必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): Tencent Cloud Computing (Beijing) Co. Ltd.

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attackspambots
Dec  3 00:42:09 sbg01 sshd[13594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.214.68
Dec  3 00:42:12 sbg01 sshd[13594]: Failed password for invalid user app from 49.235.214.68 port 44222 ssh2
Dec  3 00:49:03 sbg01 sshd[13698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.214.68
2019-12-03 07:50:03
attack
Dec  2 06:29:04 vibhu-HP-Z238-Microtower-Workstation sshd\[20189\]: Invalid user rupinna from 49.235.214.68
Dec  2 06:29:04 vibhu-HP-Z238-Microtower-Workstation sshd\[20189\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.214.68
Dec  2 06:29:06 vibhu-HP-Z238-Microtower-Workstation sshd\[20189\]: Failed password for invalid user rupinna from 49.235.214.68 port 48308 ssh2
Dec  2 06:36:14 vibhu-HP-Z238-Microtower-Workstation sshd\[20861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.214.68  user=root
Dec  2 06:36:16 vibhu-HP-Z238-Microtower-Workstation sshd\[20861\]: Failed password for root from 49.235.214.68 port 51096 ssh2
...
2019-12-02 09:14:09
attackspambots
Nov 29 09:37:43 root sshd[17264]: Failed password for root from 49.235.214.68 port 45862 ssh2
Nov 29 09:49:44 root sshd[17426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.214.68 
Nov 29 09:49:47 root sshd[17426]: Failed password for invalid user info from 49.235.214.68 port 34108 ssh2
...
2019-11-29 17:37:39
attackspam
Nov 17 04:29:23 firewall sshd[10821]: Invalid user martineaud from 49.235.214.68
Nov 17 04:29:25 firewall sshd[10821]: Failed password for invalid user martineaud from 49.235.214.68 port 37594 ssh2
Nov 17 04:34:04 firewall sshd[10913]: Invalid user roziah from 49.235.214.68
...
2019-11-17 16:30:21
attackbotsspam
2019-11-16T23:45:21.362635shield sshd\[14668\]: Invalid user jahari from 49.235.214.68 port 50224
2019-11-16T23:45:21.367060shield sshd\[14668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.214.68
2019-11-16T23:45:23.320116shield sshd\[14668\]: Failed password for invalid user jahari from 49.235.214.68 port 50224 ssh2
2019-11-16T23:49:56.369273shield sshd\[15805\]: Invalid user grohler from 49.235.214.68 port 56504
2019-11-16T23:49:56.372326shield sshd\[15805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.214.68
2019-11-17 07:57:25
attackbots
Tried sshing with brute force.
2019-11-16 23:43:23
attack
Nov 15 05:54:54 vps691689 sshd[10419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.214.68
Nov 15 05:54:56 vps691689 sshd[10419]: Failed password for invalid user corsentino from 49.235.214.68 port 49062 ssh2
...
2019-11-15 13:15:06
attackspam
Nov  7 07:14:25 auw2 sshd\[19523\]: Invalid user nsapril from 49.235.214.68
Nov  7 07:14:25 auw2 sshd\[19523\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.214.68
Nov  7 07:14:26 auw2 sshd\[19523\]: Failed password for invalid user nsapril from 49.235.214.68 port 33358 ssh2
Nov  7 07:18:23 auw2 sshd\[19860\]: Invalid user song from 49.235.214.68
Nov  7 07:18:23 auw2 sshd\[19860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.214.68
2019-11-08 04:04:53
attackspambots
Oct 31 03:53:26 server sshd\[20923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.214.68  user=root
Oct 31 03:53:28 server sshd\[20923\]: Failed password for root from 49.235.214.68 port 34724 ssh2
Oct 31 23:12:05 server sshd\[24392\]: Invalid user stpi from 49.235.214.68
Oct 31 23:12:05 server sshd\[24392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.214.68 
Oct 31 23:12:07 server sshd\[24392\]: Failed password for invalid user stpi from 49.235.214.68 port 58968 ssh2
...
2019-11-01 06:50:18
attack
2019-10-09T05:47:48.438758lon01.zurich-datacenter.net sshd\[12639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.214.68  user=root
2019-10-09T05:47:50.717311lon01.zurich-datacenter.net sshd\[12639\]: Failed password for root from 49.235.214.68 port 46528 ssh2
2019-10-09T05:52:29.975439lon01.zurich-datacenter.net sshd\[12737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.214.68  user=root
2019-10-09T05:52:32.162983lon01.zurich-datacenter.net sshd\[12737\]: Failed password for root from 49.235.214.68 port 51450 ssh2
2019-10-09T05:57:15.379257lon01.zurich-datacenter.net sshd\[12840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.214.68  user=root
...
2019-10-09 12:38:46
attack
Unauthorized SSH login attempts
2019-10-08 17:28:35
attack
Oct  3 22:48:04 dev0-dcfr-rnet sshd[26955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.214.68
Oct  3 22:48:06 dev0-dcfr-rnet sshd[26955]: Failed password for invalid user public from 49.235.214.68 port 40970 ssh2
Oct  3 22:52:03 dev0-dcfr-rnet sshd[27006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.214.68
2019-10-04 06:24:01
attackbots
2019-10-01T08:48:33.184799abusebot-8.cloudsearch.cf sshd\[5817\]: Invalid user go from 49.235.214.68 port 53540
2019-10-01 16:50:17
attackbots
Sep 22 14:41:14 minden010 sshd[8033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.214.68
Sep 22 14:41:15 minden010 sshd[8033]: Failed password for invalid user px from 49.235.214.68 port 60882 ssh2
Sep 22 14:46:30 minden010 sshd[9787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.214.68
...
2019-09-22 21:44:40
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.235.214.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34280
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;49.235.214.68.			IN	A

