必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): France

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.202.28.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62492
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.202.28.105.			IN	A

;; AUTHORITY SECTION:
.			574	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:47:39 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
105.28.202.149.in-addr.arpa domain name pointer www.netafraz.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
105.28.202.149.in-addr.arpa	name = www.netafraz.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.13.36.10 attackbotsspam
$f2bV_matches
2020-08-12 02:39:02
148.70.149.39 attackbotsspam
'Fail2Ban'
2020-08-12 02:58:40
136.232.65.226 attack
1597147602 - 08/11/2020 14:06:42 Host: 136.232.65.226/136.232.65.226 Port: 445 TCP Blocked
2020-08-12 02:51:34
167.71.177.236 attackbotsspam
$f2bV_matches
2020-08-12 02:51:49
78.175.21.129 attack
Port probing on unauthorized port 23
2020-08-12 02:45:58
94.102.49.159 attackbots
port
2020-08-12 02:59:30
191.241.242.47 attackspam
20/8/11@08:06:49: FAIL: Alarm-Network address from=191.241.242.47
20/8/11@08:06:49: FAIL: Alarm-Network address from=191.241.242.47
...
2020-08-12 02:47:13
40.117.102.188 attackbotsspam
40.117.102.188 - - [11/Aug/2020:17:30:06 +0100] "POST //wp-login.php HTTP/1.1" 302 5 "https://emresolutions.com//wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36"
40.117.102.188 - - [11/Aug/2020:17:30:09 +0100] "POST //wp-login.php HTTP/1.1" 302 5 "https://emresolutions.com//wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36"
40.117.102.188 - - [11/Aug/2020:17:30:11 +0100] "POST //wp-login.php HTTP/1.1" 302 5 "https://emresolutions.com//wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36"
...
2020-08-12 02:46:17
152.231.107.54 attack
Lines containing failures of 152.231.107.54 (max 1000)
Aug 10 08:13:00 localhost sshd[28583]: User r.r from 152.231.107.54 not allowed because listed in DenyUsers
Aug 10 08:13:00 localhost sshd[28583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.231.107.54  user=r.r
Aug 10 08:13:02 localhost sshd[28583]: Failed password for invalid user r.r from 152.231.107.54 port 54257 ssh2
Aug 10 08:13:02 localhost sshd[28583]: Received disconnect from 152.231.107.54 port 54257:11: Bye Bye [preauth]
Aug 10 08:13:02 localhost sshd[28583]: Disconnected from invalid user r.r 152.231.107.54 port 54257 [preauth]
Aug 10 08:23:16 localhost sshd[315]: User r.r from 152.231.107.54 not allowed because listed in DenyUsers
Aug 10 08:23:16 localhost sshd[315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.231.107.54  user=r.r
Aug 10 08:23:18 localhost sshd[315]: Failed password for invalid user r.r from 1........
------------------------------
2020-08-12 03:14:44
49.234.50.247 attackspam
Aug 11 17:03:03 h2829583 sshd[18388]: Failed password for root from 49.234.50.247 port 48592 ssh2
2020-08-12 03:10:48
185.153.197.32 attack
Aug 11 20:13:04 [host] kernel: [2836585.496725] [U
Aug 11 20:13:14 [host] kernel: [2836595.997460] [U
Aug 11 20:15:19 [host] kernel: [2836720.397165] [U
Aug 11 20:16:55 [host] kernel: [2836816.596679] [U
Aug 11 20:18:35 [host] kernel: [2836916.519477] [U
Aug 11 20:19:50 [host] kernel: [2836991.876321] [U
2020-08-12 03:12:11
109.241.98.147 attackbotsspam
Aug 11 12:57:06 django-0 sshd[10353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109241098147.warszawa.vectranet.pl  user=root
Aug 11 12:57:09 django-0 sshd[10353]: Failed password for root from 109.241.98.147 port 54280 ssh2
...
2020-08-12 02:44:55
36.79.235.108 attack
36.79.235.108 - - [11/Aug/2020:15:18:03 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
36.79.235.108 - - [11/Aug/2020:15:18:09 +0100] "POST /wp-login.php HTTP/1.1" 200 5871 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
36.79.235.108 - - [11/Aug/2020:15:19:19 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
...
2020-08-12 03:01:09
129.204.139.26 attack
2020-08-11T13:57:48.672400v22018076590370373 sshd[23784]: Failed password for root from 129.204.139.26 port 49286 ssh2
2020-08-11T14:02:08.106559v22018076590370373 sshd[12339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.139.26  user=root
2020-08-11T14:02:10.252449v22018076590370373 sshd[12339]: Failed password for root from 129.204.139.26 port 36622 ssh2
2020-08-11T14:06:21.826831v22018076590370373 sshd[1238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.139.26  user=root
2020-08-11T14:06:23.369992v22018076590370373 sshd[1238]: Failed password for root from 129.204.139.26 port 52172 ssh2
...
2020-08-12 03:04:26
141.98.10.195 attackbotsspam
invalid user
2020-08-12 02:41:04

最近上报的IP列表

149.202.25.224 149.202.31.150 149.202.25.76 149.202.30.232
149.202.31.229 149.202.64.171 149.202.68.18 149.202.50.107
149.202.35.113 149.202.70.109 149.202.68.200 149.202.71.192
149.202.72.139 149.202.65.31 149.202.70.87 149.202.76.145
149.202.75.236 149.202.76.60 149.202.81.10 149.202.81.9