必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 248.191.84.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52440
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;248.191.84.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 13:36:28 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 149.84.191.248.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.84.191.248.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
176.121.227.58 attackspambots
proto=tcp  .  spt=49762  .  dpt=25  .     (listed on Blocklist de  Sep 15)     (32)
2019-09-16 13:04:53
131.1.253.6 attackbotsspam
2019-09-16T04:18:06.564793abusebot-2.cloudsearch.cf sshd\[23650\]: Invalid user 123456 from 131.1.253.6 port 37314
2019-09-16 12:32:12
213.200.139.29 attackbots
Sep 14 05:17:18 reporting5 sshd[17765]: Invalid user admin from 213.200.139.29
Sep 14 05:17:18 reporting5 sshd[17765]: Failed password for invalid user admin from 213.200.139.29 port 42341 ssh2
Sep 14 05:17:18 reporting5 sshd[17765]: Failed password for invalid user admin from 213.200.139.29 port 42341 ssh2
Sep 14 05:17:18 reporting5 sshd[17765]: Failed password for invalid user admin from 213.200.139.29 port 42341 ssh2
Sep 14 05:17:18 reporting5 sshd[17765]: Failed password for invalid user admin from 213.200.139.29 port 42341 ssh2
Sep 14 05:17:18 reporting5 sshd[17765]: Failed password for invalid user admin from 213.200.139.29 port 42341 ssh2
Sep 14 05:17:18 reporting5 sshd[17765]: Failed password for invalid user admin from 213.200.139.29 port 42341 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=213.200.139.29
2019-09-16 12:46:16
62.165.1.148 attack
Honeypot attack, port: 23, PTR: 62-165-1-148.free.
2019-09-16 12:36:07
195.218.144.234 attackbots
Sep 14 04:55:41 ns sshd[22478]: Invalid user hamza from 195.218.144.234
Sep 14 04:55:43 ns sshd[22478]: Failed password for invalid user hamza from 195.218.144.234 port 43792 ssh2
Sep 14 05:05:15 ns sshd[23668]: Invalid user credhostnamecard from 195.218.144.234


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=195.218.144.234
2019-09-16 12:36:50
115.84.112.98 attackbotsspam
Sep 15 18:15:58 lcprod sshd\[10691\]: Invalid user abc1 from 115.84.112.98
Sep 15 18:15:58 lcprod sshd\[10691\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ftth.laotel.com
Sep 15 18:16:00 lcprod sshd\[10691\]: Failed password for invalid user abc1 from 115.84.112.98 port 47608 ssh2
Sep 15 18:20:20 lcprod sshd\[11092\]: Invalid user loch from 115.84.112.98
Sep 15 18:20:20 lcprod sshd\[11092\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ftth.laotel.com
2019-09-16 12:31:01
164.132.44.25 attackspam
Sep 16 06:27:48 MK-Soft-Root2 sshd\[28707\]: Invalid user service from 164.132.44.25 port 41794
Sep 16 06:27:48 MK-Soft-Root2 sshd\[28707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.44.25
Sep 16 06:27:51 MK-Soft-Root2 sshd\[28707\]: Failed password for invalid user service from 164.132.44.25 port 41794 ssh2
...
2019-09-16 12:55:39
211.150.122.20 attackbotsspam
CN - 1H : (343)  Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN9803 
 
 IP : 211.150.122.20 
 
 CIDR : 211.150.122.0/24 
 
 PREFIX COUNT : 36 
 
 UNIQUE IP COUNT : 57856 
 
 
 WYKRYTE ATAKI Z ASN9803 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery 
  https://help-dysk.pl
2019-09-16 13:16:17
190.152.221.70 attack
proto=tcp  .  spt=52271  .  dpt=25  .     (listed on Dark List de Sep 15)     (28)
2019-09-16 13:18:00
187.174.191.154 attackspam
Sep 16 06:21:36 eventyay sshd[17622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.174.191.154
Sep 16 06:21:38 eventyay sshd[17622]: Failed password for invalid user tester from 187.174.191.154 port 47572 ssh2
Sep 16 06:26:05 eventyay sshd[17843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.174.191.154
...
2019-09-16 12:32:45
138.0.207.57 attackbots
Sep 16 04:14:24 MK-Soft-Root2 sshd\[10136\]: Invalid user test from 138.0.207.57 port 54044
Sep 16 04:14:24 MK-Soft-Root2 sshd\[10136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.0.207.57
Sep 16 04:14:27 MK-Soft-Root2 sshd\[10136\]: Failed password for invalid user test from 138.0.207.57 port 54044 ssh2
...
2019-09-16 12:45:02
177.194.88.113 attackbots
Sep 16 01:14:58 mintao sshd\[18629\]: Invalid user pi from 177.194.88.113\
Sep 16 01:15:00 mintao sshd\[18630\]: Invalid user pi from 177.194.88.113\
2019-09-16 12:37:54
27.111.36.136 attackspam
SSH Brute-Force reported by Fail2Ban
2019-09-16 12:34:29
112.85.42.185 attackspam
Sep 16 07:03:50 arianus sshd\[21440\]: Unable to negotiate with 112.85.42.185 port 58658: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 \[preauth\]
...
2019-09-16 13:12:01
112.64.34.165 attack
Sep 15 14:05:34 hiderm sshd\[25190\]: Invalid user on from 112.64.34.165
Sep 15 14:05:34 hiderm sshd\[25190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.34.165
Sep 15 14:05:37 hiderm sshd\[25190\]: Failed password for invalid user on from 112.64.34.165 port 45649 ssh2
Sep 15 14:10:23 hiderm sshd\[25729\]: Invalid user aniko from 112.64.34.165
Sep 15 14:10:23 hiderm sshd\[25729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.34.165
2019-09-16 13:06:03

最近上报的IP列表

96.169.85.192 221.112.92.228 242.219.203.153 39.2.238.23
40.8.188.241 108.148.73.199 242.166.21.130 63.166.250.248
95.65.103.107 128.247.204.57 160.246.34.220 14.191.132.100
206.66.29.208 139.108.179.118 26.180.249.248 153.70.48.96
3.233.187.28 145.181.182.180 117.174.125.109 150.186.180.39