必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Lipa City

省份(region): Calabarzon

国家(country): Philippines

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.149.128.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 642
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;49.149.128.139.			IN	A

;; AUTHORITY SECTION:
.			328	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020102102 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 22 05:57:36 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
139.128.149.49.in-addr.arpa domain name pointer dsl.49.149.128.139.pldt.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.128.149.49.in-addr.arpa	name = dsl.49.149.128.139.pldt.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
186.159.1.81 attackspambots
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-09-13 02:43:13
185.132.228.226 attack
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-09-13 02:44:37
144.217.241.40 attack
Sep 12 18:14:56 apollo sshd\[8975\]: Invalid user hduser from 144.217.241.40Sep 12 18:14:58 apollo sshd\[8975\]: Failed password for invalid user hduser from 144.217.241.40 port 37990 ssh2Sep 12 18:30:30 apollo sshd\[9004\]: Invalid user oracle from 144.217.241.40
...
2019-09-13 02:57:17
112.221.179.133 attackspambots
Sep 12 19:14:18 hosting sshd[22260]: Invalid user test from 112.221.179.133 port 41000
...
2019-09-13 02:24:08
173.248.228.75 attack
Sep 12 20:21:23 legacy sshd[27933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.248.228.75
Sep 12 20:21:24 legacy sshd[27933]: Failed password for invalid user cloudadmin from 173.248.228.75 port 60374 ssh2
Sep 12 20:27:24 legacy sshd[28115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.248.228.75
...
2019-09-13 02:31:45
51.254.123.131 attack
2019-09-12T18:35:44.989324abusebot-2.cloudsearch.cf sshd\[3817\]: Invalid user admin from 51.254.123.131 port 53580
2019-09-13 03:08:52
115.221.231.179 attack
firewall-block, port(s): 22/tcp
2019-09-13 02:51:20
188.187.52.106 attackspam
SSH invalid-user multiple login try
2019-09-13 03:05:06
217.182.68.146 attackbots
F2B jail: sshd. Time: 2019-09-12 20:27:46, Reported by: VKReport
2019-09-13 02:33:06
152.136.87.219 attack
Sep 12 19:31:25 lnxded63 sshd[1361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.87.219
Sep 12 19:31:25 lnxded63 sshd[1361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.87.219
2019-09-13 02:27:06
134.209.90.139 attackspam
Sep 12 20:04:35 eventyay sshd[9571]: Failed password for root from 134.209.90.139 port 58186 ssh2
Sep 12 20:10:51 eventyay sshd[9752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.90.139
Sep 12 20:10:53 eventyay sshd[9752]: Failed password for invalid user redmine from 134.209.90.139 port 42900 ssh2
...
2019-09-13 02:27:32
185.255.96.99 attackbotsspam
This IP address was blacklisted for the following reason:  /en/jobs/ @ 2019-09-12T12:11:59+02:00.
2019-09-13 02:32:09
198.108.66.26 attack
5900/tcp 9200/tcp 465/tcp...
[2019-07-17/09-12]10pkt,7pt.(tcp)
2019-09-13 02:15:23
103.52.16.35 attack
Sep 12 18:41:55 vps691689 sshd[25324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.52.16.35
Sep 12 18:41:57 vps691689 sshd[25324]: Failed password for invalid user 1 from 103.52.16.35 port 53368 ssh2
...
2019-09-13 02:24:33
106.12.132.187 attackbotsspam
Sep 12 17:01:38 microserver sshd[63074]: Invalid user m1necraft from 106.12.132.187 port 52526
Sep 12 17:01:38 microserver sshd[63074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.132.187
Sep 12 17:01:39 microserver sshd[63074]: Failed password for invalid user m1necraft from 106.12.132.187 port 52526 ssh2
Sep 12 17:05:48 microserver sshd[63780]: Invalid user 123 from 106.12.132.187 port 55626
Sep 12 17:05:48 microserver sshd[63780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.132.187
Sep 12 17:19:17 microserver sshd[65481]: Invalid user webserver from 106.12.132.187 port 35686
Sep 12 17:19:17 microserver sshd[65481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.132.187
Sep 12 17:19:19 microserver sshd[65481]: Failed password for invalid user webserver from 106.12.132.187 port 35686 ssh2
Sep 12 17:23:39 microserver sshd[1110]: Invalid user 12345678 from 106.12
2019-09-13 02:13:35

最近上报的IP列表

114.164.13.246 114.164.13.242 54.160.88.66 175.211.78.139
221.168.23.154 47.7.217.161 2603:9008:1080:b640:f580:f676:dcfb:5591 14.34.113.215
222.100.125.98 52.231.176.228 37.237.59.32 66.31.134.52
204.153.229.250 91.175.132.35 199.5.236.0 223.235.131.109
176.147.35.144 164.68.111.194 219.88.232.186 45.227.116.30