必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.220.49.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61665
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.220.49.44.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 18:13:58 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 44.49.220.20.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 44.49.220.20.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.175.151 attackspambots
2019-12-16T10:51:34.7952031240 sshd\[25534\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.151  user=root
2019-12-16T10:51:36.7025731240 sshd\[25534\]: Failed password for root from 222.186.175.151 port 1520 ssh2
2019-12-16T10:51:39.5959901240 sshd\[25534\]: Failed password for root from 222.186.175.151 port 1520 ssh2
...
2019-12-16 17:58:39
203.160.162.213 attackbots
Dec 16 10:10:44 ns381471 sshd[5016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.160.162.213
Dec 16 10:10:46 ns381471 sshd[5016]: Failed password for invalid user sarmiento from 203.160.162.213 port 47676 ssh2
2019-12-16 17:44:49
117.102.105.203 attackbots
Dec 16 10:46:19 ns381471 sshd[6448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.102.105.203
Dec 16 10:46:21 ns381471 sshd[6448]: Failed password for invalid user meneses from 117.102.105.203 port 39140 ssh2
2019-12-16 18:14:08
51.75.206.42 attack
Dec 16 13:03:56 microserver sshd[61560]: Invalid user hort from 51.75.206.42 port 56616
Dec 16 13:03:56 microserver sshd[61560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.206.42
Dec 16 13:03:57 microserver sshd[61560]: Failed password for invalid user hort from 51.75.206.42 port 56616 ssh2
Dec 16 13:08:41 microserver sshd[62338]: Invalid user chemiteruadmin from 51.75.206.42 port 36068
Dec 16 13:08:41 microserver sshd[62338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.206.42
Dec 16 13:23:13 microserver sshd[64696]: Invalid user pogue from 51.75.206.42 port 59280
Dec 16 13:23:13 microserver sshd[64696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.206.42
Dec 16 13:23:14 microserver sshd[64696]: Failed password for invalid user pogue from 51.75.206.42 port 59280 ssh2
Dec 16 13:28:12 microserver sshd[65500]: Invalid user selig from 51.75.206.42 port 38806
Dec 16
2019-12-16 17:49:52
183.17.61.169 attackbots
IP: 183.17.61.169
ASN: AS4134 No.31 Jin-rong Street
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 16/12/2019 6:57:06 AM UTC
2019-12-16 17:51:48
175.192.79.151 attackbotsspam
FTP Brute Force
2019-12-16 17:42:41
182.75.248.254 attackbotsspam
Dec 15 23:39:54 eddieflores sshd\[19264\]: Invalid user yoshimitsu from 182.75.248.254
Dec 15 23:39:54 eddieflores sshd\[19264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.75.248.254
Dec 15 23:39:55 eddieflores sshd\[19264\]: Failed password for invalid user yoshimitsu from 182.75.248.254 port 43168 ssh2
Dec 15 23:46:27 eddieflores sshd\[19854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.75.248.254  user=root
Dec 15 23:46:29 eddieflores sshd\[19854\]: Failed password for root from 182.75.248.254 port 50214 ssh2
2019-12-16 17:57:58
14.169.186.118 attack
IP: 14.169.186.118
ASN: AS45899 VNPT Corp
Port: Message Submission 587
Found in one or more Blacklists
Date: 16/12/2019 10:07:48 AM UTC
2019-12-16 18:11:33
177.106.175.31 attackbotsspam
IP: 177.106.175.31
ASN: AS53006 ALGAR TELECOM S/A
Port: Message Submission 587
Found in one or more Blacklists
Date: 16/12/2019 9:52:47 AM UTC
2019-12-16 17:59:14
180.183.14.118 attack
IP: 180.183.14.118
ASN: AS45758 Triple T Internet/Triple T Broadband
Port: Message Submission 587
Found in one or more Blacklists
Date: 16/12/2019 9:52:48 AM UTC
2019-12-16 17:58:56
148.245.69.238 attack
Automatic report - Port Scan Attack
2019-12-16 18:13:43
40.92.71.48 attackspam
Dec 16 09:26:46 debian-2gb-vpn-nbg1-1 kernel: [855976.720629] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.71.48 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=237 ID=18633 DF PROTO=TCP SPT=60805 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0
2019-12-16 18:09:18
89.142.67.146 attackspambots
FTP Brute Force
2019-12-16 18:00:58
201.16.251.121 attackspambots
Dec 16 10:20:49 vps691689 sshd[17330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.16.251.121
Dec 16 10:20:51 vps691689 sshd[17330]: Failed password for invalid user mackenzie from 201.16.251.121 port 20994 ssh2
...
2019-12-16 18:16:14
112.133.248.109 attack
1576477615 - 12/16/2019 07:26:55 Host: 112.133.248.109/112.133.248.109 Port: 445 TCP Blocked
2019-12-16 17:56:31

最近上报的IP列表

49.57.94.213 199.170.181.121 47.178.251.90 233.198.51.33
208.143.250.49 50.158.70.225 9.161.155.15 180.10.9.187
160.218.12.132 234.138.230.14 103.237.45.175 155.125.72.12
49.254.30.60 234.145.106.99 158.125.207.121 9.152.150.37
199.150.95.95 150.188.46.74 26.139.209.182 191.161.48.115