必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Norway

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 152.94.4.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20322
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;152.94.4.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 17:59:43 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 149.4.94.152.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.4.94.152.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.33.12.100 attack
Nov 11 08:29:37 SilenceServices sshd[5805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.33.12.100
Nov 11 08:29:39 SilenceServices sshd[5805]: Failed password for invalid user 1233567 from 112.33.12.100 port 54826 ssh2
Nov 11 08:34:53 SilenceServices sshd[7365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.33.12.100
2019-11-11 18:27:31
23.98.151.182 attackspam
Nov 11 11:28:50 server sshd\[11511\]: Invalid user admin from 23.98.151.182
Nov 11 11:28:50 server sshd\[11511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.98.151.182 
Nov 11 11:28:51 server sshd\[11511\]: Failed password for invalid user admin from 23.98.151.182 port 53864 ssh2
Nov 11 11:40:14 server sshd\[14778\]: Invalid user bb from 23.98.151.182
Nov 11 11:40:14 server sshd\[14778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.98.151.182 
...
2019-11-11 17:52:46
182.61.39.254 attackbotsspam
Nov 11 10:37:52 MK-Soft-VM6 sshd[12244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.39.254 
Nov 11 10:37:53 MK-Soft-VM6 sshd[12244]: Failed password for invalid user webadmin from 182.61.39.254 port 33682 ssh2
...
2019-11-11 18:19:43
185.227.188.167 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/185.227.188.167/ 
 
 PL - 1H : (127)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : PL 
 NAME ASN : ASN205146 
 
 IP : 185.227.188.167 
 
 CIDR : 185.227.188.0/22 
 
 PREFIX COUNT : 1 
 
 UNIQUE IP COUNT : 1024 
 
 
 ATTACKS DETECTED ASN205146 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-11 07:25:06 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-11 18:16:24
168.232.129.21 attack
Nov 11 06:25:44 ip-172-30-0-179 sshd\[2546\]: Invalid user admin from 168.232.129.21\
Nov 11 06:25:47 ip-172-30-0-179 sshd\[2548\]: Invalid user admin from 168.232.129.21\
Nov 11 06:25:51 ip-172-30-0-179 sshd\[2550\]: Invalid user admin from 168.232.129.21\
Nov 11 06:25:53 ip-172-30-0-179 sshd\[2552\]: Invalid user oracle from 168.232.129.21\
Nov 11 06:25:57 ip-172-30-0-179 sshd\[2554\]: Invalid user oracle from 168.232.129.21\
Nov 11 06:26:00 ip-172-30-0-179 sshd\[2556\]: Invalid user oracle from 168.232.129.21\
2019-11-11 17:48:05
103.253.42.48 attackspambots
2019-11-11 dovecot_login authenticator failed for \(User\) \[103.253.42.48\]: 535 Incorrect authentication data \(set_id=microsoft\)
2019-11-11 dovecot_login authenticator failed for \(User\) \[103.253.42.48\]: 535 Incorrect authentication data \(set_id=security\)
2019-11-11 dovecot_login authenticator failed for \(User\) \[103.253.42.48\]: 535 Incorrect authentication data \(set_id=azerty\)
2019-11-11 18:05:23
173.239.37.163 attack
Repeated brute force against a port
2019-11-11 18:06:37
106.13.56.72 attack
Nov 11 09:29:41 * sshd[762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.56.72
Nov 11 09:29:43 * sshd[762]: Failed password for invalid user lyon from 106.13.56.72 port 38024 ssh2
2019-11-11 18:29:13
104.248.27.238 attackbotsspam
104.248.27.238 - - \[11/Nov/2019:08:04:51 +0000\] "POST /wp-login.php HTTP/1.1" 200 4358 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
104.248.27.238 - - \[11/Nov/2019:08:04:52 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-11 18:21:10
151.80.37.18 attackbots
Nov 11 06:22:03 marvibiene sshd[17350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.37.18  user=root
Nov 11 06:22:05 marvibiene sshd[17350]: Failed password for root from 151.80.37.18 port 42680 ssh2
Nov 11 06:43:08 marvibiene sshd[17711]: Invalid user keiffenheim from 151.80.37.18 port 55744
...
2019-11-11 18:04:07
49.232.51.237 attackbotsspam
Nov 10 22:00:52 web1 sshd\[28025\]: Invalid user dicitionar from 49.232.51.237
Nov 10 22:00:52 web1 sshd\[28025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.51.237
Nov 10 22:00:55 web1 sshd\[28025\]: Failed password for invalid user dicitionar from 49.232.51.237 port 52514 ssh2
Nov 10 22:05:12 web1 sshd\[28427\]: Invalid user mjunhyg from 49.232.51.237
Nov 10 22:05:12 web1 sshd\[28427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.51.237
2019-11-11 18:28:24
91.121.157.83 attackbots
Tried sshing with brute force.
2019-11-11 17:52:08
200.225.140.130 attackbots
Unauthorized IMAP connection attempt
2019-11-11 18:11:37
192.144.187.10 attack
2019-11-11 05:11:52,381 fail2ban.actions        [4151]: NOTICE  [sshd] Ban 192.144.187.10
2019-11-11 06:19:31,365 fail2ban.actions        [4151]: NOTICE  [sshd] Ban 192.144.187.10
2019-11-11 07:25:11,626 fail2ban.actions        [4151]: NOTICE  [sshd] Ban 192.144.187.10
...
2019-11-11 18:12:03
157.230.248.89 attack
157.230.248.89 has been banned for [WebApp Attack]
...
2019-11-11 18:07:49

最近上报的IP列表

31.128.214.99 96.8.15.229 187.222.135.7 94.216.161.196
119.44.209.214 57.211.227.61 202.160.197.164 129.159.5.90
26.227.49.218 225.226.103.249 205.215.176.36 53.96.17.192
67.77.136.66 122.14.167.214 77.143.175.227 37.132.4.227
16.187.10.207 107.40.13.77 90.233.151.120 119.207.40.245