必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.9.44.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49311
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.9.44.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013001 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 13:47:21 CST 2025
;; MSG SIZE  rcvd: 103
HOST信息:
Host 99.44.9.48.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.44.9.48.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
92.42.47.63 attack
$f2bV_matches
2019-12-14 18:57:45
181.169.252.31 attackspam
2019-12-14T10:15:56.157207  sshd[19396]: Invalid user gama from 181.169.252.31 port 51376
2019-12-14T10:15:56.171938  sshd[19396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.169.252.31
2019-12-14T10:15:56.157207  sshd[19396]: Invalid user gama from 181.169.252.31 port 51376
2019-12-14T10:15:57.804962  sshd[19396]: Failed password for invalid user gama from 181.169.252.31 port 51376 ssh2
2019-12-14T10:38:22.372208  sshd[19899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.169.252.31  user=root
2019-12-14T10:38:24.120525  sshd[19899]: Failed password for root from 181.169.252.31 port 34171 ssh2
...
2019-12-14 18:59:00
128.199.49.23 attackbots
Dec 14 11:31:51 meumeu sshd[28072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.49.23 
Dec 14 11:31:54 meumeu sshd[28072]: Failed password for invalid user apache from 128.199.49.23 port 34876 ssh2
Dec 14 11:37:26 meumeu sshd[28911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.49.23 
...
2019-12-14 18:52:28
94.102.49.65 attackspam
Dec 14 14:09:19 debian-2gb-vpn-nbg1-1 kernel: [700134.068666] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=94.102.49.65 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=15601 PROTO=TCP SPT=46104 DPT=56715 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-14 19:13:31
61.218.32.119 attackbotsspam
Dec 14 11:01:49 server sshd\[14759\]: Invalid user bullick from 61.218.32.119
Dec 14 11:01:49 server sshd\[14759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61-218-32-119.hinet-ip.hinet.net 
Dec 14 11:01:51 server sshd\[14759\]: Failed password for invalid user bullick from 61.218.32.119 port 40608 ssh2
Dec 14 11:12:43 server sshd\[17998\]: Invalid user home from 61.218.32.119
Dec 14 11:12:43 server sshd\[17998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61-218-32-119.hinet-ip.hinet.net 
...
2019-12-14 18:42:33
114.32.152.14 attackbotsspam
TCP Port Scanning
2019-12-14 19:17:04
39.96.11.225 attackspambots
Unauthorised access (Dec 14) SRC=39.96.11.225 LEN=60 TTL=45 ID=17221 DF TCP DPT=8080 WINDOW=29200 SYN
2019-12-14 18:43:29
112.217.207.130 attackbotsspam
Dec 14 13:48:56 server sshd\[32162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.217.207.130  user=root
Dec 14 13:48:58 server sshd\[32162\]: Failed password for root from 112.217.207.130 port 51850 ssh2
Dec 14 13:57:19 server sshd\[2317\]: Invalid user com from 112.217.207.130
Dec 14 13:57:19 server sshd\[2317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.217.207.130 
Dec 14 13:57:21 server sshd\[2317\]: Failed password for invalid user com from 112.217.207.130 port 57184 ssh2
...
2019-12-14 19:05:48
45.55.86.19 attack
Invalid user valdemoro from 45.55.86.19 port 45595
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.86.19
Failed password for invalid user valdemoro from 45.55.86.19 port 45595 ssh2
Invalid user ralf123 from 45.55.86.19 port 49799
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.86.19
2019-12-14 18:58:03
162.243.10.64 attackspam
Dec 14 07:43:05 Ubuntu-1404-trusty-64-minimal sshd\[22865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.10.64  user=root
Dec 14 07:43:07 Ubuntu-1404-trusty-64-minimal sshd\[22865\]: Failed password for root from 162.243.10.64 port 48876 ssh2
Dec 14 07:49:08 Ubuntu-1404-trusty-64-minimal sshd\[25220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.10.64  user=sshd
Dec 14 07:49:11 Ubuntu-1404-trusty-64-minimal sshd\[25220\]: Failed password for sshd from 162.243.10.64 port 41762 ssh2
Dec 14 07:54:05 Ubuntu-1404-trusty-64-minimal sshd\[28533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.10.64  user=root
2019-12-14 19:04:09
40.117.135.57 attackbotsspam
Dec 14 11:39:51 localhost sshd\[3810\]: Invalid user ytrehgfdnbvc from 40.117.135.57 port 54442
Dec 14 11:39:51 localhost sshd\[3810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.117.135.57
Dec 14 11:39:53 localhost sshd\[3810\]: Failed password for invalid user ytrehgfdnbvc from 40.117.135.57 port 54442 ssh2
2019-12-14 18:54:40
209.17.97.50 attackspam
Automatic report - Banned IP Access
2019-12-14 18:40:43
218.92.0.212 attackbots
2019-12-13 UTC: 3x - (3x)
2019-12-14 19:03:39
77.247.108.119 attackbots
Dec 14 12:41:59 debian-2gb-vpn-nbg1-1 kernel: [694894.392898] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=77.247.108.119 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=15589 PROTO=TCP SPT=50187 DPT=5038 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-14 18:45:37
134.73.31.181 attackspam
Dec 14 07:25:26 grey postfix/smtpd\[13593\]: NOQUEUE: reject: RCPT from unknown\[134.73.31.181\]: 554 5.7.1 Service unavailable\; Client host \[134.73.31.181\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[134.73.31.181\]\; from=\ to=\ proto=ESMTP helo=\
...
2019-12-14 18:55:01

最近上报的IP列表

115.100.52.219 60.200.117.61 140.14.89.157 187.112.106.88
118.90.143.222 241.97.107.246 150.252.136.177 33.255.234.18
7.177.72.148 96.76.147.150 251.220.70.192 139.186.139.247
89.129.111.161 218.60.2.241 54.47.16.70 85.224.51.126
198.28.22.123 20.112.165.255 155.239.3.0 154.100.200.54