必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.46.189.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47951
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.46.189.44.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030600 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 06 23:47:29 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 44.189.46.48.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 44.189.46.48.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
159.148.4.228 attack
Sep  3 02:05:39 hcbb sshd\[6967\]: Invalid user linda from 159.148.4.228
Sep  3 02:05:39 hcbb sshd\[6967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.148.4.228
Sep  3 02:05:41 hcbb sshd\[6967\]: Failed password for invalid user linda from 159.148.4.228 port 47992 ssh2
Sep  3 02:09:39 hcbb sshd\[7405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.148.4.228  user=root
Sep  3 02:09:40 hcbb sshd\[7405\]: Failed password for root from 159.148.4.228 port 52244 ssh2
2019-09-03 21:15:45
123.97.111.82 attackspam
Unauthorized connection attempt from IP address 123.97.111.82 on Port 445(SMB)
2019-09-03 21:42:45
131.221.149.92 attackspam
$f2bV_matches
2019-09-03 21:17:02
218.98.40.141 attackspam
$f2bV_matches
2019-09-03 21:56:42
202.65.140.66 attackspambots
Sep  3 12:28:11 MK-Soft-VM4 sshd\[11053\]: Invalid user ubnt from 202.65.140.66 port 42616
Sep  3 12:28:11 MK-Soft-VM4 sshd\[11053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.65.140.66
Sep  3 12:28:13 MK-Soft-VM4 sshd\[11053\]: Failed password for invalid user ubnt from 202.65.140.66 port 42616 ssh2
...
2019-09-03 20:57:46
149.202.57.244 attackspam
2019-09-03T10:02:31.879430abusebot-5.cloudsearch.cf sshd\[29278\]: Invalid user administrator from 149.202.57.244 port 57750
2019-09-03 21:27:55
142.44.160.214 attack
Sep  3 07:29:37 plusreed sshd[12166]: Invalid user rosco from 142.44.160.214
...
2019-09-03 21:20:33
165.22.112.45 attackbots
Sep  3 11:12:11 MK-Soft-VM7 sshd\[15254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.112.45  user=root
Sep  3 11:12:13 MK-Soft-VM7 sshd\[15254\]: Failed password for root from 165.22.112.45 port 54986 ssh2
Sep  3 11:16:04 MK-Soft-VM7 sshd\[15298\]: Invalid user vf from 165.22.112.45 port 42512
Sep  3 11:16:04 MK-Soft-VM7 sshd\[15298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.112.45
...
2019-09-03 21:05:32
203.48.246.66 attack
Sep  3 09:06:30 vps200512 sshd\[25959\]: Invalid user a1 from 203.48.246.66
Sep  3 09:06:30 vps200512 sshd\[25959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.48.246.66
Sep  3 09:06:32 vps200512 sshd\[25959\]: Failed password for invalid user a1 from 203.48.246.66 port 43924 ssh2
Sep  3 09:11:52 vps200512 sshd\[26117\]: Invalid user nmt from 203.48.246.66
Sep  3 09:11:52 vps200512 sshd\[26117\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.48.246.66
2019-09-03 21:18:13
222.140.10.76 attack
Unauthorised access (Sep  3) SRC=222.140.10.76 LEN=40 TTL=50 ID=30591 TCP DPT=23 WINDOW=11336 SYN
2019-09-03 21:23:11
177.189.210.42 attackspambots
Sep  3 12:37:36 OPSO sshd\[18883\]: Invalid user 123 from 177.189.210.42 port 60137
Sep  3 12:37:36 OPSO sshd\[18883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.189.210.42
Sep  3 12:37:38 OPSO sshd\[18883\]: Failed password for invalid user 123 from 177.189.210.42 port 60137 ssh2
Sep  3 12:42:27 OPSO sshd\[19631\]: Invalid user class123 from 177.189.210.42 port 53274
Sep  3 12:42:27 OPSO sshd\[19631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.189.210.42
2019-09-03 21:10:24
103.228.163.236 attack
Sep  3 13:18:31 v22019058497090703 sshd[12698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.228.163.236
Sep  3 13:18:33 v22019058497090703 sshd[12698]: Failed password for invalid user support from 103.228.163.236 port 55256 ssh2
Sep  3 13:23:11 v22019058497090703 sshd[13032]: Failed password for root from 103.228.163.236 port 41672 ssh2
...
2019-09-03 21:42:06
59.188.250.56 attack
Sep  3 15:51:48 yabzik sshd[28446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.188.250.56
Sep  3 15:51:49 yabzik sshd[28446]: Failed password for invalid user esets from 59.188.250.56 port 49888 ssh2
Sep  3 15:56:15 yabzik sshd[30191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.188.250.56
2019-09-03 21:07:12
113.160.99.106 attackbots
Unauthorized connection attempt from IP address 113.160.99.106 on Port 445(SMB)
2019-09-03 21:41:35
51.83.78.109 attack
Sep  3 11:10:39 MK-Soft-VM6 sshd\[6491\]: Invalid user memuser from 51.83.78.109 port 38894
Sep  3 11:10:39 MK-Soft-VM6 sshd\[6491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.78.109
Sep  3 11:10:41 MK-Soft-VM6 sshd\[6491\]: Failed password for invalid user memuser from 51.83.78.109 port 38894 ssh2
...
2019-09-03 21:38:33

最近上报的IP列表

124.230.54.16 92.61.66.52 19.196.31.248 54.231.131.181
70.141.180.209 107.131.116.194 97.65.78.184 215.58.103.52
202.79.17.58 76.122.94.203 48.48.230.133 224.194.119.143
135.148.15.86 63.237.163.217 208.82.6.203 20.97.197.17
244.127.134.251 153.155.51.129 165.85.70.160 94.161.124.250