必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): SoftBank

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.113.30.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64221
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;218.113.30.148.			IN	A

;; AUTHORITY SECTION:
.			466	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020061301 1800 900 604800 86400

;; Query time: 89 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 14 08:42:02 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
148.30.113.218.in-addr.arpa domain name pointer softbank218113030148.bbtec.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.30.113.218.in-addr.arpa	name = softbank218113030148.bbtec.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
60.29.31.98 attack
Aug  4 05:21:02 srv-4 sshd\[31989\]: Invalid user ubuntu from 60.29.31.98
Aug  4 05:21:02 srv-4 sshd\[31989\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.29.31.98
Aug  4 05:21:04 srv-4 sshd\[31989\]: Failed password for invalid user ubuntu from 60.29.31.98 port 60820 ssh2
...
2019-08-04 10:54:21
222.124.200.18 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-04 00:34:42,775 INFO [amun_request_handler] PortScan Detected on Port: 445 (222.124.200.18)
2019-08-04 10:19:49
91.121.208.136 attackspambots
Aug  4 00:50:56 srv00 sshd[31000]: fatal: Unable to negotiate whostnameh 91.121.208.136 port 33760: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Aug  4 00:51:05 srv00 sshd[31002]: fatal: Unable to negotiate whostnameh 91.121.208.136 port 38304: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Aug  4 00:51:13 srv00 sshd[31005]: fatal: Unable to negotiate whostnameh 91.121.208.136 port 42848: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Aug  4 00:51:23 srv00 sshd[31007]: fatal: Unable to negotiate whostnameh 91.121.208.136 port 47356: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman........
------------------------------
2019-08-04 10:41:15
111.207.253.225 attackbotsspam
2019-08-04T02:51:55.056315MailD postfix/smtpd[8297]: warning: unknown[111.207.253.225]: SASL LOGIN authentication failed: authentication failure
2019-08-04T02:51:58.640496MailD postfix/smtpd[8297]: warning: unknown[111.207.253.225]: SASL LOGIN authentication failed: authentication failure
2019-08-04T02:52:02.220081MailD postfix/smtpd[8297]: warning: unknown[111.207.253.225]: SASL LOGIN authentication failed: authentication failure
2019-08-04 10:07:56
180.151.225.195 attackbotsspam
Aug  3 22:23:04 TORMINT sshd\[13737\]: Invalid user leon from 180.151.225.195
Aug  3 22:23:04 TORMINT sshd\[13737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.151.225.195
Aug  3 22:23:07 TORMINT sshd\[13737\]: Failed password for invalid user leon from 180.151.225.195 port 51302 ssh2
...
2019-08-04 10:40:27
159.65.183.47 attackspambots
Aug  4 03:53:56 h2177944 sshd\[15699\]: Invalid user ken123 from 159.65.183.47 port 37722
Aug  4 03:53:56 h2177944 sshd\[15699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.183.47
Aug  4 03:53:59 h2177944 sshd\[15699\]: Failed password for invalid user ken123 from 159.65.183.47 port 37722 ssh2
Aug  4 03:58:04 h2177944 sshd\[15850\]: Invalid user danny123 from 159.65.183.47 port 59192
Aug  4 03:58:04 h2177944 sshd\[15850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.183.47
...
2019-08-04 10:43:04
54.38.185.87 attackspambots
Aug  4 03:08:04 xeon sshd[59641]: Failed password for invalid user martin from 54.38.185.87 port 53254 ssh2
2019-08-04 10:36:06
41.33.65.196 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-04 00:31:21,735 INFO [amun_request_handler] PortScan Detected on Port: 445 (41.33.65.196)
2019-08-04 10:25:24
176.99.108.250 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-04 00:30:21,107 INFO [amun_request_handler] PortScan Detected on Port: 445 (176.99.108.250)
2019-08-04 10:27:06
167.71.43.171 attack
\[2019-08-03 22:28:00\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-03T22:28:00.739-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441144630211",SessionID="0x7ff4d07e79a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/167.71.43.171/55114",ACLName="no_extension_match"
\[2019-08-03 22:28:44\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-03T22:28:44.982-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441144630211",SessionID="0x7ff4d0348688",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/167.71.43.171/63244",ACLName="no_extension_match"
\[2019-08-03 22:29:39\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-03T22:29:39.802-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441144630211",SessionID="0x7ff4d07e79a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/167.71.43.171/50106",ACLName="no_e
2019-08-04 10:37:31
117.158.73.58 attack
Aug  4 02:50:22 xeon cyrus/imaps[55088]: badlogin: [117.158.73.58] plain [SASL(-13): authentication failure: Password verification failed]
2019-08-04 10:08:58
132.232.42.181 attack
2019-08-04T01:55:44.195170abusebot-6.cloudsearch.cf sshd\[4471\]: Invalid user apache2 from 132.232.42.181 port 49710
2019-08-04 10:12:14
61.150.76.201 attackbotsspam
Aug  4 02:50:22 xeon cyrus/imap[58079]: badlogin: [61.150.76.201] plain [SASL(-13): authentication failure: Password verification failed]
2019-08-04 10:08:24
59.90.28.15 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-04 00:35:46,823 INFO [amun_request_handler] PortScan Detected on Port: 445 (59.90.28.15)
2019-08-04 10:13:27
196.252.95.233 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-04 00:33:10,142 INFO [amun_request_handler] PortScan Detected on Port: 445 (196.252.95.233)
2019-08-04 10:22:53

最近上报的IP列表

201.119.226.171 76.180.119.169 2.47.216.216 122.117.243.229
105.165.174.132 75.57.76.198 211.108.229.65 37.83.170.226
142.54.205.241 154.205.207.28 184.102.121.17 138.97.18.117
122.93.148.73 77.201.24.31 90.213.100.205 122.51.97.192
90.68.202.139 165.8.143.26 108.17.123.98 87.48.8.19