必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea Republic of

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 152.149.21.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46665
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;152.149.21.109.			IN	A

;; AUTHORITY SECTION:
.			459	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122600 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 27 01:06:22 CST 2021
;; MSG SIZE  rcvd: 107
HOST信息:
Host 109.21.149.152.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 109.21.149.152.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.14.251.179 attack
Autoban   45.14.251.179 AUTH/CONNECT
2020-04-29 22:31:47
222.186.180.147 attackbots
2020-04-29T14:47:37.249652shield sshd\[5438\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.147  user=root
2020-04-29T14:47:39.094866shield sshd\[5438\]: Failed password for root from 222.186.180.147 port 45282 ssh2
2020-04-29T14:47:42.470113shield sshd\[5438\]: Failed password for root from 222.186.180.147 port 45282 ssh2
2020-04-29T14:47:45.717427shield sshd\[5438\]: Failed password for root from 222.186.180.147 port 45282 ssh2
2020-04-29T14:47:58.499372shield sshd\[5528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.147  user=root
2020-04-29 22:53:07
111.229.226.212 attackbots
$f2bV_matches
2020-04-29 22:27:45
45.143.220.216 attackspambots
[2020-04-29 10:42:52] NOTICE[1170][C-000081c1] chan_sip.c: Call from '' (45.143.220.216:63541) to extension '80140046192777658' rejected because extension not found in context 'public'.
[2020-04-29 10:42:52] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-29T10:42:52.590-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="80140046192777658",SessionID="0x7f6c087c6998",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.216/63541",ACLName="no_extension_match"
[2020-04-29 10:42:54] NOTICE[1170][C-000081c2] chan_sip.c: Call from '' (45.143.220.216:56017) to extension '80150046192777658' rejected because extension not found in context 'public'.
[2020-04-29 10:42:54] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-29T10:42:54.134-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="80150046192777658",SessionID="0x7f6c086a7518",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress
...
2020-04-29 22:50:46
187.32.140.225 attack
Unauthorized connection attempt from IP address 187.32.140.225 on Port 445(SMB)
2020-04-29 22:17:46
84.56.165.135 attackbotsspam
Lines containing failures of 84.56.165.135
Apr 29 13:52:16 keyhelp sshd[21290]: Invalid user cpanel from 84.56.165.135 port 43717
Apr 29 13:52:16 keyhelp sshd[21290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.56.165.135
Apr 29 13:52:18 keyhelp sshd[21290]: Failed password for invalid user cpanel from 84.56.165.135 port 43717 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=84.56.165.135
2020-04-29 22:26:24
101.78.149.142 attackbotsspam
k+ssh-bruteforce
2020-04-29 22:15:20
36.48.144.246 attackbotsspam
$f2bV_matches
2020-04-29 22:24:12
109.72.193.108 attackbots
Firewall Dropped Connection
2020-04-29 22:42:36
141.98.9.157 attack
Apr 29 10:35:48 firewall sshd[3987]: Invalid user admin from 141.98.9.157
Apr 29 10:35:50 firewall sshd[3987]: Failed password for invalid user admin from 141.98.9.157 port 40061 ssh2
Apr 29 10:36:19 firewall sshd[4008]: Invalid user test from 141.98.9.157
...
2020-04-29 22:20:19
92.241.78.114 attack
Unauthorized connection attempt from IP address 92.241.78.114 on Port 445(SMB)
2020-04-29 22:38:00
113.179.25.43 attackspam
Unauthorized connection attempt from IP address 113.179.25.43 on Port 445(SMB)
2020-04-29 22:27:24
188.166.226.209 attackbots
Apr 29 15:53:16 markkoudstaal sshd[30343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.226.209
Apr 29 15:53:17 markkoudstaal sshd[30343]: Failed password for invalid user sisi from 188.166.226.209 port 35860 ssh2
Apr 29 15:56:01 markkoudstaal sshd[30821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.226.209
2020-04-29 22:21:02
92.239.176.230 attackspambots
Apr 29 15:19:49 ArkNodeAT sshd\[1625\]: Invalid user guest from 92.239.176.230
Apr 29 15:19:49 ArkNodeAT sshd\[1625\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.239.176.230
Apr 29 15:19:51 ArkNodeAT sshd\[1625\]: Failed password for invalid user guest from 92.239.176.230 port 58564 ssh2
2020-04-29 22:44:20
51.178.60.227 attackbots
2020-04-29T16:21:12.686854  sshd[29173]: Invalid user sysbackup from 51.178.60.227 port 42916
2020-04-29T16:21:12.699399  sshd[29173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.60.227
2020-04-29T16:21:12.686854  sshd[29173]: Invalid user sysbackup from 51.178.60.227 port 42916
2020-04-29T16:21:14.951902  sshd[29173]: Failed password for invalid user sysbackup from 51.178.60.227 port 42916 ssh2
...
2020-04-29 22:52:27

最近上报的IP列表

231.148.54.23 45.124.98.246 245.162.111.35 172.120.156.36
95.206.2.132 188.176.41.212 207.233.245.48 229.64.28.51
202.7.36.25 9.240.163.22 23.216.38.169 249.156.104.35
76.186.67.24 146.8.183.241 41.132.210.146 237.32.198.8
166.89.52.32 221.210.111.102 165.17.121.165 222.200.145.76