必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.89.39.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45506
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.89.39.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 17:06:13 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 12.39.89.149.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 12.39.89.149.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.101.164.33 attack
Sep 23 10:10:46 IngegnereFirenze sshd[11132]: User root from 46.101.164.33 not allowed because not listed in AllowUsers
...
2020-09-23 18:45:57
49.232.102.99 attackbotsspam
SSH brute force attempt
2020-09-23 19:09:12
103.60.137.117 attackbotsspam
Invalid user git from 103.60.137.117 port 45918
2020-09-23 18:43:00
223.228.248.134 attackbotsspam
Unauthorized connection attempt from IP address 223.228.248.134 on Port 445(SMB)
2020-09-23 18:36:24
180.76.245.228 attackspambots
Triggered by Fail2Ban at Ares web server
2020-09-23 18:44:31
117.184.228.6 attackspambots
Sep 23 10:54:07 vps8769 sshd[30646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.184.228.6
Sep 23 10:54:09 vps8769 sshd[30646]: Failed password for invalid user sdbadmin from 117.184.228.6 port 57888 ssh2
...
2020-09-23 18:45:03
149.34.17.27 attackspam
2020-09-22T19:08:09.574625Z 16e12f7d1f0c New connection: 149.34.17.27:58298 (172.17.0.5:2222) [session: 16e12f7d1f0c]
2020-09-22T20:06:56.552076Z 0e232710594b New connection: 149.34.17.27:56500 (172.17.0.5:2222) [session: 0e232710594b]
2020-09-23 18:59:07
182.61.3.119 attack
SSH brute-force attempt
2020-09-23 18:36:56
123.205.179.16 attack
Icarus honeypot on github
2020-09-23 18:39:06
51.91.96.96 attack
51.91.96.96 (FR/France/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 23 07:33:21 server2 sshd[12132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.96.96  user=root
Sep 23 07:11:03 server2 sshd[8506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.209.39  user=root
Sep 23 07:12:08 server2 sshd[8777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.3.28  user=root
Sep 23 07:12:10 server2 sshd[8777]: Failed password for root from 106.12.3.28 port 59468 ssh2
Sep 23 07:29:47 server2 sshd[11599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.30.53  user=root
Sep 23 07:29:49 server2 sshd[11599]: Failed password for root from 119.45.30.53 port 35768 ssh2

IP Addresses Blocked:
2020-09-23 18:46:46
201.242.108.244 attack
Brute forcing RDP port 3389
2020-09-23 18:34:03
87.96.153.47 attack
Sep 23 06:00:36 scw-focused-cartwright sshd[7014]: Failed password for root from 87.96.153.47 port 47728 ssh2
2020-09-23 18:28:48
222.244.249.90 attackspam
Automatic report - Port Scan Attack
2020-09-23 18:47:01
163.172.113.108 attackbotsspam
SSH brute force attempt
2020-09-23 18:50:25
14.240.248.215 attackbotsspam
Unauthorized connection attempt from IP address 14.240.248.215 on Port 445(SMB)
2020-09-23 19:03:54

最近上报的IP列表

244.72.141.199 186.222.153.150 122.100.95.232 89.236.231.25
59.181.58.151 13.119.26.113 120.108.88.145 230.0.142.231
89.252.62.115 83.229.241.240 83.102.48.188 228.218.243.246
239.119.179.22 85.42.240.145 125.55.114.90 122.149.90.237
141.222.180.111 255.37.193.157 31.148.169.185 145.107.151.46