必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.149.102.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33588
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.149.102.64.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 23:55:11 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 64.102.149.20.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 64.102.149.20.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.91.249.178 attackbotsspam
Dec  1 17:32:49 server sshd\[17440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.ip-51-91-249.eu  user=root
Dec  1 17:32:51 server sshd\[17440\]: Failed password for root from 51.91.249.178 port 35932 ssh2
Dec  1 17:39:35 server sshd\[19063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.ip-51-91-249.eu  user=root
Dec  1 17:39:36 server sshd\[19063\]: Failed password for root from 51.91.249.178 port 37902 ssh2
Dec  1 17:42:24 server sshd\[20003\]: Invalid user ching from 51.91.249.178
Dec  1 17:42:24 server sshd\[20003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.ip-51-91-249.eu 
...
2019-12-02 01:38:28
185.143.223.147 attackbotsspam
12/01/2019-11:41:44.403809 185.143.223.147 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-02 01:27:34
218.92.0.141 attackbots
Dec  1 18:21:34 mail sshd\[1149\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.141  user=root
Dec  1 18:21:36 mail sshd\[1149\]: Failed password for root from 218.92.0.141 port 49556 ssh2
Dec  1 18:21:54 mail sshd\[1151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.141  user=root
...
2019-12-02 01:31:11
222.186.175.161 attackbotsspam
F2B jail: sshd. Time: 2019-12-01 18:34:05, Reported by: VKReport
2019-12-02 01:35:57
123.22.59.103 attack
Dec  1 15:42:06 vpn01 sshd[4909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.22.59.103
Dec  1 15:42:08 vpn01 sshd[4909]: Failed password for invalid user admin from 123.22.59.103 port 51176 ssh2
...
2019-12-02 01:48:54
185.232.67.6 attackspambots
Dec  1 17:57:22 dedicated sshd[19613]: Invalid user admin from 185.232.67.6 port 59795
2019-12-02 01:29:09
45.82.153.80 attack
2019-12-01 18:47:42 dovecot_login authenticator failed for \(\[45.82.153.80\]\) \[45.82.153.80\]: 535 Incorrect authentication data \(set_id=ms@opso.it\)
2019-12-01 18:47:54 dovecot_login authenticator failed for \(\[45.82.153.80\]\) \[45.82.153.80\]: 535 Incorrect authentication data
2019-12-01 18:48:05 dovecot_login authenticator failed for \(\[45.82.153.80\]\) \[45.82.153.80\]: 535 Incorrect authentication data
2019-12-01 18:48:23 dovecot_login authenticator failed for \(\[45.82.153.80\]\) \[45.82.153.80\]: 535 Incorrect authentication data
2019-12-01 18:48:30 dovecot_login authenticator failed for \(\[45.82.153.80\]\) \[45.82.153.80\]: 535 Incorrect authentication data
2019-12-02 01:55:55
62.234.79.230 attackbots
Brute force SMTP login attempted.
...
2019-12-02 01:29:54
148.70.136.94 attackspambots
Dec  1 17:41:39 root sshd[527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.136.94 
Dec  1 17:41:41 root sshd[527]: Failed password for invalid user server from 148.70.136.94 port 43050 ssh2
Dec  1 17:57:23 root sshd[759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.136.94 
...
2019-12-02 01:39:56
123.207.94.252 attack
Dec  1 21:46:00 gw1 sshd[4319]: Failed password for root from 123.207.94.252 port 36399 ssh2
...
2019-12-02 01:20:50
134.209.62.13 attackspam
xmlrpc attack
2019-12-02 02:02:38
80.28.70.164 attackbots
Automatic report - Port Scan Attack
2019-12-02 01:42:05
209.85.220.69 attackbots
Sending out some get laid now type spam emails
from IP 209.85.220.69  (Google.com) 

The spammer's websites are located at 

https://docs.google.com/forms/d/e/1FAIpQLSeJ6xrSPrAFWOMMXgCExIRlu7zB3VNCzARdwdlR5uedryWSvg/viewform?vc=0&c=0&w=1&usp=mail_form_link
IP: 172.217.14.206 (Google.com) 

http://meetsafes.us/meet.php
IP: 198.54.120.157 
(namecheap.com / namecheaphosting.com) 

Which redirects to 
http://getlaidsecrets.com/presales/RF_Dating_Prelanders/lp5/?aff_id=3855&aff_sub=&aff_sub2=b7c916662fd3310772724b17de49cf9f355a1344&aff_sub3=&aff_sub4=&aff_sub5=&aff_unique5=kvSq120159927&trn=102cc1db6c7aae3b42a2606c020aff
IP: 107.170.239.229 (digitalocean.com)


Which redirects to 
http://fastsecuredating.com/?page=land2/512_ac_ffriend&long=y&x_source=vip52744.46200-1973716.GSL-3855.102d7abb8fba79005993e4cf832a3e..Web.&eml=
IP: 35.174.201.165, 34.238.141.146
(amazon.com / amazonaws.com)

DO NOT go to any of these sites or buy
anything from any of these sites as it is a scam!
2019-12-02 01:54:12
122.165.207.151 attackspam
Dec  1 17:53:48 mail sshd\[30445\]: Invalid user muzio from 122.165.207.151
Dec  1 17:53:48 mail sshd\[30445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.165.207.151
Dec  1 17:53:50 mail sshd\[30445\]: Failed password for invalid user muzio from 122.165.207.151 port 19460 ssh2
...
2019-12-02 01:50:34
165.22.144.147 attackspam
Dec  1 14:08:07 zx01vmsma01 sshd[231994]: Failed password for sshd from 165.22.144.147 port 46780 ssh2
Dec  1 14:42:38 zx01vmsma01 sshd[233732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.144.147
...
2019-12-02 01:24:35

最近上报的IP列表

227.84.50.77 90.221.10.4 143.86.89.80 65.69.11.79
3.243.249.246 149.87.107.85 208.224.14.85 96.89.178.155
208.16.126.221 68.71.92.98 97.188.26.210 71.219.185.188
254.32.134.112 125.210.151.157 27.48.30.220 61.193.174.213
166.253.84.6 8.159.31.86 93.106.211.153 215.71.38.225