必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.253.242.101
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27664
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.253.242.101.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 16:36:51 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 101.242.253.149.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 101.242.253.149.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.227.242.253 attack
Unauthorised access (Aug  1) SRC=14.227.242.253 LEN=52 TTL=119 ID=10709 DF TCP DPT=445 WINDOW=8192 SYN
2019-08-01 13:27:11
211.252.19.254 attackspam
Aug  1 06:29:15 xeon sshd[8863]: Failed password for invalid user iesse from 211.252.19.254 port 48224 ssh2
2019-08-01 13:53:02
104.248.162.218 attackbotsspam
Aug  1 07:40:45 minden010 sshd[2086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.162.218
Aug  1 07:40:47 minden010 sshd[2086]: Failed password for invalid user jessica from 104.248.162.218 port 39186 ssh2
Aug  1 07:45:04 minden010 sshd[3588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.162.218
...
2019-08-01 13:53:33
127.0.0.1 attack
Test Connectivity
2019-08-01 14:19:43
122.228.19.80 attackbots
01.08.2019 05:49:12 Connection to port 8649 blocked by firewall
2019-08-01 14:14:27
210.16.188.124 attackbotsspam
Automatic report - Banned IP Access
2019-08-01 13:55:19
177.69.245.33 attackbotsspam
$f2bV_matches
2019-08-01 14:04:35
201.46.62.28 attack
failed_logins
2019-08-01 14:16:39
104.248.8.60 attack
Invalid user admin from 104.248.8.60 port 43058
2019-08-01 13:57:56
106.13.53.173 attackspam
Aug  1 01:37:08 xtremcommunity sshd\[11353\]: Invalid user anordnung from 106.13.53.173 port 57662
Aug  1 01:37:08 xtremcommunity sshd\[11353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.53.173
Aug  1 01:37:09 xtremcommunity sshd\[11353\]: Failed password for invalid user anordnung from 106.13.53.173 port 57662 ssh2
Aug  1 01:42:45 xtremcommunity sshd\[11561\]: Invalid user lasg from 106.13.53.173 port 46426
Aug  1 01:42:45 xtremcommunity sshd\[11561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.53.173
...
2019-08-01 14:21:09
122.228.208.113 attackbots
Aug  1 03:31:07   TCP Attack: SRC=122.228.208.113 DST=[Masked] LEN=40 TOS=0x00 PREC=0x00 TTL=241  PROTO=TCP SPT=50234 DPT=8118 WINDOW=1024 RES=0x00 SYN URGP=0
2019-08-01 14:09:45
178.62.30.135 attack
Aug  1 07:47:42 [host] sshd[16049]: Invalid user demo from 178.62.30.135
Aug  1 07:47:42 [host] sshd[16049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.30.135
Aug  1 07:47:44 [host] sshd[16049]: Failed password for invalid user demo from 178.62.30.135 port 42392 ssh2
2019-08-01 14:13:34
213.139.144.10 attack
Aug  1 06:04:38 tux-35-217 sshd\[11169\]: Invalid user 123456 from 213.139.144.10 port 55440
Aug  1 06:04:38 tux-35-217 sshd\[11169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.139.144.10
Aug  1 06:04:40 tux-35-217 sshd\[11169\]: Failed password for invalid user 123456 from 213.139.144.10 port 55440 ssh2
Aug  1 06:10:51 tux-35-217 sshd\[11251\]: Invalid user ismana2121 from 213.139.144.10 port 64249
Aug  1 06:10:51 tux-35-217 sshd\[11251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.139.144.10
...
2019-08-01 14:04:17
118.89.35.168 attack
$f2bV_matches
2019-08-01 14:06:31
112.216.241.20 attackbots
firewall-block, port(s): 23/tcp
2019-08-01 13:39:54

最近上报的IP列表

146.255.23.178 205.120.255.96 199.11.36.47 231.98.118.23
156.184.54.1 114.206.124.69 147.5.36.250 66.100.225.101
118.194.206.164 118.34.104.236 59.8.185.216 25.46.173.253
69.107.141.55 59.190.79.7 15.151.70.254 13.27.161.193
47.45.232.85 168.155.213.186 205.8.53.156 110.26.140.244