必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.148.218.123
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22824
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.148.218.123.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 05:14:36 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
123.218.148.41.in-addr.arpa domain name pointer dsl-148-218-123.telkomadsl.co.za.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
123.218.148.41.in-addr.arpa	name = dsl-148-218-123.telkomadsl.co.za.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
80.82.77.240 attack
Scanning random ports - tries to find possible vulnerable services
2019-09-22 04:30:44
139.59.226.82 attackbots
Sep 21 08:29:18 sachi sshd\[22362\]: Invalid user marie from 139.59.226.82
Sep 21 08:29:18 sachi sshd\[22362\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.226.82
Sep 21 08:29:20 sachi sshd\[22362\]: Failed password for invalid user marie from 139.59.226.82 port 38052 ssh2
Sep 21 08:34:21 sachi sshd\[22831\]: Invalid user hapten from 139.59.226.82
Sep 21 08:34:21 sachi sshd\[22831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.226.82
2019-09-22 04:38:28
119.95.202.56 attackspambots
wp-login.php
2019-09-22 04:29:36
153.36.242.143 attackspambots
Sep 21 16:33:13 plusreed sshd[2207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.143  user=root
Sep 21 16:33:15 plusreed sshd[2207]: Failed password for root from 153.36.242.143 port 21839 ssh2
...
2019-09-22 04:50:38
66.79.179.202 attackbots
firewall-block, port(s): 22/tcp
2019-09-22 04:32:32
162.243.94.34 attackspam
Sep 21 22:31:15 webhost01 sshd[19031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.94.34
Sep 21 22:31:16 webhost01 sshd[19031]: Failed password for invalid user tibero2 from 162.243.94.34 port 37090 ssh2
...
2019-09-22 04:33:19
134.209.51.46 attackbots
Sep 21 15:14:59 plusreed sshd[17313]: Invalid user phoenix from 134.209.51.46
...
2019-09-22 04:51:32
112.85.42.229 attackspambots
Sep 21 14:49:05 vserver sshd\[3616\]: Failed password for root from 112.85.42.229 port 44924 ssh2Sep 21 14:49:08 vserver sshd\[3616\]: Failed password for root from 112.85.42.229 port 44924 ssh2Sep 21 14:49:11 vserver sshd\[3616\]: Failed password for root from 112.85.42.229 port 44924 ssh2Sep 21 14:50:20 vserver sshd\[3635\]: Failed password for root from 112.85.42.229 port 38179 ssh2
...
2019-09-22 04:18:56
180.242.51.232 attack
Scanning random ports - tries to find possible vulnerable services
2019-09-22 04:17:40
223.207.249.112 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-21 11:17:35,329 INFO [amun_request_handler] PortScan Detected on Port: 445 (223.207.249.112)
2019-09-22 04:45:32
211.104.171.239 attack
Sep 21 09:47:03 Tower sshd[1647]: Connection from 211.104.171.239 port 41213 on 192.168.10.220 port 22
Sep 21 09:47:04 Tower sshd[1647]: Invalid user two from 211.104.171.239 port 41213
Sep 21 09:47:04 Tower sshd[1647]: error: Could not get shadow information for NOUSER
Sep 21 09:47:04 Tower sshd[1647]: Failed password for invalid user two from 211.104.171.239 port 41213 ssh2
Sep 21 09:47:04 Tower sshd[1647]: Received disconnect from 211.104.171.239 port 41213:11: Bye Bye [preauth]
Sep 21 09:47:04 Tower sshd[1647]: Disconnected from invalid user two 211.104.171.239 port 41213 [preauth]
2019-09-22 04:33:32
27.254.130.69 attack
Sep 21 18:47:00 vps691689 sshd[23320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.130.69
Sep 21 18:47:02 vps691689 sshd[23320]: Failed password for invalid user master from 27.254.130.69 port 50678 ssh2
...
2019-09-22 04:41:58
115.159.198.130 attackbotsspam
Sep 21 19:27:22  postfix/smtpd: warning: unknown[115.159.198.130]: SASL LOGIN authentication failed
2019-09-22 04:30:07
186.112.215.21 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 21-09-2019 13:50:21.
2019-09-22 04:17:16
79.137.72.121 attack
Sep 21 15:23:19 TORMINT sshd\[4448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.72.121  user=root
Sep 21 15:23:22 TORMINT sshd\[4448\]: Failed password for root from 79.137.72.121 port 60506 ssh2
Sep 21 15:27:12 TORMINT sshd\[5000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.72.121  user=root
...
2019-09-22 04:34:00

最近上报的IP列表

126.38.221.5 192.205.225.251 36.103.155.162 213.191.8.160
84.47.199.11 248.13.166.148 46.208.41.152 34.72.64.231
176.76.168.184 89.41.206.144 101.152.17.120 101.19.215.87
152.36.5.187 200.40.94.112 170.142.67.57 26.186.241.155
54.106.177.74 164.226.36.181 178.8.88.43 218.145.128.169