必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.80.104.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5275
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.80.104.46.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 21:41:23 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 46.104.80.149.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 46.104.80.149.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
27.115.58.138 attackspambots
Lines containing failures of 27.115.58.138
Jul  6 00:39:13 kmh-wmh-001-nbg01 sshd[31680]: Invalid user newuser from 27.115.58.138 port 51788
Jul  6 00:39:13 kmh-wmh-001-nbg01 sshd[31680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.115.58.138 
Jul  6 00:39:15 kmh-wmh-001-nbg01 sshd[31680]: Failed password for invalid user newuser from 27.115.58.138 port 51788 ssh2
Jul  6 00:39:16 kmh-wmh-001-nbg01 sshd[31680]: Received disconnect from 27.115.58.138 port 51788:11: Bye Bye [preauth]
Jul  6 00:39:16 kmh-wmh-001-nbg01 sshd[31680]: Disconnected from invalid user newuser 27.115.58.138 port 51788 [preauth]
Jul  6 00:47:38 kmh-wmh-001-nbg01 sshd[300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.115.58.138  user=r.r
Jul  6 00:47:41 kmh-wmh-001-nbg01 sshd[300]: Failed password for r.r from 27.115.58.138 port 57994 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=27.115.58
2020-07-06 12:04:07
111.229.68.113 attackspam
Jul  5 21:46:53 server1 sshd\[26932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.68.113 
Jul  5 21:46:55 server1 sshd\[26932\]: Failed password for invalid user es from 111.229.68.113 port 42742 ssh2
Jul  5 21:51:07 server1 sshd\[28124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.68.113  user=root
Jul  5 21:51:09 server1 sshd\[28124\]: Failed password for root from 111.229.68.113 port 60030 ssh2
Jul  5 21:55:22 server1 sshd\[29310\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.68.113  user=root
...
2020-07-06 12:00:40
49.235.240.105 attack
SSH Brute-Force attacks
2020-07-06 12:15:35
113.11.34.130 attackbotsspam
Jul  6 01:38:39 mxgate1 postfix/postscreen[22055]: CONNECT from [113.11.34.130]:53455 to [176.31.12.44]:25
Jul  6 01:38:39 mxgate1 postfix/dnsblog[22059]: addr 113.11.34.130 listed by domain zen.spamhaus.org as 127.0.0.3
Jul  6 01:38:39 mxgate1 postfix/dnsblog[22059]: addr 113.11.34.130 listed by domain zen.spamhaus.org as 127.0.0.11
Jul  6 01:38:39 mxgate1 postfix/dnsblog[22059]: addr 113.11.34.130 listed by domain zen.spamhaus.org as 127.0.0.4
Jul  6 01:38:39 mxgate1 postfix/dnsblog[22057]: addr 113.11.34.130 listed by domain cbl.abuseat.org as 127.0.0.2
Jul  6 01:38:39 mxgate1 postfix/dnsblog[22056]: addr 113.11.34.130 listed by domain bl.spamcop.net as 127.0.0.2
Jul  6 01:38:39 mxgate1 postfix/dnsblog[22058]: addr 113.11.34.130 listed by domain b.barracudacentral.org as 127.0.0.2
Jul  6 01:38:39 mxgate1 postfix/postscreen[22055]: PREGREET 18 after 0.47 from [113.11.34.130]:53455: HELO hotmail.com

