必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom of Great Britain and Northern Ireland (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.249.148.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55552
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.249.148.72.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 07:43:01 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 72.148.249.48.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 72.148.249.48.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
165.22.77.105 attack
5,52-10/02 [bc00/m32] concatform PostRequest-Spammer scoring: Durban01
2019-07-29 00:08:21
78.145.234.110 attackspam
Hits on port 5500 (VNC ?)
2019-07-29 01:12:30
157.230.13.28 attackspambots
Jul 28 18:50:07 mail sshd\[13138\]: Invalid user 10 from 157.230.13.28 port 44546
Jul 28 18:50:07 mail sshd\[13138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.13.28
Jul 28 18:50:09 mail sshd\[13138\]: Failed password for invalid user 10 from 157.230.13.28 port 44546 ssh2
Jul 28 18:55:39 mail sshd\[13844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.13.28  user=root
Jul 28 18:55:41 mail sshd\[13844\]: Failed password for root from 157.230.13.28 port 39582 ssh2
2019-07-29 01:08:37
217.29.21.66 attack
Jul 28 16:02:01 MK-Soft-VM5 sshd\[5757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.29.21.66  user=root
Jul 28 16:02:03 MK-Soft-VM5 sshd\[5757\]: Failed password for root from 217.29.21.66 port 41720 ssh2
Jul 28 16:07:01 MK-Soft-VM5 sshd\[5791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.29.21.66  user=root
...
2019-07-29 00:52:56
177.144.132.213 attack
Automatic report - Banned IP Access
2019-07-29 01:18:16
89.46.74.105 attackspam
Jul 28 18:10:42 apollo sshd\[6992\]: Failed password for root from 89.46.74.105 port 34934 ssh2Jul 28 18:15:05 apollo sshd\[6994\]: Failed password for root from 89.46.74.105 port 58118 ssh2Jul 28 18:19:39 apollo sshd\[7001\]: Failed password for root from 89.46.74.105 port 53078 ssh2
...
2019-07-29 00:45:34
49.69.175.172 attackspam
20 attempts against mh-ssh on sky.magehost.pro
2019-07-29 00:53:44
106.13.33.181 attack
SSH Brute-Force reported by Fail2Ban
2019-07-29 01:11:48
114.113.68.226 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-29 00:09:12
43.226.148.117 attackspambots
Jul 28 07:34:57 vps200512 sshd\[9537\]: Invalid user dhushy from 43.226.148.117
Jul 28 07:34:57 vps200512 sshd\[9537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.148.117
Jul 28 07:34:59 vps200512 sshd\[9537\]: Failed password for invalid user dhushy from 43.226.148.117 port 46306 ssh2
Jul 28 07:40:05 vps200512 sshd\[9722\]: Invalid user 123a123b from 43.226.148.117
Jul 28 07:40:05 vps200512 sshd\[9722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.148.117
2019-07-29 00:37:17
103.28.22.138 attackbotsspam
Wordpress Admin Login attack
2019-07-29 00:10:06
181.30.26.40 attackbots
Jul 28 17:27:28 mail sshd\[16858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.26.40  user=root
Jul 28 17:27:30 mail sshd\[16858\]: Failed password for root from 181.30.26.40 port 48744 ssh2
...
2019-07-29 00:35:31
176.53.90.26 attackspambots
GET posting.php
2019-07-29 00:37:57
59.20.72.164 attack
59.20.72.164 - - [28/Jul/2019:15:33:21 +0200] "GET /wp-login.php HTTP/1.1" 200 4402 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
59.20.72.164 - - [28/Jul/2019:15:33:23 +0200] "POST /wp-login.php HTTP/1.1" 200 4402 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
59.20.72.164 - - [28/Jul/2019:15:33:24 +0200] "GET /wp-login.php HTTP/1.1" 200 4402 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
59.20.72.164 - - [28/Jul/2019:15:33:26 +0200] "POST /wp-login.php HTTP/1.1" 200 4402 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
59.20.72.164 - - [28/Jul/2019:15:33:27 +0200] "GET /wp-login.php HTTP/1.1" 200 4402 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
59.20.72.164 - - [28/Jul/2019:15:33:29 +0200] "POST /wp-login.php HTTP/1.1" 200 4402 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-07-29 01:04:25
183.82.99.139 attackbots
Jul 28 18:43:51 OPSO sshd\[15088\]: Invalid user rapture from 183.82.99.139 port 58046
Jul 28 18:43:51 OPSO sshd\[15088\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.99.139
Jul 28 18:43:53 OPSO sshd\[15088\]: Failed password for invalid user rapture from 183.82.99.139 port 58046 ssh2
Jul 28 18:48:51 OPSO sshd\[15721\]: Invalid user friend123 from 183.82.99.139 port 39274
Jul 28 18:48:51 OPSO sshd\[15721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.99.139
2019-07-29 00:56:05

最近上报的IP列表

238.63.130.30 32.195.200.144 130.65.247.16 237.89.29.119
63.40.149.78 143.62.168.247 202.117.58.25 73.240.74.147
50.4.225.210 84.208.192.165 216.6.95.114 196.24.253.133
63.243.75.168 173.55.194.34 46.145.77.174 160.14.225.196
16.228.251.98 45.66.109.225 131.189.112.75 155.242.172.98