必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Australia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.20.54.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30333
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;203.20.54.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 03:24:07 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 149.54.20.203.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.54.20.203.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
153.36.242.143 attackbotsspam
2019-10-04T13:59:13.048787abusebot-3.cloudsearch.cf sshd\[18405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.143  user=root
2019-10-04 22:05:37
50.2.36.209 attackbots
Posting spam into our web support form, e.g.,

"I've seen that you've been advertsing jobs on Indeed and I wanted to see if you're still recruiting?  

Here at Lilium we help our clients fill their job roles quickly by advertising on over 500 leading job boards simultaneously, including TotalJobs, Jobsite, Monster, Reed and hundreds more, without needing to pay their individual subscriptions fees!  "
2019-10-04 22:14:56
104.248.37.88 attack
2182/tcp 2181/tcp 2180/tcp...≡ [2117/tcp,2182/tcp]
[2019-08-03/10-03]232pkt,66pt.(tcp)
2019-10-04 22:04:31
157.230.87.116 attackbots
Oct  4 15:29:36 saschabauer sshd[10989]: Failed password for root from 157.230.87.116 port 46884 ssh2
2019-10-04 21:39:07
80.82.65.74 attackbotsspam
Port=
2019-10-04 21:37:19
112.85.42.195 attack
Oct  4 15:35:38 ArkNodeAT sshd\[12833\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.195  user=root
Oct  4 15:35:40 ArkNodeAT sshd\[12833\]: Failed password for root from 112.85.42.195 port 10021 ssh2
Oct  4 15:35:43 ArkNodeAT sshd\[12833\]: Failed password for root from 112.85.42.195 port 10021 ssh2
2019-10-04 22:02:30
89.104.76.42 attackspam
Oct  4 15:56:57 core sshd[5256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.104.76.42  user=root
Oct  4 15:56:59 core sshd[5256]: Failed password for root from 89.104.76.42 port 51934 ssh2
...
2019-10-04 22:02:57
205.240.77.49 attack
[munged]::80 205.240.77.49 - - [04/Oct/2019:14:27:32 +0200] "POST /[munged]: HTTP/1.1" 200 4214 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 205.240.77.49 - - [04/Oct/2019:14:27:33 +0200] "POST /[munged]: HTTP/1.1" 200 4213 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 205.240.77.49 - - [04/Oct/2019:14:27:35 +0200] "POST /[munged]: HTTP/1.1" 200 4213 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 205.240.77.49 - - [04/Oct/2019:14:27:36 +0200] "POST /[munged]: HTTP/1.1" 200 4213 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 205.240.77.49 - - [04/Oct/2019:14:27:37 +0200] "POST /[munged]: HTTP/1.1" 200 4213 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 205.240.77.49 - - [04/Oct/2019:14:27:38 +0200]
2019-10-04 22:15:45
92.118.160.17 attack
5060/udp 5908/tcp 1434/udp...
[2019-08-03/10-04]156pkt,70pt.(tcp),9pt.(udp),1tp.(icmp)
2019-10-04 22:13:58
92.118.160.33 attack
5905/tcp 8082/tcp 8080/tcp...
[2019-08-03/10-04]134pkt,63pt.(tcp),6pt.(udp),1tp.(icmp)
2019-10-04 21:54:35
88.214.26.17 attack
191004  7:37:38 \[Warning\] Access denied for user 'test'@'88.214.26.17' \(using password: YES\)
191004  7:58:26 \[Warning\] Access denied for user 'test'@'88.214.26.17' \(using password: YES\)
191004  8:19:05 \[Warning\] Access denied for user 'test'@'88.214.26.17' \(using password: YES\)
...
2019-10-04 21:35:30
218.1.18.78 attackspam
2019-10-04T15:29:34.541950  sshd[17539]: Invalid user Lille1@3 from 218.1.18.78 port 13288
2019-10-04T15:29:34.551598  sshd[17539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.1.18.78
2019-10-04T15:29:34.541950  sshd[17539]: Invalid user Lille1@3 from 218.1.18.78 port 13288
2019-10-04T15:29:36.407617  sshd[17539]: Failed password for invalid user Lille1@3 from 218.1.18.78 port 13288 ssh2
2019-10-04T15:35:29.601742  sshd[17653]: Invalid user Heslo! from 218.1.18.78 port 31604
...
2019-10-04 21:40:39
36.155.10.19 attack
Oct  4 03:55:22 hpm sshd\[16142\]: Invalid user Network2017 from 36.155.10.19
Oct  4 03:55:22 hpm sshd\[16142\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.10.19
Oct  4 03:55:23 hpm sshd\[16142\]: Failed password for invalid user Network2017 from 36.155.10.19 port 58938 ssh2
Oct  4 04:00:30 hpm sshd\[16572\]: Invalid user Jeanine1@3 from 36.155.10.19
Oct  4 04:00:30 hpm sshd\[16572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.10.19
2019-10-04 22:00:36
203.213.67.30 attackspam
Oct  4 09:19:45 TORMINT sshd\[29004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.213.67.30  user=root
Oct  4 09:19:46 TORMINT sshd\[29004\]: Failed password for root from 203.213.67.30 port 37246 ssh2
Oct  4 09:26:11 TORMINT sshd\[29464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.213.67.30  user=root
...
2019-10-04 21:26:35
92.118.160.25 attack
987/tcp 21/tcp 8443/tcp...
[2019-08-03/10-04]158pkt,64pt.(tcp),10pt.(udp),1tp.(icmp)
2019-10-04 21:57:26

最近上报的IP列表

56.217.132.136 126.196.9.58 239.147.82.220 235.172.43.158
163.52.1.202 20.106.71.251 211.62.30.214 158.125.161.249
191.174.170.35 37.222.204.220 30.31.234.76 3.87.58.252
126.195.147.238 27.93.78.71 103.53.148.137 13.204.38.212
69.141.25.0 49.73.99.210 234.248.174.138 161.33.105.99