Jul  6 01:38:39 mxgate1 postfix/postscreen[22055]: DNSBL rank 5 for [........
-------------------------------
2020-07-06 12:13:48
217.182.206.121 attackspambots
2020-07-05T20:07:12.9033731495-001 sshd[12767]: Failed password for invalid user mircea from 217.182.206.121 port 38296 ssh2
2020-07-05T20:10:10.0613911495-001 sshd[12852]: Invalid user office from 217.182.206.121 port 35866
2020-07-05T20:10:10.0645031495-001 sshd[12852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.ip-217-182-206.eu
2020-07-05T20:10:10.0613911495-001 sshd[12852]: Invalid user office from 217.182.206.121 port 35866
2020-07-05T20:10:12.0237441495-001 sshd[12852]: Failed password for invalid user office from 217.182.206.121 port 35866 ssh2
2020-07-05T20:13:20.2783531495-001 sshd[12957]: Invalid user realestate from 217.182.206.121 port 33440
...
2020-07-06 08:34:19
210.56.23.100 attackspambots
Jul  6 02:25:31 vps687878 sshd\[18723\]: Failed password for invalid user lhs from 210.56.23.100 port 33482 ssh2
Jul  6 02:28:05 vps687878 sshd\[19044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.56.23.100  user=root
Jul  6 02:28:07 vps687878 sshd\[19044\]: Failed password for root from 210.56.23.100 port 44746 ssh2
Jul  6 02:30:52 vps687878 sshd\[19205\]: Invalid user postgres from 210.56.23.100 port 56016
Jul  6 02:30:52 vps687878 sshd\[19205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.56.23.100
...
2020-07-06 08:53:46
35.187.218.159 attackbots
Jul  6 01:26:02 debian-2gb-nbg1-2 kernel: \[16250173.304938\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=35.187.218.159 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=231 ID=42245 PROTO=TCP SPT=42968 DPT=25118 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-06 08:56:36
213.137.179.203 attackspam
2020-07-06T00:36:58.210116shield sshd\[13693\]: Invalid user elev from 213.137.179.203 port 63771
2020-07-06T00:36:58.214240shield sshd\[13693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.137.179.203
2020-07-06T00:37:00.259173shield sshd\[13693\]: Failed password for invalid user elev from 213.137.179.203 port 63771 ssh2
2020-07-06T00:40:02.852679shield sshd\[15409\]: Invalid user oracle from 213.137.179.203 port 42669
2020-07-06T00:40:02.857388shield sshd\[15409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.137.179.203
2020-07-06 08:49:33
103.21.134.122 attackbots
Jul  6 03:30:29 vzhost sshd[2927]: reveeclipse mapping checking getaddrinfo for 122.134.21.103.ie3comms.com.au [103.21.134.122] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul  6 03:30:29 vzhost sshd[2927]: Invalid user uuuu from 103.21.134.122
Jul  6 03:30:29 vzhost sshd[2927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.21.134.122 
Jul  6 03:30:31 vzhost sshd[2927]: Failed password for invalid user uuuu from 103.21.134.122 port 46050 ssh2
Jul  6 03:41:03 vzhost sshd[5247]: reveeclipse mapping checking getaddrinfo for 122.134.21.103.ie3comms.com.au [103.21.134.122] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul  6 03:41:03 vzhost sshd[5247]: Invalid user mssql from 103.21.134.122
Jul  6 03:41:03 vzhost sshd[5247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.21.134.122 
Jul  6 03:41:05 vzhost sshd[5247]: Failed password for invalid user mssql from 103.21.134.122 port 43934 ssh2
Jul  6 03:43........
-------------------------------
2020-07-06 12:10:21
45.134.179.57 attack
Jul  6 05:55:19 debian-2gb-nbg1-2 kernel: \[16266329.291442\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.134.179.57 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=16405 PROTO=TCP SPT=47572 DPT=62845 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-06 12:05:53
92.62.131.106 attackspambots
Jul  6 05:55:15 serwer sshd\[26765\]: Invalid user build from 92.62.131.106 port 52390
Jul  6 05:55:15 serwer sshd\[26765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.62.131.106
Jul  6 05:55:17 serwer sshd\[26765\]: Failed password for invalid user build from 92.62.131.106 port 52390 ssh2
...
2020-07-06 12:04:53
113.118.12.86 attackbots
DATE:2020-07-06 01:26:18, IP:113.118.12.86, PORT:1433 - MSSQL brute force auth on a honeypot server (epe-dc)
2020-07-06 08:42:22
103.243.252.244 attack
07/05/2020-23:55:18.255539 103.243.252.244 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-07-06 12:08:38
195.154.179.3 attackbots
Jul  6 08:55:09 gw1 sshd[3130]: Failed password for sshd from 195.154.179.3 port 44550 ssh2
Jul  6 08:55:15 gw1 sshd[3130]: Failed password for sshd from 195.154.179.3 port 44550 ssh2
...
2020-07-06 12:12:26
117.50.65.85 attackspam
Jul  5 18:09:15 server1 sshd\[27354\]: Invalid user ajay from 117.50.65.85
Jul  5 18:09:15 server1 sshd\[27354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.65.85 
Jul  5 18:09:17 server1 sshd\[27354\]: Failed password for invalid user ajay from 117.50.65.85 port 36852 ssh2
Jul  5 18:12:20 server1 sshd\[28388\]: Invalid user justin from 117.50.65.85
Jul  5 18:12:20 server1 sshd\[28388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.65.85 
...
2020-07-06 08:46:23

最近上报的IP列表

237.88.223.160 207.206.49.113 91.154.26.97 97.109.169.57
38.55.38.136 199.32.19.18 169.109.82.125 42.129.255.47
237.81.228.214 40.179.47.126 184.17.189.94 180.35.45.68
186.85.23.85 245.101.223.124 208.27.86.130 57.73.21.251
12.80.30.118 61.213.233.175 172.234.253.21 54.170.46.48