必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.241.72.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11067
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.241.72.72.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 09:28:35 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
72.72.241.49.in-addr.arpa domain name pointer 72.72.241.49.ap.yournet.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
72.72.241.49.in-addr.arpa	name = 72.72.241.49.ap.yournet.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
81.131.75.134 attackbots
Apr 19 08:45:08 hostnameproxy sshd[22980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.131.75.134  user=r.r
Apr 19 08:45:10 hostnameproxy sshd[22980]: Failed password for r.r from 81.131.75.134 port 33671 ssh2
Apr 19 08:47:50 hostnameproxy sshd[23077]: Invalid user ubnt from 81.131.75.134 port 33766
Apr 19 08:47:50 hostnameproxy sshd[23077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.131.75.134
Apr 19 08:47:53 hostnameproxy sshd[23077]: Failed password for invalid user ubnt from 81.131.75.134 port 33766 ssh2
Apr 19 08:50:33 hostnameproxy sshd[23167]: Invalid user osmc from 81.131.75.134 port 33858
Apr 19 08:50:33 hostnameproxy sshd[23167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.131.75.134
Apr 19 08:50:35 hostnameproxy sshd[23167]: Failed password for invalid user osmc from 81.131.75.134 port 33858 ssh2
Apr 19 08:53:16 hostname........
------------------------------
2020-04-19 23:09:27
222.165.186.51 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-04-19 22:44:44
77.55.212.26 attackspambots
Apr 19 13:40:59 rs-7 sshd[37322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.55.212.26  user=r.r
Apr 19 13:41:01 rs-7 sshd[37322]: Failed password for r.r from 77.55.212.26 port 39708 ssh2
Apr 19 13:41:01 rs-7 sshd[37322]: Received disconnect from 77.55.212.26 port 39708:11: Bye Bye [preauth]
Apr 19 13:41:01 rs-7 sshd[37322]: Disconnected from 77.55.212.26 port 39708 [preauth]
Apr 19 13:49:18 rs-7 sshd[38634]: Invalid user daijiabao from 77.55.212.26 port 56432
Apr 19 13:49:18 rs-7 sshd[38634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.55.212.26


