54:29
60.167.176.184 attackbotsspam
$f2bV_matches
2020-09-22 05:25:42
165.22.82.120 attackspambots
Sep 21 17:08:35 ws22vmsma01 sshd[161557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.82.120
Sep 21 17:08:37 ws22vmsma01 sshd[161557]: Failed password for invalid user ivan from 165.22.82.120 port 59704 ssh2
...
2020-09-22 04:51:24
141.98.9.166 attackspam
$f2bV_matches
2020-09-22 05:28:44
134.209.254.62 attackbotsspam
Sep 21 19:57:10 master sshd[22438]: Failed password for root from 134.209.254.62 port 45940 ssh2
Sep 21 20:12:13 master sshd[23045]: Failed password for root from 134.209.254.62 port 60368 ssh2
Sep 21 20:15:46 master sshd[23092]: Failed password for invalid user ftpuser from 134.209.254.62 port 40478 ssh2
Sep 21 20:19:28 master sshd[23109]: Failed password for root from 134.209.254.62 port 48836 ssh2
Sep 21 20:23:00 master sshd[23187]: Failed password for root from 134.209.254.62 port 57174 ssh2
Sep 21 20:26:35 master sshd[23240]: Failed password for root from 134.209.254.62 port 37282 ssh2
Sep 21 20:30:14 master sshd[23670]: Failed password for root from 134.209.254.62 port 45620 ssh2
Sep 21 20:33:54 master sshd[23688]: Failed password for root from 134.209.254.62 port 53958 ssh2
Sep 21 20:37:37 master sshd[23739]: Failed password for root from 134.209.254.62 port 34064 ssh2
Sep 21 20:41:09 master sshd[23869]: Failed password for invalid user vnc from 134.209.254.62 port 42402 ssh2
2020-09-22 05:04:31
104.248.141.235 attackbots
104.248.141.235 - - [21/Sep/2020:22:01:03 +0100] "POST /wp-login.php HTTP/1.1" 200 2217 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.141.235 - - [21/Sep/2020:22:01:03 +0100] "POST /wp-login.php HTTP/1.1" 200 2242 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.141.235 - - [21/Sep/2020:22:01:04 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-22 05:23:02
178.32.196.243 attack
Sep 21 22:43:52 ip106 sshd[32421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.196.243 
Sep 21 22:43:54 ip106 sshd[32421]: Failed password for invalid user nfs from 178.32.196.243 port 34310 ssh2
...
2020-09-22 04:59:10
94.57.252.147 attack
$f2bV_matches
2020-09-22 05:27:27
177.159.14.11 attack
Sep 21 19:04:05 vm2 sshd[22203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.159.14.11
Sep 21 19:04:07 vm2 sshd[22203]: Failed password for invalid user user1 from 177.159.14.11 port 51695 ssh2
...
2020-09-22 05:14:13
219.156.64.211 attackspam
Listed on    zen-spamhaus also abuseat.org   / proto=6  .  srcport=34453  .  dstport=23  .     (3230)
2020-09-22 05:06:51
198.44.215.159 attackspambots
Sep 21 17:04:04 localhost sshd[65604]: Invalid user admin from 198.44.215.159 port 48862
Sep 21 17:04:04 localhost sshd[65604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.44.215.159
Sep 21 17:04:04 localhost sshd[65604]: Invalid user admin from 198.44.215.159 port 48862
Sep 21 17:04:06 localhost sshd[65604]: Failed password for invalid user admin from 198.44.215.159 port 48862 ssh2
Sep 21 17:04:08 localhost sshd[65623]: Invalid user admin from 198.44.215.159 port 48978
...
2020-09-22 05:13:26
62.210.79.233 attackspam
62.210.79.233 - - [21/Sep/2020:21:20:35 +0100] "POST //xmlrpc.php HTTP/1.1" 403 1599 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36"
62.210.79.233 - - [21/Sep/2020:21:20:35 +0100] "POST //xmlrpc.php HTTP/1.1" 403 1599 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36"
62.210.79.233 - - [21/Sep/2020:21:20:36 +0100] "POST //xmlrpc.php HTTP/1.1" 403 1599 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36"
...
2020-09-22 04:54:53
111.229.226.212 attackbots
Sep 22 00:15:13 mx sshd[862231]: Failed password for root from 111.229.226.212 port 56402 ssh2
Sep 22 00:16:28 mx sshd[862263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.226.212  user=root
Sep 22 00:16:31 mx sshd[862263]: Failed password for root from 111.229.226.212 port 46542 ssh2
Sep 22 00:17:44 mx sshd[862320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.226.212  user=root
Sep 22 00:17:46 mx sshd[862320]: Failed password for root from 111.229.226.212 port 36676 ssh2
...
2020-09-22 04:51:06
152.246.174.68 attack
152.246.174.68 (BR/Brazil/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 21 13:03:48 server2 sshd[32365]: Failed password for root from 149.56.130.61 port 59294 ssh2
Sep 21 13:04:09 server2 sshd[32680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.246.174.68  user=root
Sep 21 13:03:37 server2 sshd[32202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.254.62  user=root
Sep 21 13:03:39 server2 sshd[32202]: Failed password for root from 134.209.254.62 port 48592 ssh2
Sep 21 13:04:04 server2 sshd[32682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.106.203  user=root
Sep 21 13:04:06 server2 sshd[32682]: Failed password for root from 104.131.106.203 port 44212 ssh2

IP Addresses Blocked:

149.56.130.61 (CA/Canada/-)
2020-09-22 05:04:12
177.205.157.41 attackbotsspam
1600707847 - 09/21/2020 19:04:07 Host: 177.205.157.41/177.205.157.41 Port: 445 TCP Blocked
2020-09-22 05:16:09

最近上报的IP列表

215.219.79.17 136.105.144.218 173.166.164.39 148.151.16.190
1.215.158.86 123.168.133.145 178.181.50.169 106.222.60.221
24.61.129.88 103.145.13.127 193.113.104.228 174.246.138.203
115.91.199.203 92.45.182.132 151.78.120.91 188.208.122.210
120.33.229.1 92.155.191.127 144.126.164.239 143.34.236.5