;; AUTHORITY SECTION:
.			508	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019092200 1800 900 604800 86400

;; Query time: 486 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 22 21:44:35 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
Host 68.214.235.49.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 68.214.235.49.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
18.224.149.163 attackspam
mue-5 : Block HTTP using HEAD/TRACE/DELETE/TRACK methods=>/images/jdownloads/screenshots/update.php
2020-02-27 08:12:46
218.92.0.138 attackspam
Feb 26 19:11:57 NPSTNNYC01T sshd[12754]: Failed password for root from 218.92.0.138 port 17558 ssh2
Feb 26 19:12:07 NPSTNNYC01T sshd[12754]: Failed password for root from 218.92.0.138 port 17558 ssh2
Feb 26 19:12:11 NPSTNNYC01T sshd[12754]: Failed password for root from 218.92.0.138 port 17558 ssh2
Feb 26 19:12:11 NPSTNNYC01T sshd[12754]: error: maximum authentication attempts exceeded for root from 218.92.0.138 port 17558 ssh2 [preauth]
...
2020-02-27 08:14:41
188.131.213.192 attackbotsspam
Feb 26 21:58:40 XXX sshd[5496]: Invalid user sinus from 188.131.213.192 port 55632
2020-02-27 08:02:26
186.115.205.126 attackspam
Feb 26 23:17:36 srv01 sshd[21724]: Invalid user cpaneleximscanner from 186.115.205.126 port 39427
Feb 26 23:17:36 srv01 sshd[21724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.115.205.126
Feb 26 23:17:36 srv01 sshd[21724]: Invalid user cpaneleximscanner from 186.115.205.126 port 39427
Feb 26 23:17:37 srv01 sshd[21724]: Failed password for invalid user cpaneleximscanner from 186.115.205.126 port 39427 ssh2
Feb 26 23:23:21 srv01 sshd[22203]: Invalid user m from 186.115.205.126 port 51357
...
2020-02-27 08:01:30
110.17.3.157 attackspambots
[portscan] Port scan
2020-02-27 07:40:18
95.143.218.220 attackspam
(sshd) Failed SSH login from 95.143.218.220 (RU/Russia/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb 26 22:48:03 ubnt-55d23 sshd[15500]: Invalid user zhangshihao from 95.143.218.220 port 46294
Feb 26 22:48:06 ubnt-55d23 sshd[15500]: Failed password for invalid user zhangshihao from 95.143.218.220 port 46294 ssh2
2020-02-27 08:09:27
120.195.144.116 attack
Attempts against SMTP/SSMTP
2020-02-27 07:53:29
218.92.0.171 attack
Feb 26 23:44:53 localhost sshd\[21348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.171  user=root
Feb 26 23:44:55 localhost sshd\[21348\]: Failed password for root from 218.92.0.171 port 57478 ssh2
Feb 26 23:44:58 localhost sshd\[21348\]: Failed password for root from 218.92.0.171 port 57478 ssh2
Feb 26 23:45:02 localhost sshd\[21348\]: Failed password for root from 218.92.0.171 port 57478 ssh2
Feb 26 23:45:05 localhost sshd\[21348\]: Failed password for root from 218.92.0.171 port 57478 ssh2
...
2020-02-27 07:47:49
106.12.33.67 attack
Repeated brute force against a port
2020-02-27 07:55:18
190.144.33.65 attack
Icarus honeypot on github
2020-02-27 07:48:54
213.32.91.71 attackbotsspam
Automatic report - XMLRPC Attack
2020-02-27 08:01:12
181.123.177.204 attack
Feb 27 00:14:41 lnxweb61 sshd[11532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.123.177.204
2020-02-27 07:49:56
115.159.99.126 attack
Unauthorized connection attempt detected from IP address 115.159.99.126 to port 445
2020-02-27 07:54:57
222.186.175.182 attackbots
Feb 27 00:43:48 jane sshd[17173]: Failed password for root from 222.186.175.182 port 18604 ssh2
Feb 27 00:43:50 jane sshd[17173]: Failed password for root from 222.186.175.182 port 18604 ssh2
...
2020-02-27 07:46:02
139.59.180.53 attackspambots
Invalid user admin from 139.59.180.53 port 56842
2020-02-27 08:06:08

最近上报的IP列表

144.76.149.117 144.76.149.115 19.248.247.10 94.177.240.4
127.56.186.220 22.245.113.143 94.3.239.0 140.15.23.17
120.248.66.89 182.78.9.220 190.35.111.137 250.104.136.244
255.21.130.72 89.16.107.99 89.108.169.2 216.124.151.114
121.168.136.233 162.217.165.50 49.126.23.87 148.224.190.192