必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Sariaya

省份(region): Calabarzon

国家(country): Philippines

运营商(isp): DSL

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attack
Unauthorized connection attempt from IP address 49.149.132.239 on Port 445(SMB)
2019-12-03 03:28:45
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.149.132.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26397
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;49.149.132.239.			IN	A

;; AUTHORITY SECTION:
.			461	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019120201 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 03 03:28:35 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
239.132.149.49.in-addr.arpa domain name pointer dsl.49.149.132.239.pldt.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
239.132.149.49.in-addr.arpa	name = dsl.49.149.132.239.pldt.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.124.143.24 attackspam
Invalid user redmine from 106.124.143.24 port 32920
2020-03-11 16:56:08
120.202.21.189 attackbots
Invalid user lhb from 120.202.21.189 port 41628
2020-03-11 16:25:56
196.46.192.73 attackspambots
Invalid user webapps from 196.46.192.73 port 43998
2020-03-11 16:45:07
175.24.4.159 attackbotsspam
Invalid user developer from 175.24.4.159 port 58570
2020-03-11 16:22:05
158.69.74.71 attackbots
Invalid user gek from 158.69.74.71 port 48010
2020-03-11 16:23:22
182.218.64.111 attackspambots
Invalid user ubuntu from 182.218.64.111 port 38502
2020-03-11 16:47:26
159.65.159.117 attackspam
Invalid user meviafoods from 159.65.159.117 port 34218
2020-03-11 16:36:06
117.248.20.242 attack
Invalid user admin from 117.248.20.242 port 50574
2020-03-11 16:26:47
183.47.14.74 attackbots
Invalid user billy from 183.47.14.74 port 47169
2020-03-11 16:46:56
106.12.209.57 attack
Invalid user smbread from 106.12.209.57 port 36986
2020-03-11 16:57:29
36.189.222.151 attackbots
Invalid user asterisk from 36.189.222.151 port 53300
2020-03-11 16:32:37
121.160.189.214 attack
Invalid user test from 121.160.189.214 port 48584
2020-03-11 16:53:00
103.207.11.10 attackbotsspam
Invalid user odoo from 103.207.11.10 port 51036
2020-03-11 16:58:30
196.220.67.2 attack
Mar 11 03:40:23 sd-53420 sshd\[12469\]: User root from 196.220.67.2 not allowed because none of user's groups are listed in AllowGroups
Mar 11 03:40:23 sd-53420 sshd\[12469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.220.67.2  user=root
Mar 11 03:40:25 sd-53420 sshd\[12469\]: Failed password for invalid user root from 196.220.67.2 port 60855 ssh2
Mar 11 03:46:20 sd-53420 sshd\[13170\]: User root from 196.220.67.2 not allowed because none of user's groups are listed in AllowGroups
Mar 11 03:46:20 sd-53420 sshd\[13170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.220.67.2  user=root
...
2020-03-11 16:17:21
104.236.142.89 attackbotsspam
Invalid user scan from 104.236.142.89 port 43644
2020-03-11 16:58:09

最近上报的IP列表

219.178.118.232 117.203.26.184 78.77.220.164 188.114.6.26
86.234.52.42 179.105.95.31 171.6.204.109 213.184.120.113
32.113.3.26 12.114.90.71 31.23.128.197 74.58.59.182
59.136.153.209 95.70.3.71 99.135.242.14 94.250.161.211
100.166.90.87 178.62.64.61 95.57.189.0 83.163.254.193