必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.149.106.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33462
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.149.106.211.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 18:42:24 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 211.106.149.20.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 211.106.149.20.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.55.242.26 attack
Jul 25 21:34:37 s64-1 sshd[5644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.242.26
Jul 25 21:34:38 s64-1 sshd[5644]: Failed password for invalid user player from 45.55.242.26 port 47159 ssh2
Jul 25 21:39:04 s64-1 sshd[5703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.242.26
...
2019-07-26 03:53:05
192.210.132.135 attackbots
3 failed attempts at connecting to SSH.
2019-07-26 03:19:40
198.50.138.230 attackspambots
Jul 25 21:42:56 meumeu sshd[27733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.138.230 
Jul 25 21:42:58 meumeu sshd[27733]: Failed password for invalid user newsletter from 198.50.138.230 port 44518 ssh2
Jul 25 21:47:21 meumeu sshd[1614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.138.230 
...
2019-07-26 03:50:33
112.85.42.87 attackspam
Jul 25 20:58:32 srv206 sshd[25936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87  user=root
Jul 25 20:58:34 srv206 sshd[25936]: Failed password for root from 112.85.42.87 port 40482 ssh2
...
2019-07-26 03:33:35
4.78.193.138 attackspambots
4.78.193.138 - - [25/Jul/2019:18:58:53 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
4.78.193.138 - - [25/Jul/2019:18:58:54 +0200] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
4.78.193.138 - - [25/Jul/2019:18:58:55 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
4.78.193.138 - - [25/Jul/2019:18:58:56 +0200] "POST /wp-login.php HTTP/1.1" 200 1489 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
4.78.193.138 - - [25/Jul/2019:18:58:57 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
4.78.193.138 - - [25/Jul/2019:18:58:57 +0200] "POST /wp-login.php HTTP/1.1" 200 1491 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-07-26 03:24:53
158.69.110.31 attackbotsspam
Automated report - ssh fail2ban:
Jul 25 20:33:10 authentication failure 
Jul 25 20:33:12 wrong password, user=wendy, port=34258, ssh2
2019-07-26 03:34:55
121.134.218.148 attackspam
Jul 25 21:01:09 s64-1 sshd[5237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.218.148
Jul 25 21:01:11 s64-1 sshd[5237]: Failed password for invalid user john1 from 121.134.218.148 port 28621 ssh2
Jul 25 21:06:06 s64-1 sshd[5290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.218.148
...
2019-07-26 03:25:34
101.79.166.108 attack
2019-07-25T19:28:30.133556abusebot-8.cloudsearch.cf sshd\[12321\]: Invalid user ghost from 101.79.166.108 port 50272
2019-07-26 03:40:10
115.159.237.70 attack
Jul 25 18:44:29 MK-Soft-VM3 sshd\[27472\]: Invalid user kobayashi from 115.159.237.70 port 59924
Jul 25 18:44:29 MK-Soft-VM3 sshd\[27472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.237.70
Jul 25 18:44:30 MK-Soft-VM3 sshd\[27472\]: Failed password for invalid user kobayashi from 115.159.237.70 port 59924 ssh2
...
2019-07-26 03:52:03
121.160.198.194 attack
SSH Brute Force, server-1 sshd[22752]: Failed password for invalid user admin from 121.160.198.194 port 50618 ssh2
2019-07-26 03:02:21
148.70.71.137 attackbotsspam
Jul 25 19:16:23 mail sshd\[24575\]: Failed password for invalid user ronaldo from 148.70.71.137 port 36081 ssh2
Jul 25 19:35:38 mail sshd\[25018\]: Invalid user git from 148.70.71.137 port 54576
...
2019-07-26 03:24:10
23.129.64.165 attackspambots
scan r
2019-07-26 03:26:36
42.117.130.32 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-26 03:14:55
78.198.69.64 attackspam
SSH Brute-Forcing (ownc)
2019-07-26 03:22:39
200.52.7.107 attackspambots
Automatic report - Port Scan Attack
2019-07-26 03:53:32

最近上报的IP列表

185.223.154.175 21.222.102.106 122.109.183.82 251.171.249.122
177.9.155.146 232.23.26.63 4.200.36.250 130.47.52.193
248.73.204.70 94.80.59.20 147.173.100.103 46.110.26.255
167.98.125.188 156.204.41.85 67.196.8.239 130.70.124.91
55.15.60.131 86.172.152.135 114.74.107.53 248.59.230.107