必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Austria

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.80.49.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42560
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;193.80.49.41.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020700 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 19:06:29 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 41.49.80.193.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 41.49.80.193.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.30.218 attackspambots
Unauthorized connection attempt detected from IP address 222.186.30.218 to port 22 [T]
2020-04-25 00:54:40
180.180.170.202 attackbotsspam
failed_logins
2020-04-25 00:56:25
162.243.237.90 attackbots
Apr 24 16:07:26 santamaria sshd\[23992\]: Invalid user test from 162.243.237.90
Apr 24 16:07:26 santamaria sshd\[23992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.237.90
Apr 24 16:07:28 santamaria sshd\[23992\]: Failed password for invalid user test from 162.243.237.90 port 36559 ssh2
...
2020-04-25 00:19:16
106.12.195.99 attack
Apr 24 14:31:03 vps647732 sshd[16746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.195.99
Apr 24 14:31:05 vps647732 sshd[16746]: Failed password for invalid user jira from 106.12.195.99 port 39120 ssh2
...
2020-04-25 00:37:33
43.245.222.88 attack
Apr 24 14:04:05 debian-2gb-nbg1-2 kernel: \[9988789.659083\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=43.245.222.88 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=18850 PROTO=TCP SPT=45497 DPT=13654 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-25 01:02:04
221.141.110.215 attackbots
2020-04-24T12:51:09.035489abusebot-8.cloudsearch.cf sshd[29845]: Invalid user hei from 221.141.110.215 port 38294
2020-04-24T12:51:09.045311abusebot-8.cloudsearch.cf sshd[29845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.141.110.215
2020-04-24T12:51:09.035489abusebot-8.cloudsearch.cf sshd[29845]: Invalid user hei from 221.141.110.215 port 38294
2020-04-24T12:51:10.814589abusebot-8.cloudsearch.cf sshd[29845]: Failed password for invalid user hei from 221.141.110.215 port 38294 ssh2
2020-04-24T12:56:51.743516abusebot-8.cloudsearch.cf sshd[30369]: Invalid user cam from 221.141.110.215 port 60922
2020-04-24T12:56:51.752362abusebot-8.cloudsearch.cf sshd[30369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.141.110.215
2020-04-24T12:56:51.743516abusebot-8.cloudsearch.cf sshd[30369]: Invalid user cam from 221.141.110.215 port 60922
2020-04-24T12:56:53.805363abusebot-8.cloudsearch.cf sshd[30369]: Fa
...
2020-04-25 00:35:24
106.13.90.60 attack
Apr 24 11:54:30 v2hgb sshd[19061]: Invalid user db2fenc from 106.13.90.60 port 57750
Apr 24 11:54:30 v2hgb sshd[19061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.90.60 
Apr 24 11:54:32 v2hgb sshd[19061]: Failed password for invalid user db2fenc from 106.13.90.60 port 57750 ssh2
Apr 24 11:54:33 v2hgb sshd[19061]: Received disconnect from 106.13.90.60 port 57750:11: Bye Bye [preauth]
Apr 24 11:54:33 v2hgb sshd[19061]: Disconnected from invalid user db2fenc 106.13.90.60 port 57750 [preauth]
Apr 24 11:55:58 v2hgb sshd[19194]: Invalid user larry from 106.13.90.60 port 42342
Apr 24 11:55:58 v2hgb sshd[19194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.90.60 
Apr 24 11:56:00 v2hgb sshd[19194]: Failed password for invalid user larry from 106.13.90.60 port 42342 ssh2
Apr 24 11:56:01 v2hgb sshd[19194]: Received disconnect from 106.13.90.60 port 42342:11: Bye Bye [preauth]
Apr ........
-------------------------------
2020-04-25 00:56:09
85.51.12.244 attackbots
Apr 24 15:51:08 vpn01 sshd[27258]: Failed password for root from 85.51.12.244 port 57054 ssh2
...
2020-04-25 00:48:12
176.31.250.160 attack
Brute-force attempt banned
2020-04-25 00:27:32
122.51.102.227 attackspam
This client attempted to login to an administrator account on a Website, or abused from another resource.
2020-04-25 00:22:09
140.143.88.129 attack
2020-04-24T18:45:46.066195centos sshd[14220]: Failed password for invalid user bing from 140.143.88.129 port 57280 ssh2
2020-04-24T18:48:51.744272centos sshd[14507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.88.129  user=root
2020-04-24T18:48:53.105049centos sshd[14507]: Failed password for root from 140.143.88.129 port 60784 ssh2
...
2020-04-25 01:00:19
112.85.42.195 attack
Apr 24 16:49:14 game-panel sshd[28328]: Failed password for root from 112.85.42.195 port 38072 ssh2
Apr 24 16:50:31 game-panel sshd[28378]: Failed password for root from 112.85.42.195 port 40578 ssh2
2020-04-25 01:00:02
52.130.78.7 attack
notenfalter.de 52.130.78.7 [24/Apr/2020:14:05:07 +0200] "POST /wp-login.php HTTP/1.1" 200 6179 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
notenfalter.de 52.130.78.7 [24/Apr/2020:14:05:09 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-25 00:18:10
106.198.47.163 attackbotsspam
Trolling for resource vulnerabilities
2020-04-25 00:36:10
191.235.93.236 attackbots
Apr 24 16:50:59 mail sshd\[12944\]: Invalid user download from 191.235.93.236
Apr 24 16:50:59 mail sshd\[12944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235.93.236
Apr 24 16:51:01 mail sshd\[12944\]: Failed password for invalid user download from 191.235.93.236 port 60094 ssh2
...
2020-04-25 00:42:20

最近上报的IP列表

151.42.173.119 50.201.147.59 89.191.144.98 99.58.67.179
53.93.216.120 176.19.161.26 244.48.248.190 205.114.15.137
93.101.53.134 92.146.175.135 246.126.97.21 95.190.140.88
193.38.190.155 67.156.39.20 138.46.246.55 98.11.103.229
241.60.117.217 220.235.124.79 96.232.31.62 67.118.140.106