必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.12.251.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6774
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.12.251.148.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031200 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 12 19:59:10 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 148.251.12.164.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.251.12.164.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
89.234.157.254 attackspam
Oct 11 23:36:36 *** sshd[17040]: Failed password for invalid user acoustics from 89.234.157.254 port 44485 ssh2
Oct 11 23:36:38 *** sshd[17040]: Failed password for invalid user acoustics from 89.234.157.254 port 44485 ssh2
Oct 11 23:36:40 *** sshd[17040]: Failed password for invalid user acoustics from 89.234.157.254 port 44485 ssh2
Oct 11 23:36:42 *** sshd[17040]: Failed password for invalid user acoustics from 89.234.157.254 port 44485 ssh2
Oct 11 23:36:45 *** sshd[17040]: Failed password for invalid user acoustics from 89.234.157.254 port 44485 ssh2
Oct 11 23:36:47 *** sshd[17040]: Failed password for invalid user acoustics from 89.234.157.254 port 44485 ssh2
Oct 11 23:40:56 *** sshd[17180]: Failed password for invalid user adam from 89.234.157.254 port 39965 ssh2
Oct 11 23:40:59 *** sshd[17180]: Failed password for invalid user adam from 89.234.157.254 port 39965 ssh2
Oct 11 23:41:02 *** sshd[17180]: Failed password for invalid user adam from 89.234.157.254 port 39965 ssh2
Oct 11 23:41:04 *** sshd[17180]
2019-10-13 06:21:44
185.136.207.194 attackspam
WordPress wp-login brute force :: 185.136.207.194 0.120 BYPASS [13/Oct/2019:01:04:12  1100] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-13 06:24:58
49.232.51.237 attackspam
Oct 13 00:05:23 * sshd[2042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.51.237
Oct 13 00:05:24 * sshd[2042]: Failed password for invalid user CDE#@WSXZAQ! from 49.232.51.237 port 56314 ssh2
2019-10-13 06:15:10
187.63.73.56 attackspam
2019-10-12T16:46:42.925788shield sshd\[5164\]: Invalid user Bacon2017 from 187.63.73.56 port 34640
2019-10-12T16:46:42.931998shield sshd\[5164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.63.73.56
2019-10-12T16:46:44.953490shield sshd\[5164\]: Failed password for invalid user Bacon2017 from 187.63.73.56 port 34640 ssh2
2019-10-12T16:51:52.922014shield sshd\[6002\]: Invalid user Testing@2017 from 187.63.73.56 port 46062
2019-10-12T16:51:52.927812shield sshd\[6002\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.63.73.56
2019-10-13 06:15:23
72.30.35.10 attack
Unsolicited bulk porn & phishing - varying ISPs (primarily Chinanet); repetitive redirects from blacklisted IP 92.63.192.124 & .151; spam volume up to 15/day.  

Unsolicited bulk spam - u-gun.co.jp, CHINANET NeiMengGu province network - 1.183.152.253

Sender domain hekimpor.com = 212.252.63.11 Tellcom Customer LAN

Repetitive reply-to in this spam series.
Reply-To: nanikarige@yahoo.com

Spam series change: no phishing redirect spam link.  Malicious attachment - Outlook blocked access to unsafe attachment: 22.jpg
2019-10-13 06:06:02
178.128.21.38 attack
Oct 13 00:25:36 vps691689 sshd[21799]: Failed password for root from 178.128.21.38 port 36592 ssh2
Oct 13 00:29:47 vps691689 sshd[21855]: Failed password for root from 178.128.21.38 port 47966 ssh2
...
2019-10-13 06:42:52
43.245.223.179 attackspam
WordPress brute force
2019-10-13 06:09:47
5.188.84.65 attackbots
2019-10-12 14:05:46 UTC | BrantVew | lev.ospanov@mail.ru | https://www.gaffney-kroese.com/cbd/purchase-generic-moxie-cbd-dark-chocolate-on-line/index.html | 5.188.84.65 | Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.84 Safari/537.36 | Teaching should file positioning, preventing infection, feeding, promoting urinary elimination through washed on-and-off catheterization, preventing latex allergy, and identifying the signs and symptoms of complications such as increased ICP. In uniting, it contains enzymatic families and reactions from 2,185 organisms including five trypanosomatids (L. The prediction is bumbling, admitting that some success has occurred with original, litigious treatment and with the advance |
2019-10-13 06:05:17
42.52.134.217 attack
Unauthorised access (Oct 12) SRC=42.52.134.217 LEN=40 TTL=49 ID=24034 TCP DPT=8080 WINDOW=64323 SYN 
Unauthorised access (Oct 12) SRC=42.52.134.217 LEN=40 TTL=49 ID=10713 TCP DPT=8080 WINDOW=52345 SYN
2019-10-13 06:04:05
37.49.231.104 attackbots
10/13/2019-00:30:01.251511 37.49.231.104 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 35
2019-10-13 06:32:05
167.71.234.130 attackspam
167.71.234.130 - - [12/Oct/2019:19:28:59 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.71.234.130 - - [12/Oct/2019:19:29:01 +0200] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.71.234.130 - - [12/Oct/2019:19:29:01 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.71.234.130 - - [12/Oct/2019:19:29:02 +0200] "POST /wp-login.php HTTP/1.1" 200 1489 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.71.234.130 - - [12/Oct/2019:19:29:03 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.71.234.130 - - [12/Oct/2019:19:29:04 +0200] "POST /wp-login.php HTTP/1.1" 200 1491 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-10-13 06:24:18
68.183.142.240 attackspam
Oct 12 12:10:04 kapalua sshd\[24297\]: Invalid user JeanPaul123 from 68.183.142.240
Oct 12 12:10:04 kapalua sshd\[24297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.142.240
Oct 12 12:10:06 kapalua sshd\[24297\]: Failed password for invalid user JeanPaul123 from 68.183.142.240 port 37570 ssh2
Oct 12 12:12:56 kapalua sshd\[24600\]: Invalid user Rouge-123 from 68.183.142.240
Oct 12 12:12:56 kapalua sshd\[24600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.142.240
2019-10-13 06:18:05
39.164.161.49 attackbots
Port 1433 Scan
2019-10-13 06:29:29
117.66.27.205 attackbotsspam
19/10/12@10:04:24: FAIL: IoT-Telnet address from=117.66.27.205
...
2019-10-13 06:20:37
112.172.147.34 attackspam
Oct 13 00:20:42 meumeu sshd[12741]: Failed password for root from 112.172.147.34 port 27426 ssh2
Oct 13 00:25:21 meumeu sshd[13497]: Failed password for root from 112.172.147.34 port 10691 ssh2
...
2019-10-13 06:35:17

最近上报的IP列表

157.215.17.11 174.66.226.58 99.149.220.221 64.184.252.169
231.242.235.168 54.227.20.153 131.195.73.204 161.175.11.135
240.165.5.21 163.95.189.253 129.151.170.243 198.157.203.66
244.227.23.104 229.22.33.70 188.89.241.135 151.19.211.170
231.178.50.153 125.98.240.168 120.255.29.4 143.218.179.143