必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.42.194.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41933
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.42.194.197.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 82 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 15:08:28 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 197.194.42.149.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 197.194.42.149.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
211.136.105.74 attack
Sep 24 17:14:57 heissa sshd\[14741\]: Invalid user mbari-qa from 211.136.105.74 port 35221
Sep 24 17:14:57 heissa sshd\[14741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.136.105.74
Sep 24 17:14:59 heissa sshd\[14741\]: Failed password for invalid user mbari-qa from 211.136.105.74 port 35221 ssh2
Sep 24 17:20:04 heissa sshd\[15256\]: Invalid user odroid from 211.136.105.74 port 51976
Sep 24 17:20:04 heissa sshd\[15256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.136.105.74
2019-09-25 02:47:15
45.224.106.171 attack
Sep 24 14:39:04 dev sshd\[11031\]: Invalid user admin from 45.224.106.171 port 58692
Sep 24 14:39:04 dev sshd\[11031\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.224.106.171
Sep 24 14:39:06 dev sshd\[11031\]: Failed password for invalid user admin from 45.224.106.171 port 58692 ssh2
2019-09-25 02:44:55
87.197.166.67 attack
Sep 24 04:00:16 eddieflores sshd\[6609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static-bband-67.87-197-166.telecom.sk  user=root
Sep 24 04:00:18 eddieflores sshd\[6609\]: Failed password for root from 87.197.166.67 port 36893 ssh2
Sep 24 04:04:40 eddieflores sshd\[6967\]: Invalid user han from 87.197.166.67
Sep 24 04:04:40 eddieflores sshd\[6967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static-bband-67.87-197-166.telecom.sk
Sep 24 04:04:42 eddieflores sshd\[6967\]: Failed password for invalid user han from 87.197.166.67 port 57578 ssh2
2019-09-25 03:02:49
139.199.3.207 attackbotsspam
Sep 24 07:25:35 kapalua sshd\[19370\]: Invalid user agi from 139.199.3.207
Sep 24 07:25:35 kapalua sshd\[19370\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.3.207
Sep 24 07:25:37 kapalua sshd\[19370\]: Failed password for invalid user agi from 139.199.3.207 port 49854 ssh2
Sep 24 07:30:13 kapalua sshd\[19755\]: Invalid user oprofile from 139.199.3.207
Sep 24 07:30:13 kapalua sshd\[19755\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.3.207
2019-09-25 02:21:41
73.205.132.37 attackbots
tcp 85  80  8080  60001  82
2019-09-25 02:24:11
199.192.28.110 attackbots
Sep 24 02:53:13 sachi sshd\[7770\]: Invalid user 123456 from 199.192.28.110
Sep 24 02:53:13 sachi sshd\[7770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.192.28.110
Sep 24 02:53:15 sachi sshd\[7770\]: Failed password for invalid user 123456 from 199.192.28.110 port 58198 ssh2
Sep 24 02:57:56 sachi sshd\[8155\]: Invalid user abc123 from 199.192.28.110
Sep 24 02:57:56 sachi sshd\[8155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.192.28.110
2019-09-25 02:37:55
167.71.203.239 attackbots
Sep 23 20:51:28 euve59663 sshd[17085]: Invalid user demo from 167.71.20=
3.239
Sep 23 20:51:28 euve59663 sshd[17085]: pam_unix(sshd:auth): authenticat=
ion failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D167=
.71.203.239=20
Sep 23 20:51:31 euve59663 sshd[17085]: Failed password for invalid user=
 demo from 167.71.203.239 port 31230 ssh2
Sep 23 20:51:31 euve59663 sshd[17085]: Received disconnect from 167.71.=
203.239: 11: Bye Bye [preauth]
Sep 23 21:12:40 euve59663 sshd[21202]: Invalid user ventas from 167.71.=
203.239
Sep 23 21:12:40 euve59663 sshd[21202]: pam_unix(sshd:auth): authenticat=
