必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 175.21.99.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39870
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;175.21.99.49.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 14:08:52 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
49.99.21.175.in-addr.arpa domain name pointer 49.99.21.175.adsl-pool.jlccptt.net.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
49.99.21.175.in-addr.arpa	name = 49.99.21.175.adsl-pool.jlccptt.net.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
54.38.180.185 attackbots
Invalid user cedric from 54.38.180.185 port 46004
2020-10-04 15:18:46
213.155.249.80 attackspam
5555/tcp
[2020-10-03]1pkt
2020-10-04 15:22:52
27.203.159.220 attack
8080/udp
[2020-10-03]1pkt
2020-10-04 15:42:05
193.193.229.66 attack
445/tcp 445/tcp
[2020-10-03]2pkt
2020-10-04 15:43:01
122.194.229.54 attackspambots
Oct  4 09:03:08 * sshd[13489]: Failed password for root from 122.194.229.54 port 64566 ssh2
Oct  4 09:03:22 * sshd[13489]: error: maximum authentication attempts exceeded for root from 122.194.229.54 port 64566 ssh2 [preauth]
2020-10-04 15:05:29
90.150.206.208 attackbotsspam
Port probing on unauthorized port 23
2020-10-04 15:12:31
182.112.31.85 attack
8080/udp
[2020-10-03]1pkt
2020-10-04 15:29:54
110.78.152.2 attackbotsspam
23/tcp 8080/tcp
[2020-10-01/02]2pkt
2020-10-04 15:04:31
36.81.81.40 attackbotsspam
139/tcp 445/tcp
[2020-10-01]2pkt
2020-10-04 15:08:08
35.239.143.173 attack
IP already banned
2020-10-04 15:15:25
218.92.0.250 attackbotsspam
2020-10-04T09:19:23.779111vps773228.ovh.net sshd[12535]: Failed password for root from 218.92.0.250 port 30752 ssh2
2020-10-04T09:19:27.615090vps773228.ovh.net sshd[12535]: Failed password for root from 218.92.0.250 port 30752 ssh2
2020-10-04T09:19:31.335436vps773228.ovh.net sshd[12535]: Failed password for root from 218.92.0.250 port 30752 ssh2
2020-10-04T09:19:31.337783vps773228.ovh.net sshd[12535]: error: maximum authentication attempts exceeded for root from 218.92.0.250 port 30752 ssh2 [preauth]
2020-10-04T09:19:31.337888vps773228.ovh.net sshd[12535]: Disconnecting: Too many authentication failures [preauth]
...
2020-10-04 15:25:17
89.242.123.84 attackbots
8080/tcp
[2020-10-03]1pkt
2020-10-04 15:36:18
143.110.189.168 attackspam
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: 4-scan-andrew.foma-gmail.com.
2020-10-04 15:35:58
79.115.37.21 attack
5555/tcp
[2020-10-03]1pkt
2020-10-04 15:26:47
119.45.22.71 attackspam
Oct  3 19:13:54 propaganda sshd[34250]: Connection from 119.45.22.71 port 55756 on 10.0.0.161 port 22 rdomain ""
Oct  3 19:13:55 propaganda sshd[34250]: Connection closed by 119.45.22.71 port 55756 [preauth]
2020-10-04 15:18:02

最近上报的IP列表

99.25.6.139 224.110.1.194 34.133.85.45 15.128.236.48
77.58.40.97 115.14.250.219 224.57.166.200 190.18.164.98
45.202.42.226 63.10.203.228 224.197.150.22 221.57.142.186
255.245.95.147 154.39.18.180 13.36.154.31 74.109.25.203
140.91.218.5 252.132.148.243 207.152.87.35 209.249.16.145