必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.117.66.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56282
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.117.66.150.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 18:01:11 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 150.66.117.49.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 150.66.117.49.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
187.65.240.24 attackbotsspam
Jun 27 21:42:29 www sshd[9946]: reveeclipse mapping checking getaddrinfo for bb41f018.virtua.com.br [187.65.240.24] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 27 21:42:29 www sshd[9946]: Invalid user amanda from 187.65.240.24
Jun 27 21:42:29 www sshd[9946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.65.240.24 
Jun 27 21:42:31 www sshd[9946]: Failed password for invalid user amanda from 187.65.240.24 port 61334 ssh2
Jun 27 21:42:31 www sshd[9946]: Received disconnect from 187.65.240.24: 11: Bye Bye [preauth]
Jun 27 21:46:11 www sshd[10032]: reveeclipse mapping checking getaddrinfo for bb41f018.virtua.com.br [187.65.240.24] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 27 21:46:11 www sshd[10032]: Invalid user sistemas2 from 187.65.240.24
Jun 27 21:46:11 www sshd[10032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.65.240.24 
Jun 27 21:46:13 www sshd[10032]: Failed password for invalid ........
-------------------------------
2019-06-28 16:26:07
200.189.12.86 attackbots
Brute force attempt
2019-06-28 16:39:54
138.197.105.79 attackspam
Jun 28 08:51:49 mail sshd\[4700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.105.79  user=root
Jun 28 08:51:50 mail sshd\[4700\]: Failed password for root from 138.197.105.79 port 36566 ssh2
...
2019-06-28 16:40:28
141.98.10.41 attackbotsspam
Rude login attack (5 tries in 1d)
2019-06-28 17:11:12
89.38.148.104 attack
port scan and connect, tcp 22 (ssh)
2019-06-28 17:07:40
45.125.65.91 attack
Rude login attack (6 tries in 1d)
2019-06-28 16:57:28
198.55.123.235 attack
445/tcp 445/tcp 445/tcp...
[2019-05-02/06-27]12pkt,1pt.(tcp)
2019-06-28 16:28:14
37.139.4.138 attackspam
Automated report - ssh fail2ban:
Jun 28 08:08:41 wrong password, user=monitoring, port=34549, ssh2
Jun 28 08:39:14 authentication failure 
Jun 28 08:39:16 wrong password, user=ehasco, port=40209, ssh2
2019-06-28 16:38:16
185.36.81.168 attackspam
Rude login attack (4 tries in 1d)
2019-06-28 16:24:33
139.59.74.143 attackspambots
SSH Brute-Force reported by Fail2Ban
2019-06-28 17:14:13
128.199.96.234 attackspam
Jun 28 10:34:40 vps647732 sshd[2010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.96.234
Jun 28 10:34:42 vps647732 sshd[2010]: Failed password for invalid user teamspeak from 128.199.96.234 port 49156 ssh2
...
2019-06-28 16:39:23
131.247.11.245 attackbots
Jun 27 20:07:08 sanyalnet-awsem3-1 sshd[3396]: Connection from 131.247.11.245 port 35682 on 172.30.0.184 port 22
Jun 27 20:07:08 sanyalnet-awsem3-1 sshd[3396]: reveeclipse mapping checking getaddrinfo for enb237-01.forest.usf.edu [131.247.11.245] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 27 20:07:08 sanyalnet-awsem3-1 sshd[3396]: Invalid user teamspeak from 131.247.11.245
Jun 27 20:07:08 sanyalnet-awsem3-1 sshd[3396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.247.11.245 
Jun 27 20:07:10 sanyalnet-awsem3-1 sshd[3396]: Failed password for invalid user teamspeak from 131.247.11.245 port 35682 ssh2
Jun 27 20:07:10 sanyalnet-awsem3-1 sshd[3396]: Received disconnect from 131.247.11.245: 11: Bye Bye [preauth]
Jun 27 20:08:50 sanyalnet-awsem3-1 sshd[3455]: Connection from 131.247.11.245 port 55564 on 172.30.0.184 port 22
Jun 27 20:08:51 sanyalnet-awsem3-1 sshd[3455]: reveeclipse mapping checking getaddrinfo for enb237-01.forest.us........
-------------------------------
2019-06-28 16:58:03
116.99.183.13 attackbotsspam
Jun 28 07:03:15 mxgate1 sshd[593]: Invalid user admin from 116.99.183.13 port 53932
Jun 28 07:03:15 mxgate1 sshd[593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.99.183.13
Jun 28 07:03:17 mxgate1 sshd[593]: Failed password for invalid user admin from 116.99.183.13 port 53932 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=116.99.183.13
2019-06-28 16:41:40
36.232.129.85 attackbotsspam
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(06281018)
2019-06-28 16:25:08
122.248.37.19 attack
445/tcp 445/tcp 445/tcp...
[2019-05-18/06-28]6pkt,1pt.(tcp)
2019-06-28 17:12:18

最近上报的IP列表

34.39.78.85 196.89.225.180 122.57.5.208 249.94.104.16
91.240.36.36 23.14.255.127 250.38.198.51 255.58.69.103
132.194.143.24 229.232.235.2 27.248.254.152 204.44.208.128
93.38.139.188 78.217.61.54 250.210.30.208 192.1.241.231
64.137.18.230 128.3.146.71 239.227.76.42 179.35.213.114