必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 36.149.21.192
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4110
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;36.149.21.192.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 10:42:08 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 192.21.149.36.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 192.21.149.36.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
104.206.128.58 attackbotsspam
Honeypot attack, port: 81, PTR: 58-128.206.104.serverhubrdns.in-addr.arpa.
2019-08-04 04:52:12
204.48.19.178 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.19.178  user=root
Failed password for root from 204.48.19.178 port 36128 ssh2
Invalid user mars from 204.48.19.178 port 34234
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.19.178
Failed password for invalid user mars from 204.48.19.178 port 34234 ssh2
2019-08-04 05:04:28
164.132.81.106 attack
Aug  3 20:15:34 OPSO sshd\[3727\]: Invalid user kong from 164.132.81.106 port 47834
Aug  3 20:15:34 OPSO sshd\[3727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.81.106
Aug  3 20:15:36 OPSO sshd\[3727\]: Failed password for invalid user kong from 164.132.81.106 port 47834 ssh2
Aug  3 20:19:51 OPSO sshd\[4053\]: Invalid user apagar from 164.132.81.106 port 43662
Aug  3 20:19:51 OPSO sshd\[4053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.81.106
2019-08-04 04:22:33
87.228.129.49 attackspam
Automatic report - Port Scan Attack
2019-08-04 04:23:02
144.217.166.59 attack
Aug  3 12:11:19 *** sshd[2141]: Failed password for invalid user debian from 144.217.166.59 port 38520 ssh2
2019-08-04 04:40:00
2.153.184.166 attackspambots
Automatic report - Banned IP Access
2019-08-04 04:39:38
138.68.17.96 attackbotsspam
Aug  3 23:13:24 server sshd\[20468\]: Invalid user edward from 138.68.17.96 port 33604
Aug  3 23:13:24 server sshd\[20468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.17.96
Aug  3 23:13:26 server sshd\[20468\]: Failed password for invalid user edward from 138.68.17.96 port 33604 ssh2
Aug  3 23:17:20 server sshd\[23602\]: Invalid user aorban from 138.68.17.96 port 55132
Aug  3 23:17:20 server sshd\[23602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.17.96
2019-08-04 04:23:35
201.6.99.139 attackspambots
Aug  3 20:21:30 MK-Soft-VM5 sshd\[22701\]: Invalid user ys from 201.6.99.139 port 40364
Aug  3 20:21:30 MK-Soft-VM5 sshd\[22701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.6.99.139
Aug  3 20:21:32 MK-Soft-VM5 sshd\[22701\]: Failed password for invalid user ys from 201.6.99.139 port 40364 ssh2
...
2019-08-04 04:53:02
129.28.191.33 attackspambots
Aug  3 23:08:56 www sshd\[59993\]: Invalid user prasad from 129.28.191.33Aug  3 23:08:58 www sshd\[59993\]: Failed password for invalid user prasad from 129.28.191.33 port 47932 ssh2Aug  3 23:13:38 www sshd\[60058\]: Invalid user yoko from 129.28.191.33
...
2019-08-04 04:17:06
123.21.10.213 attackspambots
Aug  3 17:00:15 nexus sshd[24533]: Invalid user admin from 123.21.10.213 port 57563
Aug  3 17:00:15 nexus sshd[24533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.21.10.213
Aug  3 17:00:17 nexus sshd[24533]: Failed password for invalid user admin from 123.21.10.213 port 57563 ssh2
Aug  3 17:00:17 nexus sshd[24533]: Connection closed by 123.21.10.213 port 57563 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=123.21.10.213
2019-08-04 04:27:08
128.199.177.224 attackbotsspam
Aug  3 18:49:14 [munged] sshd[2789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.177.224
2019-08-04 04:18:47
218.240.130.106 attack
Aug  3 21:25:52 [host] sshd[15885]: Invalid user user_1 from 218.240.130.106
Aug  3 21:25:52 [host] sshd[15885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.240.130.106
Aug  3 21:25:54 [host] sshd[15885]: Failed password for invalid user user_1 from 218.240.130.106 port 46477 ssh2
2019-08-04 04:44:18
14.152.49.73 attackbots
firewall-block, port(s): 445/tcp
2019-08-04 04:33:44
190.221.50.90 attack
Aug  3 17:03:40 localhost sshd\[30468\]: Invalid user tv from 190.221.50.90
Aug  3 17:03:40 localhost sshd\[30468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.221.50.90
Aug  3 17:03:42 localhost sshd\[30468\]: Failed password for invalid user tv from 190.221.50.90 port 60232 ssh2
Aug  3 17:09:34 localhost sshd\[30706\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.221.50.90  user=root
Aug  3 17:09:36 localhost sshd\[30706\]: Failed password for root from 190.221.50.90 port 12206 ssh2
...
2019-08-04 04:45:33
119.204.246.89 attackspambots
Aug  3 21:19:06 herz-der-gamer sshd[27562]: Invalid user joshua from 119.204.246.89 port 43337
...
2019-08-04 04:21:36

最近上报的IP列表

52.17.7.89 143.42.85.220 237.48.205.248 189.250.204.239
89.186.186.221 219.234.217.51 95.212.165.8 141.239.3.127
30.238.65.29 98.255.129.114 161.29.76.136 201.206.112.138
173.197.173.223 146.236.245.11 203.84.124.40 200.201.33.167
132.161.228.55 85.211.121.169 190.49.234.26 116.228.22.22