必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Haarlem

省份(region): Noord Holland

国家(country): Netherlands

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.5.4.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18294
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.5.4.146.			IN	A

;; AUTHORITY SECTION:
.			204	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023072201 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jul 23 07:51:04 CST 2023
;; MSG SIZE  rcvd: 104
HOST信息:
146.4.5.149.in-addr.arpa domain name pointer 146-4-5-149.static.solidrdns.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
146.4.5.149.in-addr.arpa	name = 146-4-5-149.static.solidrdns.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
183.90.37.31 attackbotsspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/183.90.37.31/ 
 SG - 1H : (83)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : SG 
 NAME ASN : ASN9874 
 
 IP : 183.90.37.31 
 
 CIDR : 183.90.37.0/24 
 
 PREFIX COUNT : 91 
 
 UNIQUE IP COUNT : 245248 
 
 
 WYKRYTE ATAKI Z ASN9874 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-02 05:44:04 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-02 20:22:48
129.211.11.107 attack
Oct  2 02:28:40 hpm sshd\[22525\]: Invalid user teamspeak from 129.211.11.107
Oct  2 02:28:40 hpm sshd\[22525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.11.107
Oct  2 02:28:42 hpm sshd\[22525\]: Failed password for invalid user teamspeak from 129.211.11.107 port 58952 ssh2
Oct  2 02:35:53 hpm sshd\[23098\]: Invalid user czarek from 129.211.11.107
Oct  2 02:35:53 hpm sshd\[23098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.11.107
2019-10-02 20:51:57
103.36.102.244 attackspam
Invalid user zi from 103.36.102.244 port 52329
2019-10-02 20:24:56
222.186.42.163 attackspambots
Oct  2 12:35:57 marvibiene sshd[41959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.163  user=root
Oct  2 12:35:59 marvibiene sshd[41959]: Failed password for root from 222.186.42.163 port 48154 ssh2
Oct  2 12:36:02 marvibiene sshd[41959]: Failed password for root from 222.186.42.163 port 48154 ssh2
Oct  2 12:35:57 marvibiene sshd[41959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.163  user=root
Oct  2 12:35:59 marvibiene sshd[41959]: Failed password for root from 222.186.42.163 port 48154 ssh2
Oct  2 12:36:02 marvibiene sshd[41959]: Failed password for root from 222.186.42.163 port 48154 ssh2
...
2019-10-02 20:38:55
152.136.33.191 attack
Scanning random ports - tries to find possible vulnerable services
2019-10-02 20:24:11
51.68.230.54 attackspam
Oct  2 14:19:53 MK-Soft-VM4 sshd[21507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.230.54 
Oct  2 14:19:55 MK-Soft-VM4 sshd[21507]: Failed password for invalid user squid from 51.68.230.54 port 59990 ssh2
...
2019-10-02 20:34:52
112.175.120.152 attackspambots
3389BruteforceFW21
2019-10-02 20:52:26
167.114.157.86 attackbots
Oct  2 07:01:43 site2 sshd\[685\]: Invalid user user from 167.114.157.86Oct  2 07:01:45 site2 sshd\[685\]: Failed password for invalid user user from 167.114.157.86 port 33036 ssh2Oct  2 07:05:30 site2 sshd\[760\]: Invalid user tu from 167.114.157.86Oct  2 07:05:32 site2 sshd\[760\]: Failed password for invalid user tu from 167.114.157.86 port 51616 ssh2Oct  2 07:09:09 site2 sshd\[1039\]: Invalid user jennyfer from 167.114.157.86
...
2019-10-02 20:37:58
191.17.190.205 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/191.17.190.205/ 
 BR - 1H : (927)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN27699 
 
 IP : 191.17.190.205 
 
 CIDR : 191.17.0.0/16 
 
 PREFIX COUNT : 267 
 
 UNIQUE IP COUNT : 6569728 
 
 
 WYKRYTE ATAKI Z ASN27699 :  
  1H - 8 
  3H - 17 
  6H - 27 
 12H - 61 
 24H - 110 
 
 DateTime : 2019-10-02 05:44:04 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-02 20:22:16
58.233.185.122 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/58.233.185.122/ 
 KR - 1H : (463)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : KR 
 NAME ASN : ASN9318 
 
 IP : 58.233.185.122 
 
 CIDR : 58.232.0.0/15 
 
 PREFIX COUNT : 2487 
 
 UNIQUE IP COUNT : 14360064 
 
 
 WYKRYTE ATAKI Z ASN9318 :  
  1H - 3 
  3H - 6 
  6H - 9 
 12H - 18 
 24H - 39 
 
 DateTime : 2019-10-02 05:44:04 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-02 20:26:45
51.15.182.231 attackbotsspam
k+ssh-bruteforce
2019-10-02 20:35:22
90.48.97.114 attack
Lines containing failures of 90.48.97.114
Oct  2 11:39:58 jarvis sshd[8864]: Invalid user pi from 90.48.97.114 port 52114
Oct  2 11:39:58 jarvis sshd[8866]: Invalid user pi from 90.48.97.114 port 52120
Oct  2 11:39:58 jarvis sshd[8864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.48.97.114 
Oct  2 11:39:58 jarvis sshd[8866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.48.97.114 
Oct  2 11:40:00 jarvis sshd[8864]: Failed password for invalid user pi from 90.48.97.114 port 52114 ssh2
Oct  2 11:40:00 jarvis sshd[8866]: Failed password for invalid user pi from 90.48.97.114 port 52120 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=90.48.97.114
2019-10-02 20:25:31
176.59.64.133 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 02-10-2019 13:35:50.
2019-10-02 20:55:54
200.71.193.214 attackbotsspam
RDP Bruteforce
2019-10-02 20:21:48
130.211.246.128 attackspam
Oct  2 14:37:48 host sshd\[4582\]: Invalid user user1 from 130.211.246.128 port 58636
Oct  2 14:37:50 host sshd\[4582\]: Failed password for invalid user user1 from 130.211.246.128 port 58636 ssh2
...
2019-10-02 20:43:38

最近上报的IP列表

15.236.147.63 80.168.140.55 1.192.247.45 59.91.134.242
220.194.188.112 129.199.32.48 165.22.57.140 99.82.181.217
175.250.254.26 104.230.43.144 46.56.12.53 45.121.12.217
187.82.83.116 139.64.165.2 15.235.143.191 15.235.11.191
27.156.3.84 27.105.65.148 146.88.241.173 194.165.176.16