必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Barrie

省份(region): Ontario

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
49.51.11.210 attack
Unauthorized connection attempt detected from IP address 49.51.11.210 to port 1234
2020-07-22 17:37:08
49.51.11.68 attackspambots
Unauthorized connection attempt detected from IP address 49.51.11.68 to port 2055
2020-07-09 05:26:45
49.51.11.68 attackspambots
POP3
2020-06-27 14:35:07
49.51.11.210 attackspambots
Unauthorized connection attempt detected from IP address 49.51.11.210 to port 10333
2020-06-13 06:30:33
49.51.11.133 attack
Unauthorized connection attempt detected from IP address 49.51.11.133 to port 10001
2020-05-30 04:38:04
49.51.11.210 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 31 - port: 11211 proto: TCP cat: Misc Attack
2020-05-03 06:20:20
49.51.11.133 attackbots
Unauthorized connection attempt detected from IP address 49.51.11.133 to port 7547
2020-03-17 20:48:55
49.51.11.68 normal
unauthorized connection attempt
2020-02-21 00:06:31
49.51.11.68 normal
unauthorized connection attempt
2020-02-21 00:06:28
49.51.11.68 attack
unauthorized connection attempt
2020-02-18 16:06:18
49.51.11.68 attack
Unauthorized connection attempt detected from IP address 49.51.11.68 to port 1194 [J]
2020-01-21 19:17:40
49.51.11.133 attack
Unauthorized connection attempt detected from IP address 49.51.11.133 to port 8443
2020-01-14 20:05:55
49.51.11.210 attack
Unauthorized connection attempt detected from IP address 49.51.11.210 to port 6379 [J]
2020-01-13 01:40:11
49.51.11.133 attackspam
Unauthorized connection attempt detected from IP address 49.51.11.133 to port 37
2020-01-05 07:18:33
49.51.11.210 attackspam
Unauthorized connection attempt detected from IP address 49.51.11.210 to port 8800
2019-12-30 04:35:54
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.51.11.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51937
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.51.11.44.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 09:50:19 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 44.11.51.49.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 44.11.51.49.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
124.120.198.19 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-15 22:18:53
49.36.6.191 attack
ssh failed login
2019-08-15 22:04:05
59.124.228.54 attack
Aug 15 14:23:23 root sshd[24218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.124.228.54 
Aug 15 14:23:25 root sshd[24218]: Failed password for invalid user demo from 59.124.228.54 port 60036 ssh2
Aug 15 14:34:30 root sshd[24329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.124.228.54 
...
2019-08-15 21:14:22
103.28.70.120 attackbots
Aug 15 05:08:18 eola postfix/smtpd[11113]: warning: hostname 103-28-70-120.static.hvvc.us does not resolve to address 103.28.70.120: Name or service not known
Aug 15 05:08:18 eola postfix/smtpd[11113]: connect from unknown[103.28.70.120]
Aug 15 05:08:18 eola postfix/smtpd[11113]: lost connection after AUTH from unknown[103.28.70.120]
Aug 15 05:08:18 eola postfix/smtpd[11113]: disconnect from unknown[103.28.70.120] ehlo=1 auth=0/1 commands=1/2
Aug 15 05:08:18 eola postfix/smtpd[11113]: warning: hostname 103-28-70-120.static.hvvc.us does not resolve to address 103.28.70.120: Name or service not known
Aug 15 05:08:18 eola postfix/smtpd[11113]: connect from unknown[103.28.70.120]
Aug 15 05:08:19 eola postfix/smtpd[11113]: lost connection after AUTH from unknown[103.28.70.120]
Aug 15 05:08:19 eola postfix/smtpd[11113]: disconnect from unknown[103.28.70.120] ehlo=1 auth=0/1 commands=1/2
Aug 15 05:08:19 eola postfix/smtpd[11113]: warning: hostname 103-28-70-120.static.hvvc.us ........
-------------------------------
2019-08-15 22:00:43
38.145.99.217 attackbotsspam
Bad bot/spoofed identity
2019-08-15 21:29:01
14.198.6.164 attackbots
Automatic report - Banned IP Access
2019-08-15 22:21:09
198.49.65.242 attack
Aug 15 07:08:35 our-server-hostname postfix/smtpd[11805]: connect from unknown[198.49.65.242]
Aug x@x
Aug 15 07:08:37 our-server-hostname postfix/smtpd[11805]: lost connection after RCPT from unknown[198.49.65.242]
Aug 15 07:08:37 our-server-hostname postfix/smtpd[11805]: disconnect from unknown[198.49.65.242]
Aug 15 07:20:31 our-server-hostname postfix/smtpd[16317]: connect from unknown[198.49.65.242]
Aug 15 07:20:32 our-server-hostname postfix/smtpd[16317]: NOQUEUE: reject: RCPT from unknown[198.49.65.242]: 554 5.7.1 Service unavailable; Client host [198.49.65.242] blo
.... truncated .... 
T x@x
Aug 15 15:45:46 our-server-hostname postfix/smtpd[10611]: lost connection after RCPT from unknown[198.49.65.242]
Aug 15 15:45:46 our-server-hostname postfix/smtpd[10611]: disconnect from unknown[198.49.65.242]
Aug 15 15:47:56 our-server-hostname postfix/smtpd[15301]: connect from unknown[198.49.65.242]
Aug x@x
Aug 15 15:47:57 our-server-hostname postfix/smtpd[15301]: lost conn........
-------------------------------
2019-08-15 21:46:01
173.177.141.211 attackbots
Automatic report - Port Scan Attack
2019-08-15 21:22:00
61.78.138.1 attackbotsspam
Aug x@x
Aug x@x
Aug x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=61.78.138.1
2019-08-15 22:11:41
112.85.42.195 attackbots
2019-08-15T09:58:32.821719abusebot-6.cloudsearch.cf sshd\[29662\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.195  user=root
2019-08-15 21:27:54
49.234.47.102 attack
Aug 15 12:34:41 localhost sshd\[9688\]: Invalid user kathrina from 49.234.47.102 port 43030
Aug 15 12:34:41 localhost sshd\[9688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.47.102
Aug 15 12:34:43 localhost sshd\[9688\]: Failed password for invalid user kathrina from 49.234.47.102 port 43030 ssh2
Aug 15 12:38:18 localhost sshd\[9824\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.47.102  user=root
Aug 15 12:38:19 localhost sshd\[9824\]: Failed password for root from 49.234.47.102 port 45878 ssh2
...
2019-08-15 21:22:39
77.247.110.58 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-15 22:05:36
114.212.160.63 attackspambots
Automatic report - Banned IP Access
2019-08-15 21:37:41
94.177.214.200 attackspambots
Aug 15 09:11:49 TORMINT sshd\[2611\]: Invalid user db2prod from 94.177.214.200
Aug 15 09:11:49 TORMINT sshd\[2611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.214.200
Aug 15 09:11:51 TORMINT sshd\[2611\]: Failed password for invalid user db2prod from 94.177.214.200 port 39980 ssh2
...
2019-08-15 21:38:18
142.93.179.95 attackspambots
SSH Bruteforce attempt
2019-08-15 21:51:34

最近上报的IP列表

120.90.219.50 62.36.181.47 2.26.247.108 43.62.228.19
135.239.148.76 62.122.253.64 241.226.99.74 3.161.1.168
89.106.175.0 192.249.68.1 58.247.112.20 193.99.58.18
188.214.21.197 242.47.72.96 147.97.78.44 219.207.130.88
59.213.143.129 8.125.37.167 153.115.152.127 162.142.103.250