必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 30.149.180.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50521
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;30.149.180.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 18:50:15 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 145.180.149.30.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.180.149.30.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
129.204.40.157 attackspambots
Aug 12 04:41:54 vps647732 sshd[12448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.40.157
Aug 12 04:41:56 vps647732 sshd[12448]: Failed password for invalid user mongo from 129.204.40.157 port 45044 ssh2
...
2019-08-12 13:46:22
68.129.202.154 attackspambots
Multiple failed RDP login attempts
2019-08-12 13:25:09
1.71.129.210 attackbots
2019-08-12T04:52:26.464519abusebot-5.cloudsearch.cf sshd\[27580\]: Invalid user get from 1.71.129.210 port 47532
2019-08-12 13:21:48
193.32.161.48 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-12 13:01:55
191.18.30.99 attackspam
Aug 12 04:22:09 www sshd[20312]: reveeclipse mapping checking getaddrinfo for 191-18-30-99.user.vivozap.com.br [191.18.30.99] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug 12 04:22:09 www sshd[20312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.18.30.99  user=r.r
Aug 12 04:22:11 www sshd[20312]: Failed password for r.r from 191.18.30.99 port 63258 ssh2
Aug 12 04:22:13 www sshd[20317]: reveeclipse mapping checking getaddrinfo for 191-18-30-99.user.vivozap.com.br [191.18.30.99] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug 12 04:22:14 www sshd[20317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.18.30.99  user=r.r
Aug 12 04:22:15 www sshd[20317]: Failed password for r.r from 191.18.30.99 port 63259 ssh2
Aug 12 04:22:18 www sshd[20327]: reveeclipse mapping checking getaddrinfo for 191-18-30-99.user.vivozap.com.br [191.18.30.99] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug 12 04:22:18 www sshd[203........
-------------------------------
2019-08-12 13:45:39
121.234.42.7 attackbotsspam
Lines containing failures of 121.234.42.7
Aug 12 04:21:25 MAKserver05 sshd[18980]: Invalid user admin from 121.234.42.7 port 48897
Aug 12 04:21:25 MAKserver05 sshd[18980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.234.42.7 
Aug 12 04:21:26 MAKserver05 sshd[18980]: Failed password for invalid user admin from 121.234.42.7 port 48897 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=121.234.42.7
2019-08-12 13:19:26
212.80.216.176 attackspambots
Aug 12 05:24:37   TCP Attack: SRC=212.80.216.176 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=66  DF PROTO=TCP SPT=55361 DPT=80 WINDOW=29200 RES=0x00 SYN URGP=0
2019-08-12 13:37:11
210.217.24.226 attackbots
Aug 12 03:44:44 MK-Soft-VM5 sshd\[29219\]: Invalid user caleb from 210.217.24.226 port 40554
Aug 12 03:44:44 MK-Soft-VM5 sshd\[29219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.217.24.226
Aug 12 03:44:45 MK-Soft-VM5 sshd\[29219\]: Failed password for invalid user caleb from 210.217.24.226 port 40554 ssh2
...
2019-08-12 13:53:34
194.183.171.171 attackspambots
Aug 12 02:35:20 xb0 sshd[7729]: Failed password for invalid user teamspeak3 from 194.183.171.171 port 41884 ssh2
Aug 12 02:35:21 xb0 sshd[7729]: Received disconnect from 194.183.171.171: 11: Bye Bye [preauth]
Aug 12 02:42:43 xb0 sshd[17890]: Failed password for invalid user nodeclient from 194.183.171.171 port 53158 ssh2
Aug 12 02:42:43 xb0 sshd[17890]: Received disconnect from 194.183.171.171: 11: Bye Bye [preauth]
Aug 12 02:46:57 xb0 sshd[14069]: Failed password for invalid user ppo from 194.183.171.171 port 53134 ssh2
Aug 12 02:46:57 xb0 sshd[14069]: Received disconnect from 194.183.171.171: 11: Bye Bye [preauth]
Aug 12 02:50:56 xb0 sshd[10684]: Failed password for invalid user natasha from 194.183.171.171 port 53070 ssh2
Aug 12 02:50:56 xb0 sshd[10684]: Received disconnect from 194.183.171.171: 11: Bye Bye [preauth]
Aug 12 02:55:01 xb0 sshd[19724]: Failed password for invalid user miner from 194.183.171.171 port 53126 ssh2
Aug 12 02:55:01 xb0 sshd[19724]: Received d........
-------------------------------
2019-08-12 13:01:08
200.131.137.31 attack
Aug 11 08:44:55 localhost kernel: [16771688.669194] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=200.131.137.31 DST=[mungedIP2] LEN=40 TOS=0x08 PREC=0x20 TTL=238 ID=196 PROTO=TCP SPT=54364 DPT=445 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 11 08:44:55 localhost kernel: [16771688.669218] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=200.131.137.31 DST=[mungedIP2] LEN=40 TOS=0x08 PREC=0x20 TTL=238 ID=196 PROTO=TCP SPT=54364 DPT=445 SEQ=1552638215 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 11 22:41:57 localhost kernel: [16821911.095620] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=200.131.137.31 DST=[mungedIP2] LEN=40 TOS=0x08 PREC=0x20 TTL=238 ID=39716 PROTO=TCP SPT=57166 DPT=445 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 11 22:41:57 localhost kernel: [16821911.095628] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=200.131.137.31 DST=[mungedIP2] LEN=40 TOS=0x08 PRE
2019-08-12 13:45:06
193.112.23.81 attack
Aug 12 02:43:18 animalibera sshd[8290]: Invalid user updater from 193.112.23.81 port 45722
...
2019-08-12 13:10:16
144.0.3.44 attack
[DoS Attack: SYN/ACK Scan] from source: 144.0.3.44, port 10003, Sunday, August 11, 2019
2019-08-12 12:59:40
68.183.236.29 attackspam
2019-08-12T02:42:03.447804abusebot-3.cloudsearch.cf sshd\[28904\]: Invalid user TeamSpeak from 68.183.236.29 port 47178
2019-08-12 13:42:44
104.131.224.81 attack
Automatic report - Banned IP Access
2019-08-12 13:24:08
93.115.241.194 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.115.241.194  user=root
Failed password for root from 93.115.241.194 port 33825 ssh2
Failed password for root from 93.115.241.194 port 33825 ssh2
Failed password for root from 93.115.241.194 port 33825 ssh2
Failed password for root from 93.115.241.194 port 33825 ssh2
2019-08-12 12:58:05

最近上报的IP列表

169.116.75.176 225.18.173.201 6.93.147.52 5.214.119.6
149.15.78.249 151.221.18.14 46.16.39.238 22.197.199.50
150.81.231.221 51.253.55.203 103.173.67.227 204.11.7.165
179.56.207.219 106.36.35.102 120.147.134.85 125.71.198.168
153.243.60.203 107.30.55.215 95.89.12.154 107.138.228.197