必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Czech Republic

运营商(isp): Master Internet s.r.o.

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attackbotsspam
[portscan] Port scan
2019-11-07 03:36:16
attackbotsspam
[portscan] Port scan
2019-08-15 21:21:05
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.62.148.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35549
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;149.62.148.68.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081500 1800 900 604800 86400

;; Query time: 85 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Aug 15 21:20:55 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
68.148.62.149.in-addr.arpa domain name pointer 149-62-148-68.static.masterinter.net.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
68.148.62.149.in-addr.arpa	name = 149-62-148-68.static.masterinter.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
123.31.32.150 attackspam
Nov 29 04:42:25 wbs sshd\[23458\]: Invalid user ondur from 123.31.32.150
Nov 29 04:42:25 wbs sshd\[23458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.32.150
Nov 29 04:42:27 wbs sshd\[23458\]: Failed password for invalid user ondur from 123.31.32.150 port 36224 ssh2
Nov 29 04:46:00 wbs sshd\[23796\]: Invalid user vankooten from 123.31.32.150
Nov 29 04:46:00 wbs sshd\[23796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.32.150
2019-11-29 22:48:42
51.77.73.155 attackbotsspam
Brute force attempt
2019-11-29 22:52:15
131.221.80.211 attack
Nov 29 15:56:37 meumeu sshd[1206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.221.80.211 
Nov 29 15:56:39 meumeu sshd[1206]: Failed password for invalid user zejing from 131.221.80.211 port 59713 ssh2
Nov 29 16:00:47 meumeu sshd[2164]: Failed password for root from 131.221.80.211 port 8449 ssh2
...
2019-11-29 23:13:28
137.74.115.225 attack
5x Failed Password
2019-11-29 22:58:51
139.162.122.110 attackspambots
Nov 29 15:29:02 mail sshd[26237]: Invalid user  from 139.162.122.110
Nov 29 15:29:02 mail sshd[26237]: Failed none for invalid user  from 139.162.122.110 port 44468 ssh2
...
2019-11-29 23:00:19
17.133.234.33 attackbotsspam
FW Port Scan Detected; High activity of unallowed access from 17.133.234.33: 12 in 60secs;limit is 10
2019-11-29 22:46:35
37.255.249.232 attack
Nov 29 16:14:26 ns381471 sshd[10509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.255.249.232
Nov 29 16:14:28 ns381471 sshd[10509]: Failed password for invalid user squid from 37.255.249.232 port 60128 ssh2
2019-11-29 23:18:54
106.13.52.159 attack
Nov 29 04:37:44 eddieflores sshd\[17379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.52.159  user=root
Nov 29 04:37:46 eddieflores sshd\[17379\]: Failed password for root from 106.13.52.159 port 51810 ssh2
Nov 29 04:42:32 eddieflores sshd\[17822\]: Invalid user koerper from 106.13.52.159
Nov 29 04:42:32 eddieflores sshd\[17822\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.52.159
Nov 29 04:42:34 eddieflores sshd\[17822\]: Failed password for invalid user koerper from 106.13.52.159 port 56624 ssh2
2019-11-29 22:57:47
198.98.53.79 attack
Unauthorized access detected from banned ip
2019-11-29 22:46:55
189.4.30.222 attackbotsspam
Nov 29 04:43:09 wbs sshd\[23522\]: Invalid user rosalie from 189.4.30.222
Nov 29 04:43:09 wbs sshd\[23522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.4.30.222
Nov 29 04:43:11 wbs sshd\[23522\]: Failed password for invalid user rosalie from 189.4.30.222 port 41196 ssh2
Nov 29 04:47:41 wbs sshd\[23953\]: Invalid user da132321 from 189.4.30.222
Nov 29 04:47:41 wbs sshd\[23953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.4.30.222
2019-11-29 22:58:22
46.38.144.179 attackspam
Nov 29 16:02:46 vmanager6029 postfix/smtpd\[19917\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 29 16:03:57 vmanager6029 postfix/smtpd\[19917\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-29 23:06:34
51.15.192.14 attackspam
2019-11-29T15:14:25.804101homeassistant sshd[19768]: Invalid user server from 51.15.192.14 port 35818
2019-11-29T15:14:25.810158homeassistant sshd[19768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.192.14
...
2019-11-29 23:19:28
177.103.254.24 attack
Nov 29 11:07:14 ws22vmsma01 sshd[10081]: Failed password for root from 177.103.254.24 port 60032 ssh2
Nov 29 11:29:16 ws22vmsma01 sshd[58095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.103.254.24
...
2019-11-29 22:51:24
115.23.68.239 attackbotsspam
FW Port Scan Detected; High activity of unallowed access from 115.23.68.239: 11 in 60secs;limit is 10
2019-11-29 22:44:18
61.12.38.162 attackspam
Nov 29 15:25:51 ns381471 sshd[8475]: Failed password for root from 61.12.38.162 port 35464 ssh2
2019-11-29 22:49:33

最近上报的IP列表

49.36.6.191 94.182.191.27 182.210.211.34 116.224.12.158
77.247.110.31 52.178.36.223 61.78.138.1 139.99.209.146
189.163.242.26 124.120.198.19 186.139.225.186 108.186.244.98
5.22.153.101 112.84.60.47 173.208.36.106 92.250.123.145
82.79.251.51 88.115.95.255 190.246.3.11 172.99.69.49