必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Kaohsiung

省份(region): Takao

国家(country): Taiwan, China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.18.140.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22139
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;163.18.140.49.			IN	A

;; AUTHORITY SECTION:
.			142	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070101 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jul 02 00:41:23 CST 2020
;; MSG SIZE  rcvd: 117
HOST信息:
Host 49.140.18.163.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 49.140.18.163.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.92.0.173 attack
Oct  4 23:00:36 sso sshd[17012]: Failed password for root from 218.92.0.173 port 41853 ssh2
Oct  4 23:00:39 sso sshd[17012]: Failed password for root from 218.92.0.173 port 41853 ssh2
...
2020-10-05 05:01:07
35.242.214.242 attackbots
ang 35.242.214.242 [04/Oct/2020:18:56:22 "-" "POST /wp-login.php 200 2145
35.242.214.242 [04/Oct/2020:20:10:32 "-" "GET /wp-login.php 404 280
35.242.214.242 [04/Oct/2020:20:10:32 "-" "POST /wp-login.php 404 280
2020-10-05 04:45:01
124.156.102.254 attackspam
DATE:2020-10-04 17:08:03, IP:124.156.102.254, PORT:ssh SSH brute force auth (docker-dc)
2020-10-05 04:55:33
61.177.172.54 attackbotsspam
(sshd) Failed SSH login from 61.177.172.54 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  4 16:32:06 optimus sshd[7497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.54  user=root
Oct  4 16:32:06 optimus sshd[7502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.54  user=root
Oct  4 16:32:06 optimus sshd[7501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.54  user=root
Oct  4 16:32:06 optimus sshd[7499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.54  user=root
Oct  4 16:32:07 optimus sshd[7497]: Failed password for root from 61.177.172.54 port 39187 ssh2
2020-10-05 04:44:37
157.245.33.74 attackspam
$f2bV_matches
2020-10-05 04:45:23
46.221.8.142 attackbots
Lines containing failures of 46.221.8.142
Oct  3 22:26:46 mx-in-02 sshd[9218]: Did not receive identification string from 46.221.8.142 port 53006
Oct  3 22:26:50 mx-in-02 sshd[9219]: Invalid user support from 46.221.8.142 port 53423
Oct  3 22:26:50 mx-in-02 sshd[9219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.221.8.142 
Oct  3 22:26:53 mx-in-02 sshd[9219]: Failed password for invalid user support from 46.221.8.142 port 53423 ssh2
Oct  3 22:26:53 mx-in-02 sshd[9219]: Connection closed by invalid user support 46.221.8.142 port 53423 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=46.221.8.142
2020-10-05 04:38:20
122.194.229.122 attack
2020-10-04T23:49:49.459364lavrinenko.info sshd[16158]: Failed password for root from 122.194.229.122 port 54720 ssh2
2020-10-04T23:49:54.246413lavrinenko.info sshd[16158]: Failed password for root from 122.194.229.122 port 54720 ssh2
2020-10-04T23:49:59.898912lavrinenko.info sshd[16158]: Failed password for root from 122.194.229.122 port 54720 ssh2
2020-10-04T23:50:04.891243lavrinenko.info sshd[16158]: Failed password for root from 122.194.229.122 port 54720 ssh2
2020-10-04T23:50:10.344300lavrinenko.info sshd[16158]: Failed password for root from 122.194.229.122 port 54720 ssh2
...
2020-10-05 04:52:08
218.92.0.165 attack
2020-10-04T20:44:52.567379abusebot.cloudsearch.cf sshd[25557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.165  user=root
2020-10-04T20:44:54.729770abusebot.cloudsearch.cf sshd[25557]: Failed password for root from 218.92.0.165 port 44117 ssh2
2020-10-04T20:44:57.470874abusebot.cloudsearch.cf sshd[25557]: Failed password for root from 218.92.0.165 port 44117 ssh2
2020-10-04T20:44:52.567379abusebot.cloudsearch.cf sshd[25557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.165  user=root
2020-10-04T20:44:54.729770abusebot.cloudsearch.cf sshd[25557]: Failed password for root from 218.92.0.165 port 44117 ssh2
2020-10-04T20:44:57.470874abusebot.cloudsearch.cf sshd[25557]: Failed password for root from 218.92.0.165 port 44117 ssh2
2020-10-04T20:44:52.567379abusebot.cloudsearch.cf sshd[25557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.16
...
2020-10-05 04:48:35
112.85.42.151 attackspambots
$f2bV_matches
2020-10-05 04:58:53
113.111.186.59 attackspam
Oct  4 11:59:34 taivassalofi sshd[38301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.111.186.59
...
2020-10-05 04:50:28
117.131.29.87 attack
Oct  4 18:29:05 prod4 sshd\[10246\]: Failed password for root from 117.131.29.87 port 34002 ssh2
Oct  4 18:32:49 prod4 sshd\[11648\]: Failed password for root from 117.131.29.87 port 44896 ssh2
Oct  4 18:36:27 prod4 sshd\[13129\]: Failed password for root from 117.131.29.87 port 55790 ssh2
...
2020-10-05 05:01:49
182.61.2.67 attack
Oct  4 13:44:00 vps647732 sshd[17789]: Failed password for root from 182.61.2.67 port 45646 ssh2
...
2020-10-05 05:09:53
46.218.85.69 attackspam
Oct  4 18:46:16 vlre-nyc-1 sshd\[31692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.218.85.69  user=root
Oct  4 18:46:17 vlre-nyc-1 sshd\[31692\]: Failed password for root from 46.218.85.69 port 59301 ssh2
Oct  4 18:49:19 vlre-nyc-1 sshd\[31747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.218.85.69  user=root
Oct  4 18:49:22 vlre-nyc-1 sshd\[31747\]: Failed password for root from 46.218.85.69 port 46688 ssh2
Oct  4 18:51:00 vlre-nyc-1 sshd\[31793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.218.85.69  user=root
...
2020-10-05 05:09:27
112.85.42.112 attackbots
prod11
...
2020-10-05 04:36:33
213.32.78.219 attackbotsspam
5x Failed Password
2020-10-05 04:48:10

最近上报的IP列表

77.60.153.6 84.35.151.47 89.248.137.46 16.21.96.157
180.15.99.234 184.27.143.78 14.220.84.167 172.141.227.56
190.248.21.127 65.236.83.15 40.151.36.60 31.217.93.4
108.236.218.65 183.166.136.4 208.95.68.217 57.232.101.116
18.46.119.62 99.122.108.90 214.69.155.111 132.27.101.193