必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 254.149.80.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61545
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;254.149.80.197.			IN	A

;; AUTHORITY SECTION:
.			143	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 02:16:20 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 197.80.149.254.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 197.80.149.254.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
220.231.127.2 attackbots
445/tcp 445/tcp
[2019-06-20/28]2pkt
2019-06-28 17:38:37
101.227.90.171 attack
Jun 28 05:10:45 unicornsoft sshd\[17807\]: Invalid user andy from 101.227.90.171
Jun 28 05:10:45 unicornsoft sshd\[17807\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.227.90.171
Jun 28 05:10:47 unicornsoft sshd\[17807\]: Failed password for invalid user andy from 101.227.90.171 port 61640 ssh2
2019-06-28 17:52:08
113.203.237.139 attack
445/tcp 445/tcp 445/tcp...
[2019-06-12/28]6pkt,1pt.(tcp)
2019-06-28 17:54:28
185.173.35.25 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-28 18:07:40
104.248.174.126 attackspam
Jun 28 08:21:37 localhost sshd\[39291\]: Invalid user debian-spamd from 104.248.174.126 port 57020
Jun 28 08:21:37 localhost sshd\[39291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.174.126
Jun 28 08:21:40 localhost sshd\[39291\]: Failed password for invalid user debian-spamd from 104.248.174.126 port 57020 ssh2
Jun 28 08:25:07 localhost sshd\[39392\]: Invalid user transition from 104.248.174.126 port 48161
Jun 28 08:25:07 localhost sshd\[39392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.174.126
...
2019-06-28 18:16:34
92.53.65.97 attackbots
9343/tcp 9522/tcp 9057/tcp...
[2019-05-20/06-28]376pkt,245pt.(tcp)
2019-06-28 18:20:46
109.202.0.14 attack
Jun 28 10:52:22 ArkNodeAT sshd\[27258\]: Invalid user franciszek from 109.202.0.14
Jun 28 10:52:22 ArkNodeAT sshd\[27258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.202.0.14
Jun 28 10:52:24 ArkNodeAT sshd\[27258\]: Failed password for invalid user franciszek from 109.202.0.14 port 49350 ssh2
2019-06-28 17:39:17
14.161.6.201 attackbots
SSH-bruteforce attempts
2019-06-28 17:38:05
66.250.218.82 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2019-04-30/06-28]14pkt,1pt.(tcp)
2019-06-28 17:56:51
176.99.9.19 attackspambots
Automatic report - Web App Attack
2019-06-28 17:41:59
94.191.116.71 attackbots
Jun 28 12:12:39 server sshd\[20376\]: User root from 94.191.116.71 not allowed because listed in DenyUsers
Jun 28 12:12:39 server sshd\[20376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.116.71  user=root
Jun 28 12:12:42 server sshd\[20376\]: Failed password for invalid user root from 94.191.116.71 port 54792 ssh2
Jun 28 12:12:44 server sshd\[24594\]: User root from 94.191.116.71 not allowed because listed in DenyUsers
Jun 28 12:12:44 server sshd\[24594\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.116.71  user=root
2019-06-28 17:20:34
141.98.10.34 attack
Rude login attack (7 tries in 1d)
2019-06-28 17:42:37
60.165.53.189 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-05-24/06-28]6pkt,1pt.(tcp)
2019-06-28 17:58:01
92.53.90.181 attack
9124/tcp 9345/tcp 9880/tcp...
[2019-06-15/28]183pkt,154pt.(tcp)
2019-06-28 18:17:02
139.199.45.102 attackspambots
Jun 28 10:24:41 [host] sshd[12104]: Invalid user shuan from 139.199.45.102
Jun 28 10:24:41 [host] sshd[12104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.102
Jun 28 10:24:43 [host] sshd[12104]: Failed password for invalid user shuan from 139.199.45.102 port 39606 ssh2
2019-06-28 17:34:37

最近上报的IP列表

118.154.40.50 21.4.152.66 176.173.243.91 123.220.99.138
101.147.146.42 200.99.126.117 247.36.141.74 138.50.129.119
16.217.89.210 185.23.1.116 145.163.116.215 101.254.73.45
10.38.189.71 241.246.17.234 117.181.202.147 167.172.177.72
19.209.71.181 138.249.197.91 213.87.225.151 123.51.164.188