必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.30.117.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28579
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.30.117.216.			IN	A

;; AUTHORITY SECTION:
.			215	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021123001 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 31 04:45:02 CST 2021
;; MSG SIZE  rcvd: 107
HOST信息:
Host 216.117.30.149.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 216.117.30.149.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
69.172.87.212 attackbotsspam
Dec  1 17:05:22 dedicated sshd[11271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.172.87.212  user=root
Dec  1 17:05:24 dedicated sshd[11271]: Failed password for root from 69.172.87.212 port 42550 ssh2
2019-12-02 03:33:13
150.223.1.176 attackspam
Dec  1 18:22:56 markkoudstaal sshd[8815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.1.176
Dec  1 18:22:58 markkoudstaal sshd[8815]: Failed password for invalid user valla from 150.223.1.176 port 51531 ssh2
Dec  1 18:26:08 markkoudstaal sshd[9091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.1.176
2019-12-02 03:59:25
49.234.12.123 attack
Dec  1 20:24:54 vps647732 sshd[27780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.12.123
Dec  1 20:24:55 vps647732 sshd[27780]: Failed password for invalid user pernyeszi from 49.234.12.123 port 44542 ssh2
...
2019-12-02 03:42:09
124.156.116.72 attackspam
ssh failed login
2019-12-02 03:45:33
112.85.42.182 attackspam
Dec  1 20:32:03 localhost sshd\[14656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.182  user=root
Dec  1 20:32:04 localhost sshd\[14656\]: Failed password for root from 112.85.42.182 port 48599 ssh2
Dec  1 20:32:08 localhost sshd\[14656\]: Failed password for root from 112.85.42.182 port 48599 ssh2
2019-12-02 03:35:34
164.132.42.32 attackspam
Dec  1 15:35:44 eventyay sshd[30447]: Failed password for root from 164.132.42.32 port 59740 ssh2
Dec  1 15:38:49 eventyay sshd[30579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.42.32
Dec  1 15:38:51 eventyay sshd[30579]: Failed password for invalid user aguilar from 164.132.42.32 port 38118 ssh2
...
2019-12-02 03:40:24
2400:6180:0:d1::4dd:b001 attack
[munged]::443 2400:6180:0:d1::4dd:b001 - - [01/Dec/2019:15:38:19 +0100] "POST /[munged]: HTTP/1.1" 200 6577 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 2400:6180:0:d1::4dd:b001 - - [01/Dec/2019:15:38:27 +0100] "POST /[munged]: HTTP/1.1" 200 6437 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 2400:6180:0:d1::4dd:b001 - - [01/Dec/2019:15:38:27 +0100] "POST /[munged]: HTTP/1.1" 200 6437 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-12-02 03:49:32
49.88.112.75 attack
Dec  2 00:57:15 gw1 sshd[10013]: Failed password for root from 49.88.112.75 port 41501 ssh2
Dec  2 00:57:17 gw1 sshd[10013]: Failed password for root from 49.88.112.75 port 41501 ssh2
...
2019-12-02 04:06:49
197.50.51.180 attackspam
Automatic report - Port Scan Attack
2019-12-02 03:39:32
14.18.189.68 attack
Dec  1 15:51:39 ns3042688 sshd\[708\]: Invalid user pinner from 14.18.189.68
Dec  1 15:51:39 ns3042688 sshd\[708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.18.189.68 
Dec  1 15:51:41 ns3042688 sshd\[708\]: Failed password for invalid user pinner from 14.18.189.68 port 56812 ssh2
Dec  1 15:56:08 ns3042688 sshd\[2147\]: Invalid user brunette from 14.18.189.68
Dec  1 15:56:08 ns3042688 sshd\[2147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.18.189.68 
...
2019-12-02 03:53:39
181.113.24.210 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2019-12-02 03:56:00
129.154.67.65 attack
Dec  1 06:28:12 hanapaa sshd\[10010\]: Invalid user horror from 129.154.67.65
Dec  1 06:28:12 hanapaa sshd\[10010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-129-154-67-65.compute.oraclecloud.com
Dec  1 06:28:13 hanapaa sshd\[10010\]: Failed password for invalid user horror from 129.154.67.65 port 51234 ssh2
Dec  1 06:32:30 hanapaa sshd\[10418\]: Invalid user 3EDC4RFV from 129.154.67.65
Dec  1 06:32:30 hanapaa sshd\[10418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-129-154-67-65.compute.oraclecloud.com
2019-12-02 03:37:21
70.184.80.136 attackspam
Dec  1 16:57:46 MK-Soft-VM7 sshd[23060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.184.80.136 
Dec  1 16:57:49 MK-Soft-VM7 sshd[23060]: Failed password for invalid user hassel from 70.184.80.136 port 55154 ssh2
...
2019-12-02 03:31:08
51.77.201.36 attack
Dec  1 05:54:55 tdfoods sshd\[14957\]: Invalid user supervisores from 51.77.201.36
Dec  1 05:54:55 tdfoods sshd\[14957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.ip-51-77-201.eu
Dec  1 05:54:56 tdfoods sshd\[14957\]: Failed password for invalid user supervisores from 51.77.201.36 port 50860 ssh2
Dec  1 05:58:03 tdfoods sshd\[15230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.ip-51-77-201.eu  user=root
Dec  1 05:58:05 tdfoods sshd\[15230\]: Failed password for root from 51.77.201.36 port 58298 ssh2
2019-12-02 03:56:28
110.80.142.84 attackspam
Dec  1 20:21:48 [host] sshd[2215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.80.142.84  user=root
Dec  1 20:21:50 [host] sshd[2215]: Failed password for root from 110.80.142.84 port 43582 ssh2
Dec  1 20:25:07 [host] sshd[2228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.80.142.84  user=bin
2019-12-02 03:58:41

最近上报的IP列表

96.19.39.173 84.97.255.77 45.90.47.16 131.86.101.245
93.142.185.191 246.131.32.194 241.131.45.78 187.23.116.255
59.50.100.105 192.18.30.32 233.236.10.188 194.44.219.97
152.1.123.53 79.41.180.238 103.57.143.239 215.217.1.51
246.54.26.170 67.84.19.157 157.253.146.21 189.225.82.212