必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Hungary

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 152.66.142.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18115
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;152.66.142.49.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 00:22:48 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
49.142.66.152.in-addr.arpa domain name pointer nat-49.r.wlan.net.bme.hu.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
49.142.66.152.in-addr.arpa	name = nat-49.r.wlan.net.bme.hu.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
91.21.42.138 attackbots
Bruteforce detected by fail2ban
2020-07-12 23:13:46
180.246.96.6 attack
Automatic report - Port Scan Attack
2020-07-12 23:41:48
183.17.232.97 attack
20/7/12@07:57:18: FAIL: Alarm-Network address from=183.17.232.97
20/7/12@07:57:18: FAIL: Alarm-Network address from=183.17.232.97
...
2020-07-12 23:36:54
220.130.178.36 attackbotsspam
Jul 12 06:10:27 server1 sshd\[6323\]: Invalid user nixie from 220.130.178.36
Jul 12 06:10:27 server1 sshd\[6323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.178.36 
Jul 12 06:10:28 server1 sshd\[6323\]: Failed password for invalid user nixie from 220.130.178.36 port 37290 ssh2
Jul 12 06:13:48 server1 sshd\[7312\]: Invalid user nicole from 220.130.178.36
Jul 12 06:13:48 server1 sshd\[7312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.178.36 
...
2020-07-12 23:32:28
80.82.68.226 attackspambots
[MK-VM6] Blocked by UFW
2020-07-12 23:10:23
185.200.36.188 attack
Fail2Ban Ban Triggered
HTTP SQL Injection Attempt
2020-07-12 23:41:25
103.205.5.158 attackspam
Jul 12 13:58:09 debian-2gb-nbg1-2 kernel: \[16813668.882098\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=103.205.5.158 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=237 ID=12271 PROTO=TCP SPT=45778 DPT=14785 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-12 23:05:42
134.122.64.201 attackbots
Jul 12 15:37:55 vps sshd[6270]: Failed password for invalid user gaoxinchen from 134.122.64.201 port 52640 ssh2
Jul 12 15:40:52 vps sshd[22746]: Invalid user xiaowenjing from 134.122.64.201 port 49554
Jul 12 15:40:52 vps sshd[22746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.64.201
Jul 12 15:40:54 vps sshd[22746]: Failed password for invalid user xiaowenjing from 134.122.64.201 port 49554 ssh2
Jul 12 15:43:59 vps sshd[34555]: Invalid user admin from 134.122.64.201 port 46468
...
2020-07-12 23:14:50
188.40.198.250 attack
2020-07-12 23:16:44
112.85.42.172 attackspam
Jul 12 15:14:11 localhost sshd[58519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.172  user=root
Jul 12 15:14:13 localhost sshd[58519]: Failed password for root from 112.85.42.172 port 20957 ssh2
Jul 12 15:14:28 localhost sshd[58554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.172  user=root
Jul 12 15:14:30 localhost sshd[58554]: Failed password for root from 112.85.42.172 port 45794 ssh2
Jul 12 15:14:28 localhost sshd[58554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.172  user=root
Jul 12 15:14:30 localhost sshd[58554]: Failed password for root from 112.85.42.172 port 45794 ssh2
Jul 12 15:14:33 localhost sshd[58554]: Failed password for root from 112.85.42.172 port 45794 ssh2
...
2020-07-12 23:20:16
222.186.175.169 attack
(sshd) Failed SSH login from 222.186.175.169 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 12 17:02:23 amsweb01 sshd[612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
Jul 12 17:02:25 amsweb01 sshd[614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
Jul 12 17:02:25 amsweb01 sshd[612]: Failed password for root from 222.186.175.169 port 34270 ssh2
Jul 12 17:02:27 amsweb01 sshd[614]: Failed password for root from 222.186.175.169 port 9274 ssh2
Jul 12 17:02:28 amsweb01 sshd[612]: Failed password for root from 222.186.175.169 port 34270 ssh2
2020-07-12 23:04:23
103.217.243.157 attack
Jul  8 17:20:49 h1946882 sshd[22411]: reveeclipse mapping checking getaddri=
nfo for node-103-217-243-157.alliancebroadband.in [103.217.243.157] fai=
led - POSSIBLE BREAK-IN ATTEMPT!
Jul  8 17:20:49 h1946882 sshd[22411]: pam_unix(sshd:auth): authenticati=
on failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D103.=
217.243.157=20
Jul  8 17:20:51 h1946882 sshd[22411]: Failed password for invalid user =
roberts from 103.217.243.157 port 42742 ssh2
Jul  8 17:20:51 h1946882 sshd[22411]: Received disconnect from 103.217.=
243.157: 11: Bye Bye [preauth]
Jul  8 17:40:02 h1946882 sshd[23036]: reveeclipse mapping checking getaddri=
nfo for node-103-217-243-157.alliancebroadband.in [103.217.243.157] fai=
led - POSSIBLE BREAK-IN ATTEMPT!
Jul  8 17:40:02 h1946882 sshd[23036]: pam_unix(sshd:auth): authenticati=
on failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D103.=
217.243.157=20


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.217.243.15
2020-07-12 23:00:01
46.38.150.132 attackspambots
Jul 12 16:58:21 relay postfix/smtpd\[15582\]: warning: unknown\[46.38.150.132\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 12 16:58:57 relay postfix/smtpd\[14915\]: warning: unknown\[46.38.150.132\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 12 16:59:30 relay postfix/smtpd\[16042\]: warning: unknown\[46.38.150.132\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 12 17:00:06 relay postfix/smtpd\[11562\]: warning: unknown\[46.38.150.132\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 12 17:00:42 relay postfix/smtpd\[11059\]: warning: unknown\[46.38.150.132\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-12 23:00:53
12.169.248.89 attackspam
2020-07-12 23:15:40
67.205.162.223 attack
Jul 12 14:16:16 onepixel sshd[3684118]: Failed password for invalid user evstrat from 67.205.162.223 port 56306 ssh2
Jul 12 14:20:20 onepixel sshd[3686290]: Invalid user jens from 67.205.162.223 port 53482
Jul 12 14:20:20 onepixel sshd[3686290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.162.223 
Jul 12 14:20:20 onepixel sshd[3686290]: Invalid user jens from 67.205.162.223 port 53482
Jul 12 14:20:22 onepixel sshd[3686290]: Failed password for invalid user jens from 67.205.162.223 port 53482 ssh2
2020-07-12 23:09:33

最近上报的IP列表

254.11.150.14 166.226.230.26 207.181.34.251 92.32.9.162
165.85.85.86 39.50.207.172 239.198.94.98 32.215.128.171
53.172.7.83 43.222.114.41 85.46.6.3 128.199.46.178
122.115.232.135 162.130.147.144 95.126.13.59 83.213.43.194
156.131.194.207 68.218.191.196 242.12.202.204 114.118.167.116