必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.150.123.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62556
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.150.123.140.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 05:19:12 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 140.123.150.48.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 140.123.150.48.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.101.43.224 attackbotsspam
Feb 18 15:31:08 mout sshd[26331]: Invalid user peter from 46.101.43.224 port 44672
2020-02-19 00:11:16
152.32.72.122 attackspam
Automatic report - Banned IP Access
2020-02-19 00:43:09
185.220.101.30 attackbotsspam
02/18/2020-14:24:41.001232 185.220.101.30 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 31
2020-02-19 00:16:53
45.134.179.57 attack
firewall-block, port(s): 188/tcp, 189/tcp, 287/tcp, 288/tcp, 687/tcp, 1088/tcp, 1186/tcp, 1289/tcp, 1790/tcp, 2386/tcp, 2488/tcp, 2489/tcp, 2491/tcp, 2588/tcp, 2790/tcp
2020-02-19 00:31:31
82.64.202.165 attack
2020-02-18T16:12:02.685547  sshd[1285]: Invalid user brettc from 82.64.202.165 port 60893
2020-02-18T16:12:02.698966  sshd[1285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.202.165
2020-02-18T16:12:02.685547  sshd[1285]: Invalid user brettc from 82.64.202.165 port 60893
2020-02-18T16:12:04.714488  sshd[1285]: Failed password for invalid user brettc from 82.64.202.165 port 60893 ssh2
...
2020-02-19 00:31:45
192.241.222.128 attackspam
firewall-block, port(s): 1900/udp
2020-02-19 00:41:40
211.157.153.194 attack
Fail2Ban Ban Triggered
2020-02-19 00:50:47
180.87.222.116 attackspam
Automatic report - Port Scan Attack
2020-02-19 00:33:20
94.177.240.4 attack
Feb 18 16:37:29 server sshd[240590]: Failed password for invalid user testtest from 94.177.240.4 port 45698 ssh2
Feb 18 16:40:49 server sshd[242928]: Failed password for invalid user test from 94.177.240.4 port 47372 ssh2
Feb 18 16:44:19 server sshd[245115]: Failed password for root from 94.177.240.4 port 49038 ssh2
2020-02-19 00:13:07
49.233.138.118 attack
2020-02-18T07:39:47.9019201495-001 sshd[6489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.138.118  user=operator
2020-02-18T07:39:50.5101211495-001 sshd[6489]: Failed password for operator from 49.233.138.118 port 35746 ssh2
2020-02-18T08:02:49.2152551495-001 sshd[7801]: Invalid user ubuntu from 49.233.138.118 port 55744
2020-02-18T08:02:49.2190041495-001 sshd[7801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.138.118
2020-02-18T08:02:49.2152551495-001 sshd[7801]: Invalid user ubuntu from 49.233.138.118 port 55744
2020-02-18T08:02:50.8837361495-001 sshd[7801]: Failed password for invalid user ubuntu from 49.233.138.118 port 55744 ssh2
2020-02-18T08:06:49.9284111495-001 sshd[8039]: Invalid user suhao from 49.233.138.118 port 52132
2020-02-18T08:06:49.9323221495-001 sshd[8039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.........
------------------------------
2020-02-19 00:27:15
49.142.41.204 attack
Port probing on unauthorized port 23
2020-02-19 00:26:48
222.186.180.8 attackbots
Feb 18 17:00:31 silence02 sshd[29118]: Failed password for root from 222.186.180.8 port 52252 ssh2
Feb 18 17:00:34 silence02 sshd[29118]: Failed password for root from 222.186.180.8 port 52252 ssh2
Feb 18 17:00:37 silence02 sshd[29118]: Failed password for root from 222.186.180.8 port 52252 ssh2
Feb 18 17:00:40 silence02 sshd[29118]: Failed password for root from 222.186.180.8 port 52252 ssh2
2020-02-19 00:06:31
178.128.243.225 attack
Feb 18 17:22:27 ks10 sshd[1139013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.243.225 
Feb 18 17:22:28 ks10 sshd[1139013]: Failed password for invalid user test1 from 178.128.243.225 port 48296 ssh2
...
2020-02-19 00:51:16
107.175.62.139 attack
Feb 18 06:52:07 ingram sshd[15333]: Invalid user admin from 107.175.62.139
Feb 18 06:52:07 ingram sshd[15333]: Failed password for invalid user admin from 107.175.62.139 port 19464 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=107.175.62.139
2020-02-19 00:40:34
175.153.243.248 attackbots
Feb 18 13:45:45 toyboy sshd[16064]: Invalid user suva from 175.153.243.248
Feb 18 13:45:45 toyboy sshd[16064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.153.243.248
Feb 18 13:45:47 toyboy sshd[16064]: Failed password for invalid user suva from 175.153.243.248 port 32934 ssh2
Feb 18 13:45:47 toyboy sshd[16064]: Received disconnect from 175.153.243.248: 11: Bye Bye [preauth]
Feb 18 13:58:37 toyboy sshd[16567]: Invalid user csgoserver from 175.153.243.248
Feb 18 13:58:37 toyboy sshd[16567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.153.243.248
Feb 18 13:58:40 toyboy sshd[16567]: Failed password for invalid user csgoserver from 175.153.243.248 port 34776 ssh2
Feb 18 13:58:40 toyboy sshd[16567]: Received disconnect from 175.153.243.248: 11: Bye Bye [preauth]
Feb 18 14:01:35 toyboy sshd[16651]: Invalid user ghostname from 175.153.243.248
Feb 18 14:01:35 toyboy sshd[16651]: pam_........
-------------------------------
2020-02-19 00:25:29

最近上报的IP列表

63.81.13.1 145.198.41.80 224.228.20.208 30.185.7.229
155.195.187.242 103.154.191.8 207.86.19.45 225.196.5.10
205.81.87.100 41.165.56.114 50.74.62.201 12.207.205.196
234.88.92.158 84.229.17.209 64.151.147.91 220.172.128.148
49.212.124.58 66.176.101.122 191.59.158.50 202.197.101.144