必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea Republic of

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.254.69.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49879
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.254.69.48.			IN	A

;; AUTHORITY SECTION:
.			291	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022071502 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 16 09:52:10 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 48.69.254.49.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.69.254.49.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
161.97.117.104 attackbotsspam
(From nick@send.sohbetlal.com) I wanted to ask a question about your business.
1) As a business owner, new laws are on your side - effective starting August 2019. Were you aware? 

Since that date you shouldn't be paying above 0.75% Credit Card Processing Fees. 
2) You're legally able to demand this new option. 

Bottom Line: Your processor isn't telling you everything. Why are they hiding the lower fee options?

We represent merchants challenging their credit card processors. 
3) Merchants working with us demand to be switched to Unlimited Flat-Fee Processing.
 - Unlimited Flat-Fee Processing for $24.99 per month. 

The new terminals make it easy. And it's UNLIMITED.
4) Process any amount of cards for the same flat price each month.
No contracts. No surprises. No hidden fees.
We'll even start you off with a terminal at no cost.

September 2020 Limited Time Promotion:
Email back today to qualify:
- Free Equipment (Maximum 2x Terminals).
- No Contracts.
- No Cancellation Fees.
- Try Witho
2020-09-23 14:28:46
94.25.169.100 attackspambots
Unauthorized connection attempt from IP address 94.25.169.100 on Port 445(SMB)
2020-09-23 14:04:30
27.194.11.23 attackspam
Automatic report - Port Scan Attack
2020-09-23 14:10:18
5.188.206.198 attack
Sep 23 07:44:45 localhost postfix/smtpd\[1140\]: warning: unknown\[5.188.206.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 23 07:45:04 localhost postfix/smtpd\[1140\]: warning: unknown\[5.188.206.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 23 07:47:52 localhost postfix/smtpd\[1202\]: warning: unknown\[5.188.206.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 23 07:48:10 localhost postfix/smtpd\[1406\]: warning: unknown\[5.188.206.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 23 07:50:50 localhost postfix/smtpd\[1602\]: warning: unknown\[5.188.206.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-23 13:58:39
117.103.168.204 attack
Sep 23 07:23:23 vpn01 sshd[24045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.103.168.204
Sep 23 07:23:25 vpn01 sshd[24045]: Failed password for invalid user albert from 117.103.168.204 port 37534 ssh2
...
2020-09-23 14:33:45
161.97.90.156 attack
Sep 23 00:32:49 r.ca sshd[22328]: Failed password for invalid user qwerty from 161.97.90.156 port 37130 ssh2
2020-09-23 14:37:35
114.119.137.220 attackspambots
Automatic report - Banned IP Access
2020-09-23 14:03:20
139.198.5.138 attackbotsspam
Invalid user test from 139.198.5.138 port 54058
2020-09-23 14:00:40
94.200.17.144 attack
Sep 22 19:55:35 web1 sshd\[8379\]: Invalid user test from 94.200.17.144
Sep 22 19:55:35 web1 sshd\[8379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.200.17.144
Sep 22 19:55:36 web1 sshd\[8379\]: Failed password for invalid user test from 94.200.17.144 port 47639 ssh2
Sep 22 20:01:59 web1 sshd\[8896\]: Invalid user test from 94.200.17.144
Sep 22 20:01:59 web1 sshd\[8896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.200.17.144
2020-09-23 14:06:13
134.249.151.4 attack
Automatic report - Banned IP Access
2020-09-23 14:37:51
106.52.150.93 attack
SSH/22 MH Probe, BF, Hack -
2020-09-23 14:01:25
170.249.45.231 attackbotsspam
Sep 22 20:04:19 site2 sshd\[14127\]: Invalid user admin from 170.249.45.231Sep 22 20:04:21 site2 sshd\[14127\]: Failed password for invalid user admin from 170.249.45.231 port 42675 ssh2Sep 22 20:04:22 site2 sshd\[14129\]: Invalid user admin from 170.249.45.231Sep 22 20:04:24 site2 sshd\[14129\]: Failed password for invalid user admin from 170.249.45.231 port 42786 ssh2Sep 22 20:04:26 site2 sshd\[14131\]: Invalid user admin from 170.249.45.231
...
2020-09-23 14:16:31
142.44.254.100 attack
(sshd) Failed SSH login from 142.44.254.100 (CA/Canada/ip100.ip-142-44-254.net): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD
2020-09-23 14:19:37
51.178.53.233 attackspam
(sshd) Failed SSH login from 51.178.53.233 (FR/France/Grand Est/Strasbourg/vps-91e9c584.vps.ovh.net): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 23 02:06:40 atlas sshd[28430]: Invalid user iris from 51.178.53.233 port 39698
Sep 23 02:06:42 atlas sshd[28430]: Failed password for invalid user iris from 51.178.53.233 port 39698 ssh2
Sep 23 02:17:05 atlas sshd[31016]: Invalid user postgres from 51.178.53.233 port 58402
Sep 23 02:17:07 atlas sshd[31016]: Failed password for invalid user postgres from 51.178.53.233 port 58402 ssh2
Sep 23 02:20:08 atlas sshd[31849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.53.233  user=root
2020-09-23 14:27:06
114.33.63.209 attackbotsspam
23/tcp 23/tcp 23/tcp...
[2020-08-02/09-22]7pkt,1pt.(tcp)
2020-09-23 14:27:38

最近上报的IP列表

78.85.178.241 97.105.69.132 85.237.44.113 58.8.136.71
52.253.96.140 125.7.164.59 41.60.232.9 213.110.25.5
122.11.169.112 118.99.76.57 37.44.254.197 154.202.102.80
121.126.219.22 154.83.16.158 143.198.176.106 183.167.251.50
211.33.200.26 154.202.104.212 192.177.158.241 96.85.170.82