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=77.55.212.26
2020-04-19 22:38:20
177.96.38.177 attackspam
Apr 19 13:52:51 pl1server sshd[7593]: reveeclipse mapping checking getaddrinfo for 177.96.38.177.dynamic.adsl.gvt.net.br [177.96.38.177] failed - POSSIBLE BREAK-IN ATTEMPT!
Apr 19 13:52:51 pl1server sshd[7593]: Invalid user admin from 177.96.38.177
Apr 19 13:52:51 pl1server sshd[7593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.96.38.177
Apr 19 13:52:53 pl1server sshd[7593]: Failed password for invalid user admin from 177.96.38.177 port 41825 ssh2
Apr 19 13:52:53 pl1server sshd[7593]: Received disconnect from 177.96.38.177: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=177.96.38.177
2020-04-19 23:04:31
129.211.70.33 attackbots
Apr 19 14:03:09 vpn01 sshd[28945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.70.33
Apr 19 14:03:12 vpn01 sshd[28945]: Failed password for invalid user up from 129.211.70.33 port 43829 ssh2
...
2020-04-19 22:43:38
195.154.133.163 attackbots
195.154.133.163 - - [19/Apr/2020:18:35:03 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2020-04-19 22:36:43
69.229.6.52 attack
Apr 19 14:02:49 ncomp sshd[13128]: Invalid user admin from 69.229.6.52
Apr 19 14:02:49 ncomp sshd[13128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.229.6.52
Apr 19 14:02:49 ncomp sshd[13128]: Invalid user admin from 69.229.6.52
Apr 19 14:02:51 ncomp sshd[13128]: Failed password for invalid user admin from 69.229.6.52 port 45112 ssh2
2020-04-19 23:04:05
186.101.32.102 attackbotsspam
Apr 19 11:57:23 localhost sshd[52501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.101.32.102  user=root
Apr 19 11:57:25 localhost sshd[52501]: Failed password for root from 186.101.32.102 port 54044 ssh2
Apr 19 12:03:11 localhost sshd[53121]: Invalid user ja from 186.101.32.102 port 46292
Apr 19 12:03:11 localhost sshd[53121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.101.32.102
Apr 19 12:03:11 localhost sshd[53121]: Invalid user ja from 186.101.32.102 port 46292
Apr 19 12:03:13 localhost sshd[53121]: Failed password for invalid user ja from 186.101.32.102 port 46292 ssh2
...
2020-04-19 22:43:22
49.81.17.188 attackspambots
Apr 19 21:50:30 our-server-hostname postfix/smtpd[24410]: connect from unknown[49.81.17.188]
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.81.17.188
2020-04-19 23:00:44
151.37.132.1 attackspam
1587297794 - 04/19/2020 14:03:14 Host: 151.37.132.1/151.37.132.1 Port: 445 TCP Blocked
2020-04-19 22:42:28
114.67.110.221 attackbotsspam
Apr 19 15:00:36 Enigma sshd[29554]: Failed password for invalid user gitlab from 114.67.110.221 port 55862 ssh2
Apr 19 15:02:57 Enigma sshd[29729]: Invalid user gitlab from 114.67.110.221 port 56410
Apr 19 15:02:57 Enigma sshd[29729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.110.221
Apr 19 15:02:57 Enigma sshd[29729]: Invalid user gitlab from 114.67.110.221 port 56410
Apr 19 15:03:00 Enigma sshd[29729]: Failed password for invalid user gitlab from 114.67.110.221 port 56410 ssh2
2020-04-19 22:53:02
162.243.133.182 attackspambots
srv03 Mass scanning activity detected Target: 5432(postgresql) ..
2020-04-19 22:47:41
162.242.251.22 attackbotsspam
Apr 19 16:22:29 vpn01 sshd[31498]: Failed password for root from 162.242.251.22 port 37706 ssh2
Apr 19 16:22:31 vpn01 sshd[31502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.242.251.22
...
2020-04-19 22:59:22
124.105.173.17 attack
Apr 19 19:00:22 itv-usvr-01 sshd[22448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.105.173.17  user=ubuntu
Apr 19 19:00:23 itv-usvr-01 sshd[22448]: Failed password for ubuntu from 124.105.173.17 port 37227 ssh2
Apr 19 19:02:58 itv-usvr-01 sshd[22542]: Invalid user admin from 124.105.173.17
Apr 19 19:02:58 itv-usvr-01 sshd[22542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.105.173.17
Apr 19 19:02:58 itv-usvr-01 sshd[22542]: Invalid user admin from 124.105.173.17
Apr 19 19:02:59 itv-usvr-01 sshd[22542]: Failed password for invalid user admin from 124.105.173.17 port 54801 ssh2
2020-04-19 22:54:29
150.223.13.40 attackbotsspam
Apr 19 13:53:09 ns382633 sshd\[26346\]: Invalid user ht from 150.223.13.40 port 50388
Apr 19 13:53:09 ns382633 sshd\[26346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.13.40
Apr 19 13:53:11 ns382633 sshd\[26346\]: Failed password for invalid user ht from 150.223.13.40 port 50388 ssh2
Apr 19 14:03:28 ns382633 sshd\[28297\]: Invalid user Ubuntu from 150.223.13.40 port 38441
Apr 19 14:03:28 ns382633 sshd\[28297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.13.40
2020-04-19 22:29:08

最近上报的IP列表

21.40.131.216 247.244.40.174 175.51.50.161 42.45.233.107
136.9.154.69 58.12.128.74 135.239.198.200 15.169.64.63
204.75.63.86 90.113.229.97 72.176.78.228 222.131.99.23
232.168.141.179 212.161.8.31 103.67.82.139 4.71.35.219
155.96.107.43 45.26.169.228 186.149.47.200 163.234.171.85