必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.242.231.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18842
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.242.231.48.			IN	A

;; AUTHORITY SECTION:
.			570	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021102 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 12 11:56:51 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
48.231.242.49.in-addr.arpa domain name pointer 48.231.242.49.ap.yournet.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.231.242.49.in-addr.arpa	name = 48.231.242.49.ap.yournet.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
145.239.82.87 attackbotsspam
Sep  4 12:56:47 kh-dev-server sshd[19690]: Failed password for root from 145.239.82.87 port 45271 ssh2
...
2020-09-04 21:49:32
85.70.201.97 attackbots
Sep  3 18:49:21 mellenthin postfix/smtpd[21052]: NOQUEUE: reject: RCPT from 97.201.broadband3.iol.cz[85.70.201.97]: 554 5.7.1 Service unavailable; Client host [85.70.201.97] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/85.70.201.97; from= to= proto=ESMTP helo=<97.201.broadband3.iol.cz>
2020-09-04 21:59:35
107.189.10.101 attack
2020-09-04T13:27:07.425174vps773228.ovh.net sshd[8656]: Failed password for root from 107.189.10.101 port 46012 ssh2
2020-09-04T13:27:09.229501vps773228.ovh.net sshd[8656]: Failed password for root from 107.189.10.101 port 46012 ssh2
2020-09-04T13:27:12.028604vps773228.ovh.net sshd[8656]: Failed password for root from 107.189.10.101 port 46012 ssh2
2020-09-04T13:27:14.370478vps773228.ovh.net sshd[8656]: Failed password for root from 107.189.10.101 port 46012 ssh2
2020-09-04T13:27:16.766990vps773228.ovh.net sshd[8656]: Failed password for root from 107.189.10.101 port 46012 ssh2
...
2020-09-04 22:04:37
218.92.0.208 attackbots
Sep  4 13:02:13 IngegnereFirenze sshd[29252]: User root from 218.92.0.208 not allowed because not listed in AllowUsers
...
2020-09-04 21:46:02
212.60.66.145 attackspambots
WordPress Drone detected by safePassage
2020-09-04 22:19:39
222.186.42.213 attackbotsspam
Sep  4 15:57:36 OPSO sshd\[18860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.213  user=root
Sep  4 15:57:38 OPSO sshd\[18860\]: Failed password for root from 222.186.42.213 port 49880 ssh2
Sep  4 15:57:40 OPSO sshd\[18860\]: Failed password for root from 222.186.42.213 port 49880 ssh2
Sep  4 15:57:43 OPSO sshd\[18860\]: Failed password for root from 222.186.42.213 port 49880 ssh2
Sep  4 15:57:46 OPSO sshd\[18928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.213  user=root
2020-09-04 22:12:03
200.119.138.42 attackbotsspam
Sep  4 04:19:49 mailman postfix/smtpd[28694]: warning: unknown[200.119.138.42]: SASL PLAIN authentication failed: authentication failure
2020-09-04 22:03:09
203.99.62.158 attackspambots
Time:     Fri Sep  4 12:27:44 2020 +0200
IP:       203.99.62.158 (PK/Pakistan/mbl-99-62-158.dsl.net.pk)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep  4 12:20:29 ca-3-ams1 sshd[24665]: Invalid user luser from 203.99.62.158 port 41466
Sep  4 12:20:31 ca-3-ams1 sshd[24665]: Failed password for invalid user luser from 203.99.62.158 port 41466 ssh2
Sep  4 12:24:48 ca-3-ams1 sshd[24849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.99.62.158  user=root
Sep  4 12:24:50 ca-3-ams1 sshd[24849]: Failed password for root from 203.99.62.158 port 11295 ssh2
Sep  4 12:27:43 ca-3-ams1 sshd[24980]: Invalid user g from 203.99.62.158 port 31787
2020-09-04 21:57:15
191.254.221.1 attack
1599151783 - 09/03/2020 18:49:43 Host: 191.254.221.1/191.254.221.1 Port: 445 TCP Blocked
2020-09-04 21:39:57
165.255.57.209 attackbots
165.255.57.209 - - [03/Sep/2020:12:49:02 -0400] "POST /xmlrpc.php HTTP/1.1" 404 208 "-" "Mozilla/5.0 (Windows NT 4.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36"
165.255.57.209 - - [03/Sep/2020:12:49:05 -0400] "POST /wordpress/xmlrpc.php HTTP/1.1" 404 218 "-" "Mozilla/5.0 (Windows NT 4.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36"
165.255.57.209 - - [03/Sep/2020:12:49:06 -0400] "POST /blog/xmlrpc.php HTTP/1.1" 404 213 "-" "Mozilla/5.0 (Windows NT 4.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36"
...
2020-09-04 22:13:41
170.83.230.2 attack
Invalid user yanwei from 170.83.230.2 port 40332
2020-09-04 21:50:37
147.91.31.52 attackbots
As always with Serbia 
	 /Wp-login.php  	 /wp-admin.php
2020-09-04 21:40:29
106.13.164.136 attackbotsspam
2020-09-04T09:56:35.311650mail.broermann.family sshd[9991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.164.136
2020-09-04T09:56:35.305653mail.broermann.family sshd[9991]: Invalid user deploy from 106.13.164.136 port 56846
2020-09-04T09:56:37.370321mail.broermann.family sshd[9991]: Failed password for invalid user deploy from 106.13.164.136 port 56846 ssh2
2020-09-04T09:58:57.278622mail.broermann.family sshd[10053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.164.136  user=root
2020-09-04T09:58:58.829357mail.broermann.family sshd[10053]: Failed password for root from 106.13.164.136 port 57824 ssh2
...
2020-09-04 22:04:55
197.58.171.7 attack
port scan and connect, tcp 23 (telnet)
2020-09-04 22:22:57
180.97.31.28 attackspambots
Sep  4 06:40:03 journals sshd\[10307\]: Invalid user courier from 180.97.31.28
Sep  4 06:40:03 journals sshd\[10307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.97.31.28
Sep  4 06:40:05 journals sshd\[10307\]: Failed password for invalid user courier from 180.97.31.28 port 40419 ssh2
Sep  4 06:43:53 journals sshd\[10707\]: Invalid user git from 180.97.31.28
Sep  4 06:43:53 journals sshd\[10707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.97.31.28
...
2020-09-04 22:16:59

最近上报的IP列表

49.36.226.88 49.36.211.170 49.228.49.233 49.67.217.126
49.4.91.230 49.76.223.96 49.205.254.57 49.36.24.15
49.77.224.99 49.76.98.205 49.83.128.64 49.83.28.77
49.88.212.62 49.85.31.65 5.125.196.231 5.11.66.185
5.133.29.29 5.13.139.131 5.133.122.243 5.133.120.21