必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.94.33.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6856
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;48.94.33.41.			IN	A

;; AUTHORITY SECTION:
.			592	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019103000 1800 900 604800 86400

;; Query time: 118 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 30 20:35:56 CST 2019
;; MSG SIZE  rcvd: 115
HOST信息:
Host 41.33.94.48.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 41.33.94.48.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
180.126.220.61 attackbots
20 attempts against mh-ssh on sun.magehost.pro
2019-07-28 23:52:01
54.37.18.31 attackspam
54.37.18.31 - - [28/Jul/2019:13:26:40 +0200] "POST [munged]/wp-login.php HTTP/1.1" 444 0 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 0.000
2019-07-28 22:46:54
223.19.145.61 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-28 23:16:42
185.220.102.4 attackbots
SSH-bruteforce attempts
2019-07-28 23:08:50
121.15.11.13 attackspam
Lines containing failures of 121.15.11.13 (max 1000)
Jul 28 03:10:26 localhost sshd[3427]: User r.r from 121.15.11.13 not allowed because listed in DenyUsers
Jul 28 03:10:26 localhost sshd[3427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.11.13  user=r.r
Jul 28 03:10:29 localhost sshd[3427]: Failed password for invalid user r.r from 121.15.11.13 port 45337 ssh2
Jul 28 03:10:30 localhost sshd[3427]: Received disconnect from 121.15.11.13 port 45337:11: Bye Bye [preauth]
Jul 28 03:10:30 localhost sshd[3427]: Disconnected from invalid user r.r 121.15.11.13 port 45337 [preauth]
Jul 28 03:30:12 localhost sshd[5929]: User r.r from 121.15.11.13 not allowed because listed in DenyUsers
Jul 28 03:30:12 localhost sshd[5929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.11.13  user=r.r
Jul 28 03:30:15 localhost sshd[5929]: Failed password for invalid user r.r from 121.15.11.13 port 3........
------------------------------
2019-07-28 23:21:25
219.156.182.30 attackspambots
scan z
2019-07-28 23:07:04
51.254.135.50 attack
fail2ban honeypot
2019-07-28 23:52:34
46.101.235.214 attackbots
Jul 28 17:09:41 server01 sshd\[17342\]: Invalid user samba from 46.101.235.214
Jul 28 17:09:41 server01 sshd\[17342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.235.214
Jul 28 17:09:44 server01 sshd\[17342\]: Failed password for invalid user samba from 46.101.235.214 port 48088 ssh2
...
2019-07-28 22:54:01
111.231.100.167 attackbots
Jul 28 02:12:50 myhostname sshd[22994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.100.167  user=r.r
Jul 28 02:12:52 myhostname sshd[22994]: Failed password for r.r from 111.231.100.167 port 48156 ssh2
Jul 28 02:12:53 myhostname sshd[22994]: Received disconnect from 111.231.100.167 port 48156:11: Bye Bye [preauth]
Jul 28 02:12:53 myhostname sshd[22994]: Disconnected from 111.231.100.167 port 48156 [preauth]
Jul 28 02:38:01 myhostname sshd[5392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.100.167  user=r.r
Jul 28 02:38:03 myhostname sshd[5392]: Failed password for r.r from 111.231.100.167 port 36877 ssh2
Jul 28 02:38:03 myhostname sshd[5392]: Received disconnect from 111.231.100.167 port 36877:11: Bye Bye [preauth]
Jul 28 02:38:03 myhostname sshd[5392]: Disconnected from 111.231.100.167 port 36877 [preauth]
Jul 28 02:41:30 myhostname sshd[7573]: pam_unix(sshd:auth): ........
-------------------------------
2019-07-28 22:40:17
95.215.204.152 attackspam
Invalid user abcd1234g from 95.215.204.152 port 35028
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.215.204.152
Failed password for invalid user abcd1234g from 95.215.204.152 port 35028 ssh2
Invalid user Welcome2013 from 95.215.204.152 port 58370
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.215.204.152
2019-07-28 22:56:17
191.53.254.133 attackbotsspam
Jul 28 07:26:54 web1 postfix/smtpd[6514]: warning: unknown[191.53.254.133]: SASL PLAIN authentication failed: authentication failure
...
2019-07-28 22:36:02
96.57.28.210 attackbotsspam
Jul 28 14:37:24 s0 sshd\[1102\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.57.28.210
Jul 28 14:37:26 s0 sshd\[1102\]: Failed password for invalid user 18607 from 96.57.28.210 port 52060 ssh2
Jul 28 15:47:48 s0 sshd\[52357\]: Invalid user toyotamr2 from 96.57.28.210 port 35463
...
2019-07-28 23:19:37
119.28.73.77 attackspam
Jul 28 16:19:19 dedicated sshd[9241]: Invalid user idctest!@# from 119.28.73.77 port 51676
2019-07-28 23:51:02
35.242.250.3 attackspam
35.242.250.3 - - [28/Jul/2019:15:09:10 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
35.242.250.3 - - [28/Jul/2019:15:09:10 +0200] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
35.242.250.3 - - [28/Jul/2019:15:09:10 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
35.242.250.3 - - [28/Jul/2019:15:09:10 +0200] "POST /wp-login.php HTTP/1.1" 200 1631 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
35.242.250.3 - - [28/Jul/2019:15:09:10 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
35.242.250.3 - - [28/Jul/2019:15:09:11 +0200] "POST /wp-login.php HTTP/1.1" 200 1630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-07-28 23:13:24
2.206.26.156 attack
Jul 28 16:37:42 vps647732 sshd[22141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.206.26.156
Jul 28 16:37:44 vps647732 sshd[22141]: Failed password for invalid user abc54321 from 2.206.26.156 port 33585 ssh2
...
2019-07-28 22:46:24

最近上报的IP列表

27.130.66.69 128.236.102.151 128.186.112.189 87.103.201.27
12.224.214.34 4.96.92.235 251.80.82.231 49.233.31.179
101.27.247.2 14.18.198.200 82.54.35.92 84.117.179.83
197.102.162.219 74.183.175.255 5.106.200.17 55.153.65.193
37.112.214.154 157.163.30.18 27.15.146.249 103.10.115.197