必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.49.8.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30376
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;154.49.8.133.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 11:07:56 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 133.8.49.154.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 133.8.49.154.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
179.53.150.142 attackspam
400 BAD REQUEST
2020-04-07 12:03:23
194.55.132.250 attack
[2020-04-07 00:27:59] NOTICE[12114][C-00002538] chan_sip.c: Call from '' (194.55.132.250:62174) to extension '46842002334' rejected because extension not found in context 'public'.
[2020-04-07 00:27:59] SECURITY[12128] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-07T00:27:59.114-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="46842002334",SessionID="0x7f020c0cfe18",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/194.55.132.250/62174",ACLName="no_extension_match"
[2020-04-07 00:28:50] NOTICE[12114][C-00002539] chan_sip.c: Call from '' (194.55.132.250:54242) to extension '01146842002334' rejected because extension not found in context 'public'.
[2020-04-07 00:28:50] SECURITY[12128] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-07T00:28:50.044-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146842002334",SessionID="0x7f020c0cfe18",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/194
...
2020-04-07 12:28:58
159.89.129.36 attack
Apr  7 00:50:41 ws12vmsma01 sshd[43026]: Invalid user guard from 159.89.129.36
Apr  7 00:50:44 ws12vmsma01 sshd[43026]: Failed password for invalid user guard from 159.89.129.36 port 45094 ssh2
Apr  7 00:54:17 ws12vmsma01 sshd[43528]: Invalid user ges from 159.89.129.36
...
2020-04-07 12:26:35
128.199.165.221 attackbotsspam
2020-04-07T05:59:54.089997v22018076590370373 sshd[31319]: Invalid user admin from 128.199.165.221 port 26420
2020-04-07T05:59:54.095697v22018076590370373 sshd[31319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.165.221
2020-04-07T05:59:54.089997v22018076590370373 sshd[31319]: Invalid user admin from 128.199.165.221 port 26420
2020-04-07T05:59:56.324930v22018076590370373 sshd[31319]: Failed password for invalid user admin from 128.199.165.221 port 26420 ssh2
2020-04-07T06:03:57.265494v22018076590370373 sshd[11919]: Invalid user http from 128.199.165.221 port 28641
...
2020-04-07 12:21:47
119.42.175.200 attackbotsspam
Apr  7 05:54:59 ns381471 sshd[23616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.42.175.200
Apr  7 05:55:01 ns381471 sshd[23616]: Failed password for invalid user houx from 119.42.175.200 port 41920 ssh2
2020-04-07 12:24:01
106.7.117.199 attackspambots
20/4/6@23:55:05: FAIL: Alarm-Network address from=106.7.117.199
20/4/6@23:55:05: FAIL: Alarm-Network address from=106.7.117.199
...
2020-04-07 12:18:14
69.229.6.52 attackspam
2020-04-07T05:14:24.212030rocketchat.forhosting.nl sshd[13839]: Invalid user ventas from 69.229.6.52 port 33050
2020-04-07T05:14:26.996151rocketchat.forhosting.nl sshd[13839]: Failed password for invalid user ventas from 69.229.6.52 port 33050 ssh2
2020-04-07T05:55:16.075816rocketchat.forhosting.nl sshd[14587]: Invalid user postgres from 69.229.6.52 port 53836
...
2020-04-07 12:01:18
74.199.108.162 attackbotsspam
Apr  7 03:47:58 ip-172-31-62-245 sshd\[6951\]: Invalid user service from 74.199.108.162\
Apr  7 03:48:00 ip-172-31-62-245 sshd\[6951\]: Failed password for invalid user service from 74.199.108.162 port 43094 ssh2\
Apr  7 03:51:41 ip-172-31-62-245 sshd\[6986\]: Failed password for ubuntu from 74.199.108.162 port 52490 ssh2\
Apr  7 03:55:11 ip-172-31-62-245 sshd\[7039\]: Invalid user wildfly from 74.199.108.162\
Apr  7 03:55:13 ip-172-31-62-245 sshd\[7039\]: Failed password for invalid user wildfly from 74.199.108.162 port 33654 ssh2\
2020-04-07 12:03:56
51.89.227.164 attack
404 NOT FOUND
2020-04-07 12:17:05
208.64.33.118 attackspambots
Apr  6 21:45:36 server1 sshd\[5366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.64.33.118 
Apr  6 21:45:38 server1 sshd\[5366\]: Failed password for invalid user admin from 208.64.33.118 port 42496 ssh2
Apr  6 21:50:19 server1 sshd\[6700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.64.33.118  user=ubuntu
Apr  6 21:50:21 server1 sshd\[6700\]: Failed password for ubuntu from 208.64.33.118 port 53106 ssh2
Apr  6 21:54:56 server1 sshd\[7946\]: Invalid user demo from 208.64.33.118
...
2020-04-07 12:25:47
118.68.226.66 attack
This sign in attempt was made on:

Device

chrome, windows nt
When

April 6, 2020 6:51:12 PM PDT
Where*

Vietnam

118.68.226.66
2020-04-07 10:09:17
103.80.36.34 attackspambots
Apr  7 08:54:20 webhost01 sshd[9488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.80.36.34
Apr  7 08:54:22 webhost01 sshd[9488]: Failed password for invalid user tom from 103.80.36.34 port 45962 ssh2
...
2020-04-07 09:54:47
185.176.27.174 attackspambots
04/06/2020-23:55:13.340663 185.176.27.174 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-04-07 12:04:45
218.92.0.168 attack
Apr  7 06:10:18 vps sshd[26188]: Failed password for root from 218.92.0.168 port 58721 ssh2
Apr  7 06:10:22 vps sshd[26188]: Failed password for root from 218.92.0.168 port 58721 ssh2
Apr  7 06:10:27 vps sshd[26188]: Failed password for root from 218.92.0.168 port 58721 ssh2
Apr  7 06:10:32 vps sshd[26188]: Failed password for root from 218.92.0.168 port 58721 ssh2
...
2020-04-07 12:12:02
118.68.226.25 attack
Tried to hack into my Yahoo account
2020-04-07 10:20:15

最近上报的IP列表

124.14.199.11 80.27.179.205 204.184.85.230 103.238.206.188
233.35.201.237 64.46.29.105 155.224.211.247 94.52.67.149
253.223.116.205 214.42.218.225 132.47.118.199 76.237.195.101
65.145.217.245 210.237.170.186 147.62.22.211 234.123.206.254
191.172.145.130 145.80.129.152 213.211.164.200 201.176.30.165