必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Frankfurt am Main

省份(region): Hessen

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.40.56.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17026
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.40.56.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025111002 1800 900 604800 86400

;; Query time: 175 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 11 10:51:48 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
b'20.56.40.149.in-addr.arpa domain name pointer unn-149-40-56-20.datapacket.com.
'
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.56.40.149.in-addr.arpa	name = unn-149-40-56-20.datapacket.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
193.112.201.118 attackbotsspam
Lines containing failures of 193.112.201.118
Nov 23 21:26:16 zabbix sshd[97115]: Invalid user fake from 193.112.201.118 port 49732
Nov 23 21:26:16 zabbix sshd[97115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.201.118
Nov 23 21:26:18 zabbix sshd[97115]: Failed password for invalid user fake from 193.112.201.118 port 49732 ssh2
Nov 23 21:26:18 zabbix sshd[97115]: Received disconnect from 193.112.201.118 port 49732:11: Bye Bye [preauth]
Nov 23 21:26:18 zabbix sshd[97115]: Disconnected from invalid user fake 193.112.201.118 port 49732 [preauth]
Nov 23 21:51:22 zabbix sshd[98871]: Invalid user rasey from 193.112.201.118 port 58658
Nov 23 21:51:22 zabbix sshd[98871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.201.118
Nov 23 21:51:25 zabbix sshd[98871]: Failed password for invalid user rasey from 193.112.201.118 port 58658 ssh2
Nov 23 21:51:25 zabbix sshd[98871]: Received ........
------------------------------
2019-11-24 16:42:02
45.82.153.78 attackbotsspam
2019-11-2405:35:01dovecot_loginauthenticatorfailedfor\([45.82.153.78]\)[45.82.153.78]:23262:535Incorrectauthenticationdata\(set_id=indystorm@shakary.com\)2019-11-2405:35:16dovecot_loginauthenticatorfailedfor\([45.82.153.78]\)[45.82.153.78]:44276:535Incorrectauthenticationdata2019-11-2405:35:30dovecot_loginauthenticatorfailedfor\([45.82.153.78]\)[45.82.153.78]:58658:535Incorrectauthenticationdata2019-11-2405:35:47dovecot_loginauthenticatorfailedfor\([45.82.153.78]\)[45.82.153.78]:12556:535Incorrectauthenticationdata2019-11-2405:35:57dovecot_loginauthenticatorfailedfor\([45.82.153.78]\)[45.82.153.78]:10578:535Incorrectauthenticationdata2019-11-2405:36:10dovecot_loginauthenticatorfailedfor\([45.82.153.78]\)[45.82.153.78]:7060:535Incorrectauthenticationdata2019-11-2405:36:12dovecot_loginauthenticatorfailedfor\([45.82.153.78]\)[45.82.153.78]:2200:535Incorrectauthenticationdata2019-11-2405:36:20dovecot_loginauthenticatorfailedfor\([45.82.153.78]\)[45.82.153.78]:21562:535Incorrectauthenticationdata
2019-11-24 16:54:14
63.88.23.136 attack
63.88.23.136 was recorded 7 times by 5 hosts attempting to connect to the following ports: 80. Incident counter (4h, 24h, all-time): 7, 39, 565
2019-11-24 16:46:45
37.110.60.104 attack
Nov 24 09:26:30 server sshd\[29892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=broadband-37-110-60-104.ip.moscow.rt.ru  user=root
Nov 24 09:26:32 server sshd\[29892\]: Failed password for root from 37.110.60.104 port 59313 ssh2
Nov 24 09:26:34 server sshd\[29892\]: Failed password for root from 37.110.60.104 port 59313 ssh2
Nov 24 09:26:36 server sshd\[29892\]: Failed password for root from 37.110.60.104 port 59313 ssh2
Nov 24 09:26:37 server sshd\[29892\]: Failed password for root from 37.110.60.104 port 59313 ssh2
...
2019-11-24 16:45:45
45.136.109.174 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-24 17:06:16
118.24.195.74 attackspam
Nov 24 09:43:15 MK-Soft-VM5 sshd[12876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.195.74 
Nov 24 09:43:17 MK-Soft-VM5 sshd[12876]: Failed password for invalid user 33333333 from 118.24.195.74 port 39022 ssh2
...
2019-11-24 17:07:45
209.17.97.74 attack
209.17.97.74 was recorded 12 times by 12 hosts attempting to connect to the following ports: 5908,2222,4786,9200,8081,5907,5902,10443,554,990,987,62078. Incident counter (4h, 24h, all-time): 12, 44, 675
2019-11-24 16:38:50
87.251.252.22 attack
Automatic report - Banned IP Access
2019-11-24 16:36:14
42.51.204.24 attack
Nov 24 09:53:31 markkoudstaal sshd[5363]: Failed password for root from 42.51.204.24 port 35790 ssh2
Nov 24 09:58:27 markkoudstaal sshd[5806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.51.204.24
Nov 24 09:58:30 markkoudstaal sshd[5806]: Failed password for invalid user mariah from 42.51.204.24 port 49633 ssh2
2019-11-24 16:59:46
109.70.100.28 attack
fail2ban honeypot
2019-11-24 16:30:38
95.54.130.94 attack
Lines containing failures of 95.54.130.94
Nov 24 07:05:19 shared07 sshd[5972]: Invalid user admin from 95.54.130.94 port 47174
Nov 24 07:05:19 shared07 sshd[5972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.54.130.94
Nov 24 07:05:21 shared07 sshd[5972]: Failed password for invalid user admin from 95.54.130.94 port 47174 ssh2
Nov 24 07:05:21 shared07 sshd[5972]: Connection closed by invalid user admin 95.54.130.94 port 47174 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=95.54.130.94
2019-11-24 17:08:40
104.154.140.39 attackspam
Port scan on 3 port(s): 2375 2376 2377
2019-11-24 16:34:03
148.70.33.136 attackbots
Nov 23 21:57:20 kapalua sshd\[7583\]: Invalid user husevaag from 148.70.33.136
Nov 23 21:57:20 kapalua sshd\[7583\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.33.136
Nov 23 21:57:22 kapalua sshd\[7583\]: Failed password for invalid user husevaag from 148.70.33.136 port 58906 ssh2
Nov 23 22:05:29 kapalua sshd\[8217\]: Invalid user corinna from 148.70.33.136
Nov 23 22:05:29 kapalua sshd\[8217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.33.136
2019-11-24 16:34:18
123.201.20.30 attackspam
Nov 23 22:48:14 web1 sshd\[28832\]: Invalid user Jewel from 123.201.20.30
Nov 23 22:48:14 web1 sshd\[28832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.201.20.30
Nov 23 22:48:16 web1 sshd\[28832\]: Failed password for invalid user Jewel from 123.201.20.30 port 40495 ssh2
Nov 23 22:55:41 web1 sshd\[29498\]: Invalid user keisha from 123.201.20.30
Nov 23 22:55:41 web1 sshd\[29498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.201.20.30
2019-11-24 16:56:16
80.82.70.239 attackbots
Fail2Ban Ban Triggered
2019-11-24 16:52:50

最近上报的IP列表

124.23.133.16 147.185.132.174 219.136.104.163 82.146.183.213
147.185.132.223 52.27.246.218 45.135.232.237 95.111.248.83
118.24.50.211 103.149.244.6 2409:8a04:a823:0:fe84:17ff:feec:bd37 2408:841d:8af4:1d58:ec3b:61ff:febf:8010
111.226.204.49 36.99.136.148 192.168.244.34 164.92.138.56
119.249.100.43 24.184.224.211 45.76.230.22 75.153.156.5