必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Hwaseong-si

省份(region): Gyeonggi-do

国家(country): South Korea

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.161.213.218
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52612
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.161.213.218.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062800 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 15:12:39 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 218.213.161.49.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 218.213.161.49.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
37.49.230.29 attackspam
\[2019-12-04 17:15:49\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-12-04T17:15:49.289-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="00003810011441975359003",SessionID="0x7f26c469c4c8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.230.29/58961",ACLName="no_extension_match"
\[2019-12-04 17:16:14\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-12-04T17:16:14.539-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="000039810011441975359003",SessionID="0x7f26c4104768",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.230.29/60534",ACLName="no_extension_match"
\[2019-12-04 17:17:29\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-12-04T17:17:29.937-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="04810011441975359003",SessionID="0x7f26c445f668",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.230.29/496
2019-12-05 06:34:28
218.92.0.154 attackbotsspam
Dec  4 23:31:56 ovpn sshd\[21483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.154  user=root
Dec  4 23:31:58 ovpn sshd\[21483\]: Failed password for root from 218.92.0.154 port 53544 ssh2
Dec  4 23:32:02 ovpn sshd\[21483\]: Failed password for root from 218.92.0.154 port 53544 ssh2
Dec  4 23:32:16 ovpn sshd\[21572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.154  user=root
Dec  4 23:32:18 ovpn sshd\[21572\]: Failed password for root from 218.92.0.154 port 26969 ssh2
2019-12-05 06:53:21
218.92.0.134 attackbotsspam
Dec  4 23:32:59 srv206 sshd[25180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.134  user=root
Dec  4 23:33:01 srv206 sshd[25180]: Failed password for root from 218.92.0.134 port 29038 ssh2
...
2019-12-05 07:00:30
118.25.213.82 attackspam
Brute-force attempt banned
2019-12-05 06:32:58
45.93.20.182 attackspambots
firewall-block, port(s): 19380/tcp
2019-12-05 06:40:56
159.89.165.36 attack
detected by Fail2Ban
2019-12-05 06:30:31
178.62.64.107 attackbotsspam
Dec  4 21:29:30 vmanager6029 sshd\[20884\]: Invalid user shau from 178.62.64.107 port 60424
Dec  4 21:29:30 vmanager6029 sshd\[20884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.64.107
Dec  4 21:29:31 vmanager6029 sshd\[20884\]: Failed password for invalid user shau from 178.62.64.107 port 60424 ssh2
2019-12-05 06:33:14
191.55.190.150 attack
Honeypot attack, port: 5555, PTR: 191-055-190-150.xd-dynamic.algartelecom.com.br.
2019-12-05 06:52:15
34.92.1.74 attackspam
Dec  4 22:32:27 * sshd[30473]: Failed password for backup from 34.92.1.74 port 42852 ssh2
Dec  4 22:38:46 * sshd[31232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.92.1.74
2019-12-05 06:41:14
184.73.150.39 attack
port scan and connect, tcp 1433 (ms-sql-s)
2019-12-05 06:36:45
189.176.86.182 attackspambots
Dec  4 22:49:55 sbg01 sshd[7371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.176.86.182
Dec  4 22:49:56 sbg01 sshd[7371]: Failed password for invalid user !!! from 189.176.86.182 port 50822 ssh2
Dec  4 23:01:47 sbg01 sshd[7416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.176.86.182
2019-12-05 06:45:38
40.87.127.217 attackspambots
2019-12-04T22:44:23.610794stark.klein-stark.info sshd\[14437\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.87.127.217  user=root
2019-12-04T22:44:25.710282stark.klein-stark.info sshd\[14437\]: Failed password for root from 40.87.127.217 port 56818 ssh2
2019-12-04T22:53:15.179540stark.klein-stark.info sshd\[15060\]: Invalid user kummet from 40.87.127.217 port 37098
2019-12-04T22:53:15.186692stark.klein-stark.info sshd\[15060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.87.127.217
...
2019-12-05 06:43:56
188.166.105.228 attackbots
Brute force SMTP login attempted.
...
2019-12-05 06:54:12
222.186.175.148 attackbots
Dec  4 23:34:35 jane sshd[16051]: Failed password for root from 222.186.175.148 port 40196 ssh2
Dec  4 23:34:39 jane sshd[16051]: Failed password for root from 222.186.175.148 port 40196 ssh2
...
2019-12-05 06:39:49
164.132.107.245 attackbotsspam
Dec  4 12:55:05 hanapaa sshd\[12907\]: Invalid user nfs from 164.132.107.245
Dec  4 12:55:05 hanapaa sshd\[12907\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=245.ip-164-132-107.eu
Dec  4 12:55:07 hanapaa sshd\[12907\]: Failed password for invalid user nfs from 164.132.107.245 port 54824 ssh2
Dec  4 13:00:33 hanapaa sshd\[13385\]: Invalid user morin from 164.132.107.245
Dec  4 13:00:33 hanapaa sshd\[13385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=245.ip-164-132-107.eu
2019-12-05 07:04:28

最近上报的IP列表

34.163.48.136 3.170.252.210 33.151.18.15 29.59.128.171
33.227.193.211 27.37.255.211 20.161.62.158 20.242.128.30
222.36.31.157 76.84.136.183 23.114.213.222 23.126.153.37
40.179.175.119 39.4.164.37 153.72.244.156 52.138.16.158
172.229.197.110 106.229.230.151 223.35.59.48 96.186.82.60