必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Suwon

省份(region): Gyeonggi-do

国家(country): South Korea

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.166.92.190
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57980
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.166.92.190.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030700 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 08 00:42:19 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 190.92.166.49.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 190.92.166.49.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
115.76.173.165 attackbots
Invalid user admin from 115.76.173.165 port 50380
2019-12-26 06:18:07
188.113.183.12 attackbotsspam
Honeypot attack, port: 445, PTR: ip-188-113-183-12.z55.ysk.scts.tv.
2019-12-26 05:46:45
113.172.53.136 attack
Dec 25 15:33:11 mxgate1 postfix/postscreen[3551]: CONNECT from [113.172.53.136]:51070 to [176.31.12.44]:25
Dec 25 15:33:11 mxgate1 postfix/dnsblog[3556]: addr 113.172.53.136 listed by domain zen.spamhaus.org as 127.0.0.4
Dec 25 15:33:11 mxgate1 postfix/dnsblog[3556]: addr 113.172.53.136 listed by domain zen.spamhaus.org as 127.0.0.11
Dec 25 15:33:11 mxgate1 postfix/dnsblog[3556]: addr 113.172.53.136 listed by domain zen.spamhaus.org as 127.0.0.3
Dec 25 15:33:11 mxgate1 postfix/dnsblog[3555]: addr 113.172.53.136 listed by domain cbl.abuseat.org as 127.0.0.2
Dec 25 15:33:11 mxgate1 postfix/dnsblog[3553]: addr 113.172.53.136 listed by domain bl.spamcop.net as 127.0.0.2
Dec 25 15:33:11 mxgate1 postfix/dnsblog[3552]: addr 113.172.53.136 listed by domain b.barracudacentral.org as 127.0.0.2
Dec 25 15:33:17 mxgate1 postfix/postscreen[3551]: DNSBL rank 5 for [113.172.53.136]:51070
Dec 25 15:33:18 mxgate1 postfix/tlsproxy[3604]: CONNECT from [113.172.53.136]:51070
Dec x@x


........
------------------------------------
2019-12-26 05:59:24
157.55.39.25 attack
Automatic report - Banned IP Access
2019-12-26 06:14:19
78.163.161.201 attackbots
HTTP/80/443 Probe, BF, WP, Hack -
2019-12-26 06:07:15
177.25.182.62 attack
SSH/22 MH Probe, BF, Hack -
2019-12-26 06:06:26
88.121.22.235 attack
SSH/22 MH Probe, BF, Hack -
2019-12-26 06:12:56
144.217.197.11 attack
Dec2515:46:11server2pure-ftpd:\(\?@144.217.197.11\)[WARNING]Authenticationfailedforuser[novembre]Dec2515:46:16server2pure-ftpd:\(\?@144.217.197.11\)[WARNING]Authenticationfailedforuser[ottobre]Dec2515:46:20server2pure-ftpd:\(\?@144.217.197.11\)[WARNING]Authenticationfailedforuser[solidariet]Dec2515:46:26server2pure-ftpd:\(\?@144.217.197.11\)[WARNING]Authenticationfailedforuser[marzo]Dec2515:46:41server2pure-ftpd:\(\?@144.217.197.11\)[WARNING]Authenticationfailedforuser[nostra]
2019-12-26 06:16:37
103.143.173.25 attack
LAMP,DEF GET /site/wp-login.php
2019-12-26 05:49:10
195.98.176.62 attackspam
postfix
2019-12-26 05:52:26
91.120.101.226 attackspam
SSH/22 MH Probe, BF, Hack -
2019-12-26 05:40:16
51.15.149.58 attack
\[2019-12-25 16:34:58\] NOTICE\[2839\] chan_sip.c: Registration from '"334"\' failed for '51.15.149.58:8848' - Wrong password
\[2019-12-25 16:34:58\] SECURITY\[2857\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-25T16:34:58.182-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="334",SessionID="0x7f0fb4bb5cd8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/51.15.149.58/8848",Challenge="54fe712d",ReceivedChallenge="54fe712d",ReceivedHash="df3016c9588b46e108e8950849c78976"
\[2019-12-25 16:36:34\] NOTICE\[2839\] chan_sip.c: Registration from '"336"\' failed for '51.15.149.58:8962' - Wrong password
\[2019-12-25 16:36:34\] SECURITY\[2857\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-25T16:36:34.419-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="336",SessionID="0x7f0fb4bb5cd8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/51.15.149
2019-12-26 05:47:59
178.128.246.123 attackspambots
Automatic report - Banned IP Access
2019-12-26 06:05:39
157.43.111.66 attackspambots
Unauthorized connection attempt detected from IP address 157.43.111.66 to port 445
2019-12-26 05:55:10
142.93.47.171 attackspambots
BURG,WP GET /site/wp-login.php
2019-12-26 05:45:42

最近上报的IP列表

159.245.44.171 245.128.115.28 38.112.146.213 13.172.135.19
126.214.219.171 178.164.93.152 84.15.185.192 155.131.187.241
62.154.107.129 126.210.61.143 153.4.105.199 224.162.63.35
61.72.97.69 107.61.151.0 52.241.161.115 96.67.239.79
127.249.34.154 219.111.232.195 116.15.58.105 168.199.93.146