必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Poland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.146.49.23
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 336
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.146.49.23.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 07:52:43 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
23.49.146.213.in-addr.arpa domain name pointer 213-146-49-23.static.ip.netia.com.pl.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
23.49.146.213.in-addr.arpa	name = 213-146-49-23.static.ip.netia.com.pl.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
49.207.3.226 attack
Unauthorized connection attempt from IP address 49.207.3.226 on Port 445(SMB)
2020-05-28 23:00:45
27.79.225.98 attackbots
Unauthorized connection attempt from IP address 27.79.225.98 on Port 445(SMB)
2020-05-28 22:32:42
193.56.28.146 attackbots
May 28 16:33:39 srv01 postfix/smtpd\[19558\]: warning: unknown\[193.56.28.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 28 16:33:45 srv01 postfix/smtpd\[19558\]: warning: unknown\[193.56.28.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 28 16:33:55 srv01 postfix/smtpd\[19558\]: warning: unknown\[193.56.28.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 28 16:36:07 srv01 postfix/smtpd\[636\]: warning: unknown\[193.56.28.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 28 16:36:13 srv01 postfix/smtpd\[636\]: warning: unknown\[193.56.28.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-05-28 23:17:07
222.107.73.200 attack
May 28 14:01:38 fhem-rasp sshd[9107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.107.73.200 
May 28 14:01:39 fhem-rasp sshd[9107]: Failed password for invalid user ubuntu from 222.107.73.200 port 34554 ssh2
...
2020-05-28 22:51:00
106.12.196.237 attackbots
May 28 08:51:03 ny01 sshd[20392]: Failed password for root from 106.12.196.237 port 59406 ssh2
May 28 08:55:09 ny01 sshd[21254]: Failed password for root from 106.12.196.237 port 55802 ssh2
2020-05-28 22:43:54
87.198.48.12 attack
May 28 14:01:46 fhem-rasp sshd[9142]: Failed password for root from 87.198.48.12 port 46199 ssh2
May 28 14:01:47 fhem-rasp sshd[9142]: Connection closed by authenticating user root 87.198.48.12 port 46199 [preauth]
...
2020-05-28 22:44:50
195.54.160.180 attack
tries to connect on SSH
2020-05-28 22:36:00
105.71.149.102 attackbotsspam
Unauthorized connection attempt from IP address 105.71.149.102 on Port 445(SMB)
2020-05-28 23:14:05
14.40.103.3 attack
May 28 14:01:37 fhem-rasp sshd[9099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.40.103.3  user=root
May 28 14:01:39 fhem-rasp sshd[9099]: Failed password for root from 14.40.103.3 port 39769 ssh2
...
2020-05-28 22:52:45
49.232.152.36 attackspambots
Failed password for root from 49.232.152.36 port 58868 ssh2
Invalid user rdboden from 49.232.152.36 port 48700
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.152.36
Invalid user rdboden from 49.232.152.36 port 48700
Failed password for invalid user rdboden from 49.232.152.36 port 48700 ssh2
2020-05-28 22:37:06
123.194.67.72 attackspam
Unauthorized connection attempt from IP address 123.194.67.72 on Port 445(SMB)
2020-05-28 23:05:04
113.176.243.71 attackspambots
Unauthorized connection attempt from IP address 113.176.243.71 on Port 445(SMB)
2020-05-28 22:47:12
78.173.130.200 attackspam
Unauthorized connection attempt from IP address 78.173.130.200 on Port 445(SMB)
2020-05-28 23:09:06
104.248.16.41 attackspambots
May 28 15:21:34 hell sshd[2069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.16.41
May 28 15:21:36 hell sshd[2069]: Failed password for invalid user Chicago from 104.248.16.41 port 38320 ssh2
...
2020-05-28 23:14:42
103.58.64.13 attackbotsspam
Unauthorized connection attempt from IP address 103.58.64.13 on Port 445(SMB)
2020-05-28 22:41:20

最近上报的IP列表

155.252.220.30 50.131.212.0 211.195.183.206 37.176.52.109
24.29.127.44 129.120.253.198 160.66.11.184 108.56.233.172
51.43.115.71 100.199.16.73 226.56.7.227 174.181.164.111
152.142.133.131 187.58.177.105 8.139.135.92 205.51.67.48
12.104.128.122 181.136.0.247 27.212.184.213 30.214.123.17