必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Norway

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.149.205.96
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17802
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.149.205.96.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 05:00:43 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
96.205.149.2.in-addr.arpa domain name pointer 2.149.205.96.tmi.telenormobil.no.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
96.205.149.2.in-addr.arpa	name = 2.149.205.96.tmi.telenormobil.no.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
49.70.53.79 attackbotsspam
Brute force blocker - service: proftpd1 - aantal: 25 - Thu Jan 24 07:45:09 2019
2020-02-07 04:08:40
5.189.239.188 attack
02/06/2020-11:15:52.255179 5.189.239.188 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-07 03:44:37
90.113.124.141 attack
Feb  6 21:11:45 markkoudstaal sshd[21458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.113.124.141
Feb  6 21:11:48 markkoudstaal sshd[21458]: Failed password for invalid user lex from 90.113.124.141 port 46398 ssh2
Feb  6 21:19:02 markkoudstaal sshd[22888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.113.124.141
2020-02-07 04:20:38
112.64.34.165 attackbots
Triggered by Fail2Ban at Ares web server
2020-02-07 03:56:35
121.241.244.92 attackbots
$f2bV_matches
2020-02-07 03:59:14
185.156.73.52 attackbots
02/06/2020-14:31:11.740460 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-07 03:42:26
52.212.16.132 attackspam
02/06/2020-14:57:39.505540 52.212.16.132 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-02-07 04:17:19
60.171.116.44 attackbots
Feb  6 14:34:54 xeon cyrus/imap[36338]: badlogin: [60.171.116.44] plain [SASL(-13): authentication failure: Password verification failed]
2020-02-07 03:43:40
220.176.204.91 attackspam
$f2bV_matches
2020-02-07 04:21:28
175.24.101.33 attackbotsspam
Feb  6 17:51:30 cvbnet sshd[14639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.101.33 
Feb  6 17:51:32 cvbnet sshd[14639]: Failed password for invalid user mrc from 175.24.101.33 port 49478 ssh2
...
2020-02-07 04:01:17
189.154.170.206 attackspambots
[05/Feb/2020:11:22:43 -0500] "GET / HTTP/1.1" Blank UA
2020-02-07 03:46:34
80.227.12.38 attack
$f2bV_matches
2020-02-07 03:48:07
124.112.193.46 attackspambots
Brute force blocker - service: proftpd1 - aantal: 29 - Sat Jan 19 19:45:09 2019
2020-02-07 04:22:21
120.23.105.134 attackbotsspam
Feb  6 14:35:59 ns382633 sshd\[25267\]: Invalid user bmt from 120.23.105.134 port 45904
Feb  6 14:35:59 ns382633 sshd\[25267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.23.105.134
Feb  6 14:36:01 ns382633 sshd\[25267\]: Failed password for invalid user bmt from 120.23.105.134 port 45904 ssh2
Feb  6 14:39:57 ns382633 sshd\[25580\]: Invalid user pik from 120.23.105.134 port 47358
Feb  6 14:39:57 ns382633 sshd\[25580\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.23.105.134
2020-02-07 03:46:17
211.53.209.243 attack
Feb  5 22:09:25 ns4 sshd[31116]: Invalid user coa from 211.53.209.243
Feb  5 22:09:25 ns4 sshd[31116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.53.209.243 
Feb  5 22:09:27 ns4 sshd[31116]: Failed password for invalid user coa from 211.53.209.243 port 49662 ssh2
Feb  5 22:22:36 ns4 sshd[553]: Invalid user xl from 211.53.209.243
Feb  5 22:22:36 ns4 sshd[553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.53.209.243 
Feb  5 22:22:39 ns4 sshd[553]: Failed password for invalid user xl from 211.53.209.243 port 38094 ssh2
Feb  5 22:25:00 ns4 sshd[928]: Invalid user atr from 211.53.209.243
Feb  5 22:25:00 ns4 sshd[928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.53.209.243 
Feb  5 22:25:03 ns4 sshd[928]: Failed password for invalid user atr from 211.53.209.243 port 59562 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip
2020-02-07 04:11:19

最近上报的IP列表

80.19.36.74 12.160.144.223 13.233.203.115 224.58.148.29
26.207.161.135 242.189.78.24 32.54.91.159 129.173.5.200
117.18.147.122 215.63.107.97 216.254.167.128 141.42.157.182
163.159.217.215 135.86.76.109 202.45.25.195 178.28.138.243
106.184.24.81 207.209.61.216 38.183.58.49 38.13.111.150