必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.202.168.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38750
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.202.168.149.		IN	A

;; AUTHORITY SECTION:
.			370	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 04:33:51 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
149.168.202.149.in-addr.arpa domain name pointer zerb04.izt.coop.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.168.202.149.in-addr.arpa	name = zerb04.izt.coop.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
37.55.112.134 attack
Jan  8 15:34:22 git-ovh sshd[20653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.55.112.134 
Jan  8 15:34:24 git-ovh sshd[20653]: Failed password for invalid user guest from 37.55.112.134 port 51316 ssh2
...
2020-01-14 23:24:50
103.145.255.109 attackspambots
Jan 14 13:59:02 mxgate1 postfix/postscreen[32156]: CONNECT from [103.145.255.109]:56883 to [176.31.12.44]:25
Jan 14 13:59:02 mxgate1 postfix/dnsblog[32159]: addr 103.145.255.109 listed by domain bl.spamcop.net as 127.0.0.2
Jan 14 13:59:02 mxgate1 postfix/dnsblog[32161]: addr 103.145.255.109 listed by domain b.barracudacentral.org as 127.0.0.2
Jan 14 13:59:08 mxgate1 postfix/postscreen[32156]: DNSBL rank 2 for [103.145.255.109]:56883
Jan x@x
Jan 14 13:59:10 mxgate1 postfix/postscreen[32156]: DISCONNECT [103.145.255.109]:56883


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.145.255.109
2020-01-14 23:29:12
81.22.45.183 attack
" "
2020-01-14 23:09:41
103.52.216.156 attack
ICMP MH Probe, Scan /Distributed -
2020-01-14 23:22:02
68.183.153.161 attack
Unauthorized connection attempt detected from IP address 68.183.153.161 to port 2220 [J]
2020-01-14 23:32:44
178.32.47.97 attackspambots
Jan 14 11:06:40 firewall sshd[4706]: Invalid user upload from 178.32.47.97
Jan 14 11:06:42 firewall sshd[4706]: Failed password for invalid user upload from 178.32.47.97 port 51536 ssh2
Jan 14 11:10:06 firewall sshd[4753]: Invalid user helen from 178.32.47.97
...
2020-01-14 23:04:52
192.34.62.227 attack
Jan 14 15:08:50 XXX sshd[35707]: Invalid user edition from 192.34.62.227 port 36216
2020-01-14 23:34:38
187.94.16.67 attack
Unauthorized connection attempt from IP address 187.94.16.67 on Port 445(SMB)
2020-01-14 23:45:42
49.232.43.151 attack
Failed password for root from 49.232.43.151 port 37536 ssh2
Invalid user maprdev from 49.232.43.151 port 60816
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.43.151
Failed password for invalid user maprdev from 49.232.43.151 port 60816 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.43.151  user=root
2020-01-14 23:38:41
67.140.97.108 attackbotsspam
Lines containing failures of 67.140.97.108 (max 1000)
Jan 14 12:54:00 localhost sshd[16405]: Invalid user hora from 67.140.97.108 port 58810
Jan 14 12:54:00 localhost sshd[16405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.140.97.108 
Jan 14 12:54:01 localhost sshd[16405]: Failed password for invalid user hora from 67.140.97.108 port 58810 ssh2
Jan 14 12:54:02 localhost sshd[16405]: Received disconnect from 67.140.97.108 port 58810:11: Bye Bye [preauth]
Jan 14 12:54:02 localhost sshd[16405]: Disconnected from invalid user hora 67.140.97.108 port 58810 [preauth]
Jan 14 12:58:46 localhost sshd[17370]: User r.r from 67.140.97.108 not allowed because listed in DenyUsers
Jan 14 12:58:46 localhost sshd[17370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.140.97.108  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=67.140.97.108
2020-01-14 23:25:07
186.225.189.1 attackspam
Telnet/23 MH Probe, BF, Hack -
2020-01-14 23:01:59
45.234.251.241 attackspambots
Spam
2020-01-14 23:19:42
197.214.16.147 attackspam
Jan 14 14:02:29 vpn01 sshd[28198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.214.16.147
Jan 14 14:02:31 vpn01 sshd[28198]: Failed password for invalid user admin from 197.214.16.147 port 4609 ssh2
...
2020-01-14 23:46:17
37.49.230.28 attack
[2020-01-14 08:31:39] NOTICE[2175][C-00002932] chan_sip.c: Call from '' (37.49.230.28:15948) to extension '9390237920793' rejected because extension not found in context 'public'.
[2020-01-14 08:31:39] SECURITY[2212] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-01-14T08:31:39.092-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="9390237920793",SessionID="0x7f5ac400f638",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.230.28/5060",ACLName="no_extension_match"
[2020-01-14 08:37:44] NOTICE[2175][C-00002935] chan_sip.c: Call from '' (37.49.230.28:32272) to extension '810390237920793' rejected because extension not found in context 'public'.
[2020-01-14 08:37:44] SECURITY[2212] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-01-14T08:37:44.858-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="810390237920793",SessionID="0x7f5ac4c6fb48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.23
...
2020-01-14 23:12:22
41.46.217.223 attack
Lines containing failures of 41.46.217.223
Jan 14 14:00:36 ks3370873 sshd[10065]: Invalid user manager from 41.46.217.223 port 55853
Jan 14 14:00:36 ks3370873 sshd[10065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.46.217.223 
Jan 14 14:00:38 ks3370873 sshd[10065]: Failed password for invalid user manager from 41.46.217.223 port 55853 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=41.46.217.223
2020-01-14 23:33:40

最近上报的IP列表

149.202.162.65 149.202.17.145 149.202.19.45 149.202.188.54
149.202.190.28 149.202.228.226 149.202.237.95 149.202.194.128
149.202.250.47 149.202.28.249 149.202.38.40 149.202.43.116
149.202.57.172 149.202.5.147 149.202.61.91 149.202.66.212
149.202.68.234 149.202.7.129 149.202.70.65 149.202.71.63