必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Oulu

省份(region): Pohjois-Pohjanmaa [Finnish] / Norra Österbotten [Swedish]

国家(country): Finland

运营商(isp): DNA

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.149.254.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16468
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.149.254.16.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024122400 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 24 16:26:11 CST 2024
;; MSG SIZE  rcvd: 107
HOST信息:
16.254.149.212.in-addr.arpa domain name pointer 212-149-254-16.bb.dnainternet.fi.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
16.254.149.212.in-addr.arpa	name = 212-149-254-16.bb.dnainternet.fi.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
149.202.59.85 attack
$f2bV_matches
2019-11-16 22:38:54
220.88.1.208 attack
Triggered by Fail2Ban at Vostok web server
2019-11-16 23:19:22
185.76.34.87 attackbots
1573908007 - 11/16/2019 13:40:07 Host: 185.76.34.87/185.76.34.87 Port: 22 TCP Blocked
2019-11-16 22:48:18
171.241.126.224 attackspam
Unauthorized connection attempt from IP address 171.241.126.224 on Port 445(SMB)
2019-11-16 22:52:09
119.137.54.246 attack
Nov 15 06:27:48 ACSRAD auth.info sshd[31010]: Invalid user crap from 119.137.54.246 port 21753
Nov 15 06:27:48 ACSRAD auth.info sshd[31010]: Failed password for invalid user crap from 119.137.54.246 port 21753 ssh2
Nov 15 06:27:48 ACSRAD auth.notice sshguard[3498]: Attack from "119.137.54.246" on service 100 whostnameh danger 10.
Nov 15 06:27:48 ACSRAD auth.notice sshguard[3498]: Attack from "119.137.54.246" on service 100 whostnameh danger 10.
Nov 15 06:27:48 ACSRAD auth.info sshd[31010]: Received disconnect from 119.137.54.246 port 21753:11: Bye Bye [preauth]
Nov 15 06:27:48 ACSRAD auth.info sshd[31010]: Disconnected from 119.137.54.246 port 21753 [preauth]
Nov 15 06:27:49 ACSRAD auth.notice sshguard[3498]: Attack from "119.137.54.246" on service 100 whostnameh danger 10.
Nov 15 06:27:49 ACSRAD auth.warn sshguard[3498]: Blocking "119.137.54.246/32" forever (3 attacks in 1 secs, after 2 abuses over 577 secs.)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=
2019-11-16 22:40:40
36.92.197.217 attackbots
Unauthorised access (Nov 16) SRC=36.92.197.217 LEN=52 TTL=247 ID=1083 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-16 22:58:52
14.242.212.133 attackspam
Unauthorized connection attempt from IP address 14.242.212.133 on Port 445(SMB)
2019-11-16 22:42:57
42.187.121.88 attack
1433/tcp 445/tcp...
[2019-09-18/11-16]9pkt,2pt.(tcp)
2019-11-16 23:07:31
106.13.144.78 attackbots
Nov 16 10:26:26 ns382633 sshd\[11501\]: Invalid user ident from 106.13.144.78 port 56962
Nov 16 10:26:26 ns382633 sshd\[11501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.144.78
Nov 16 10:26:29 ns382633 sshd\[11501\]: Failed password for invalid user ident from 106.13.144.78 port 56962 ssh2
Nov 16 10:53:09 ns382633 sshd\[16271\]: Invalid user admin from 106.13.144.78 port 42020
Nov 16 10:53:09 ns382633 sshd\[16271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.144.78
2019-11-16 22:49:46
195.58.123.109 attack
Nov 16 15:28:52 dedicated sshd[14913]: Invalid user julian123 from 195.58.123.109 port 43908
2019-11-16 22:48:04
51.77.147.95 attack
$f2bV_matches
2019-11-16 22:39:49
41.204.191.53 attackbots
Nov 16 15:49:48 eventyay sshd[4579]: Failed password for nobody from 41.204.191.53 port 39538 ssh2
Nov 16 15:54:04 eventyay sshd[4706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.204.191.53
Nov 16 15:54:05 eventyay sshd[4706]: Failed password for invalid user regalia from 41.204.191.53 port 48100 ssh2
...
2019-11-16 23:12:48
18.224.249.2 attackspambots
(mod_security) mod_security (id:949110) triggered by 18.224.249.2 (US/United States/ec2-18-224-249-2.us-east-2.compute.amazonaws.com): 5 in the last 3600 secs (CF_ENABLE)
2019-11-16 23:10:28
103.28.219.171 attackbots
Nov 16 20:37:56 vibhu-HP-Z238-Microtower-Workstation sshd\[29597\]: Invalid user shinchi from 103.28.219.171
Nov 16 20:37:56 vibhu-HP-Z238-Microtower-Workstation sshd\[29597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.28.219.171
Nov 16 20:37:57 vibhu-HP-Z238-Microtower-Workstation sshd\[29597\]: Failed password for invalid user shinchi from 103.28.219.171 port 35674 ssh2
Nov 16 20:42:25 vibhu-HP-Z238-Microtower-Workstation sshd\[29927\]: Invalid user phpbb from 103.28.219.171
Nov 16 20:42:25 vibhu-HP-Z238-Microtower-Workstation sshd\[29927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.28.219.171
...
2019-11-16 23:18:31
63.83.78.143 attackspam
Nov 16 16:00:54 mxgate1 postfix/postscreen[12897]: CONNECT from [63.83.78.143]:54013 to [176.31.12.44]:25
Nov 16 16:00:54 mxgate1 postfix/dnsblog[12970]: addr 63.83.78.143 listed by domain zen.spamhaus.org as 127.0.0.3
Nov 16 16:00:54 mxgate1 postfix/dnsblog[12965]: addr 63.83.78.143 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Nov 16 16:01:00 mxgate1 postfix/postscreen[12897]: DNSBL rank 3 for [63.83.78.143]:54013
Nov x@x
Nov 16 16:01:00 mxgate1 postfix/postscreen[12897]: DISCONNECT [63.83.78.143]:54013


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=63.83.78.143
2019-11-16 23:17:27

最近上报的IP列表

147.101.249.205 185.60.253.61 185.60.253.36 185.60.253.245
124.66.103.89 42.43.121.107 162.102.250.200 3.76.63.100
225.121.98.162 194.2.91.152 49.101.65.148 167.197.210.176
147.213.89.5 67.206.65.124 114.100.47.176 41.63.203.186
56.54.38.215 202.203.187.157 144.201.52.176 223.56.178.1