必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.54.7.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47518
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.54.7.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 21:11:46 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 80.7.54.149.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 80.7.54.149.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.210.218.32 attackspambots
$f2bV_matches
2020-07-02 06:59:41
194.61.24.37 attack
=Multiport scan 256 ports : 1033 1111(x3) 1189 1290 1619 1880 2022 2033 2111 2112 2220 2289 2727 2903 3105 3108 3150 3222 3300 3301 3359 3369 3379 3386 3395 3397 3440 3551 3650 3930 3933 3950 3997 3999 4033 4445 4480 4949 5003 5033 5554 5820 5858 5910 5959 6033 6389 7000 7033 7111 7505 7514 7555 7978 8002(x2) 8033 8081 8111 8383 9005 9033 9389 9933 9956 10000(x5) 10001(x2) 10002 10003 10004 10005 10006 10007 10008 10009 10010(x2) 10011 10030(x2) 10034 10040 10050 10060 10070 10080(x2) 10088 10089(x2) 10090 10095 10099 10107 10109 10203 10222 10333(x2) 10389 10851 10961 10987 10999 11000 11009 11015 11111(x2) 11112 11119 11122 11133 11200 11220 11222 12000 12100 12220 12221 12222 12233 12300 12333 12800 13000 13030 13050 13089 13100 13300 13310 13330 13331 13333 13356(x2) 13377 13380 13386 13388 13389(x2) 13390 13391(x2) 13393 13394 13395 13396 13397(x2) 13398 13399 13500 13838 13989 14021 14100 14433 14441 14444 14489 14900 14949 15000 15050 15070 15100 15231 15400 15500 15550 15551 155....
2020-07-02 06:49:05
178.128.218.56 attackbots
Jun 30 23:12:29 localhost sshd[117847]: Invalid user dwu from 178.128.218.56 port 46244
Jun 30 23:12:29 localhost sshd[117847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.218.56
Jun 30 23:12:29 localhost sshd[117847]: Invalid user dwu from 178.128.218.56 port 46244
Jun 30 23:12:31 localhost sshd[117847]: Failed password for invalid user dwu from 178.128.218.56 port 46244 ssh2
Jun 30 23:17:08 localhost sshd[118459]: Invalid user confluence from 178.128.218.56 port 37292
...
2020-07-02 06:47:39
49.235.75.19 attackbots
2020-07-01T03:36:43.613039vps773228.ovh.net sshd[17670]: Failed password for invalid user xiaowu from 49.235.75.19 port 16973 ssh2
2020-07-01T03:40:04.169754vps773228.ovh.net sshd[17718]: Invalid user kuba from 49.235.75.19 port 3224
2020-07-01T03:40:04.187814vps773228.ovh.net sshd[17718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.75.19
2020-07-01T03:40:04.169754vps773228.ovh.net sshd[17718]: Invalid user kuba from 49.235.75.19 port 3224
2020-07-01T03:40:05.909000vps773228.ovh.net sshd[17718]: Failed password for invalid user kuba from 49.235.75.19 port 3224 ssh2
...
2020-07-02 07:00:58
192.241.226.87 attackspambots
 TCP (SYN) 192.241.226.87:44959 -> port 80, len 40
2020-07-02 06:54:05
146.185.25.183 attack
[Sat Jun 06 13:10:29 2020] - DDoS Attack From IP: 146.185.25.183 Port: 119
2020-07-02 07:36:51
132.232.68.138 attack
[ssh] SSH attack
2020-07-02 07:03:01
222.186.15.115 attackbotsspam
2020-07-01T02:33:05.397252shield sshd\[24623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115  user=root
2020-07-01T02:33:07.479480shield sshd\[24623\]: Failed password for root from 222.186.15.115 port 45128 ssh2
2020-07-01T02:33:10.064191shield sshd\[24623\]: Failed password for root from 222.186.15.115 port 45128 ssh2
2020-07-01T02:33:11.724905shield sshd\[24623\]: Failed password for root from 222.186.15.115 port 45128 ssh2
2020-07-01T02:33:27.614367shield sshd\[24657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115  user=root
2020-07-02 07:45:30
49.235.93.192 attackbotsspam
Jul  1 03:24:43 odroid64 sshd\[30590\]: User root from 49.235.93.192 not allowed because not listed in AllowUsers
Jul  1 03:24:43 odroid64 sshd\[30590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.93.192  user=root
...
2020-07-02 06:55:06
104.236.136.172 attackspam
Scanned 308 unique addresses for 2 unique TCP ports in 24 hours (ports 17786,23317)
2020-07-02 07:44:24
50.246.53.29 attackbots
Jul  1 03:43:00 inter-technics sshd[27125]: Invalid user spencer from 50.246.53.29 port 39200
Jul  1 03:43:00 inter-technics sshd[27125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.246.53.29
Jul  1 03:43:00 inter-technics sshd[27125]: Invalid user spencer from 50.246.53.29 port 39200
Jul  1 03:43:02 inter-technics sshd[27125]: Failed password for invalid user spencer from 50.246.53.29 port 39200 ssh2
Jul  1 03:48:18 inter-technics sshd[27434]: Invalid user rita from 50.246.53.29 port 43206
...
2020-07-02 07:07:52
88.250.24.183 attackspambots
Unauthorized connection attempt detected from IP address 88.250.24.183 to port 23
2020-07-02 07:06:04
134.255.254.175 attackbotsspam
Fail2Ban Ban Triggered
2020-07-02 07:28:30
103.126.172.6 attackspambots
SSH-BruteForce
2020-07-02 06:34:02
62.234.62.206 attackbots
Jun 30 21:49:44 ns382633 sshd\[1582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.62.206  user=root
Jun 30 21:49:46 ns382633 sshd\[1582\]: Failed password for root from 62.234.62.206 port 34698 ssh2
Jun 30 22:04:34 ns382633 sshd\[4454\]: Invalid user zy from 62.234.62.206 port 48776
Jun 30 22:04:34 ns382633 sshd\[4454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.62.206
Jun 30 22:04:35 ns382633 sshd\[4454\]: Failed password for invalid user zy from 62.234.62.206 port 48776 ssh2
2020-07-02 06:31:21

最近上报的IP列表

226.253.218.169 241.149.63.53 234.237.141.233 193.182.137.186
250.168.18.75 232.75.188.176 174.232.26.137 67.188.114.144
214.103.78.47 243.38.56.221 193.218.201.194 107.30.197.82
119.221.0.2 237.17.87.87 239.210.195.65 82.156.136.212
159.4.206.99 253.39.213.10 131.207.149.133 9.207.84.146