ion failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D167=
.71.203.239=20
Sep 23 21:12:42 euve59663 sshd[21202]: Failed password for invalid user=
 ventas from 167.71.203.239 port 36478 ssh2
Sep 23 21:12:42 euve59663 sshd[21202]: Received disconnect from 167.71.=
203.239: 11: Bye Bye [preauth]
Sep 23 21:17:03 euve59663 sshd[21975]: Invalid user kinrys fro........
-------------------------------
2019-09-25 03:05:33
134.175.192.246 attack
ssh failed login
2019-09-25 02:20:42
129.150.70.20 attack
Sep 24 20:16:58 ArkNodeAT sshd\[29763\]: Invalid user ayush from 129.150.70.20
Sep 24 20:16:58 ArkNodeAT sshd\[29763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.150.70.20
Sep 24 20:17:00 ArkNodeAT sshd\[29763\]: Failed password for invalid user ayush from 129.150.70.20 port 32824 ssh2
2019-09-25 02:49:28
139.59.20.248 attackspambots
Sep 24 19:20:54 SilenceServices sshd[17199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.20.248
Sep 24 19:20:56 SilenceServices sshd[17199]: Failed password for invalid user cycle from 139.59.20.248 port 54016 ssh2
Sep 24 19:25:41 SilenceServices sshd[18470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.20.248
2019-09-25 03:12:48
212.110.128.74 attackbotsspam
Sep 24 08:19:09 php1 sshd\[14088\]: Invalid user imageuser from 212.110.128.74
Sep 24 08:19:09 php1 sshd\[14088\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=device.cris.net
Sep 24 08:19:11 php1 sshd\[14088\]: Failed password for invalid user imageuser from 212.110.128.74 port 35102 ssh2
Sep 24 08:26:54 php1 sshd\[15096\]: Invalid user oracle from 212.110.128.74
Sep 24 08:26:54 php1 sshd\[15096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=device.cris.net
2019-09-25 02:31:33
168.128.13.252 attack
Sep 24 08:50:29 php1 sshd\[18501\]: Invalid user zyuser from 168.128.13.252
Sep 24 08:50:29 php1 sshd\[18501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168-128-13-252-eu.mcp-services.net
Sep 24 08:50:31 php1 sshd\[18501\]: Failed password for invalid user zyuser from 168.128.13.252 port 53742 ssh2
Sep 24 08:55:05 php1 sshd\[19707\]: Invalid user user from 168.128.13.252
Sep 24 08:55:05 php1 sshd\[19707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168-128-13-252-eu.mcp-services.net
2019-09-25 03:01:41
203.167.21.223 attack
Sep 24 18:10:35 xxx sshd[15001]: Invalid user cuser from 203.167.21.223
Sep 24 18:10:37 xxx sshd[15001]: Failed password for invalid user cuser from 203.167.21.223 port 40088 ssh2
Sep 24 18:24:38 xxx sshd[15773]: Invalid user temp123 from 203.167.21.223
Sep 24 18:24:40 xxx sshd[15773]: Failed password for invalid user temp123 from 203.167.21.223 port 40176 ssh2
Sep 24 18:29:45 xxx sshd[16101]: Invalid user transfer from 203.167.21.223


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=203.167.21.223
2019-09-25 03:04:24
185.220.101.22 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-09-25 02:50:56
213.169.39.218 attackspambots
Sep 24 20:00:47 OPSO sshd\[14516\]: Invalid user tomcat from 213.169.39.218 port 43596
Sep 24 20:00:47 OPSO sshd\[14516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.169.39.218
Sep 24 20:00:49 OPSO sshd\[14516\]: Failed password for invalid user tomcat from 213.169.39.218 port 43596 ssh2
Sep 24 20:05:33 OPSO sshd\[15413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.169.39.218  user=root
Sep 24 20:05:36 OPSO sshd\[15413\]: Failed password for root from 213.169.39.218 port 54070 ssh2
2019-09-25 02:21:22

最近上报的IP列表

15.60.239.156 76.174.52.168 190.153.31.179 38.198.103.142
108.126.206.217 153.83.131.135 94.77.155.56 246.255.66.6
58.139.211.93 252.115.245.90 9.141.125.225 200.81.215.183
80.102.175.244 225.95.55.204 61.4.128.222 201.24.114.203
117.242.41.141 126.54.255.194 68.229.196.5 88.45.113.0