必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): Tencent Cloud Computing (Beijing) Co. Ltd.

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attackspambots
Unauthorized connection attempt detected from IP address 49.51.11.68 to port 2055
2020-07-09 05:26:45
attackspambots
POP3
2020-06-27 14:35:07
normal
unauthorized connection attempt
2020-02-21 00:06:31
normal
unauthorized connection attempt
2020-02-21 00:06:28
attack
unauthorized connection attempt
2020-02-18 16:06:18
attack
Unauthorized connection attempt detected from IP address 49.51.11.68 to port 1194 [J]
2020-01-21 19:17:40
attackspam
Unauthorized connection attempt detected from IP address 49.51.11.68 to port 1302
2019-12-29 19:04:17
相同子网IP讨论:
IP 类型 评论内容 时间
49.51.11.210 attack
Unauthorized connection attempt detected from IP address 49.51.11.210 to port 1234
2020-07-22 17:37:08
49.51.11.210 attackspambots
Unauthorized connection attempt detected from IP address 49.51.11.210 to port 10333
2020-06-13 06:30:33
49.51.11.133 attack
Unauthorized connection attempt detected from IP address 49.51.11.133 to port 10001
2020-05-30 04:38:04
49.51.11.210 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 31 - port: 11211 proto: TCP cat: Misc Attack
2020-05-03 06:20:20
49.51.11.133 attackbots
Unauthorized connection attempt detected from IP address 49.51.11.133 to port 7547
2020-03-17 20:48:55
49.51.11.133 attack
Unauthorized connection attempt detected from IP address 49.51.11.133 to port 8443
2020-01-14 20:05:55
49.51.11.210 attack
Unauthorized connection attempt detected from IP address 49.51.11.210 to port 6379 [J]
2020-01-13 01:40:11
49.51.11.133 attackspam
Unauthorized connection attempt detected from IP address 49.51.11.133 to port 37
2020-01-05 07:18:33
49.51.11.210 attackspam
Unauthorized connection attempt detected from IP address 49.51.11.210 to port 8800
2019-12-30 04:35:54
49.51.11.133 attackbotsspam
Unauthorized connection attempt detected from IP address 49.51.11.133 to port 7479
2019-12-29 08:24:32
49.51.11.133 attack
12/01/2019-15:38:04.508388 49.51.11.133 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 48
2019-12-02 04:02:07
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.51.11.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43904
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;49.51.11.68.			IN	A

;; AUTHORITY SECTION:
.			489	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019122900 1800 900 604800 86400

;; Query time: 97 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 29 19:04:14 CST 2019
;; MSG SIZE  rcvd: 115
HOST信息:
Host 68.11.51.49.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 68.11.51.49.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
61.136.86.206 attackspambots
Jul  8 10:10:18 xxxxxxx0 sshd[24600]: Invalid user pi from 61.136.86.206 port 34808
Jul  8 10:10:18 xxxxxxx0 sshd[24600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.136.86.206
Jul  8 10:10:20 xxxxxxx0 sshd[24600]: Failed password for invalid user pi from 61.136.86.206 port 34808 ssh2
Jul  8 10:10:23 xxxxxxx0 sshd[24600]: Failed password for invalid user pi from 61.136.86.206 port 34808 ssh2
Jul  8 10:10:25 xxxxxxx0 sshd[24600]: Failed password for invalid user pi from 61.136.86.206 port 34808 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=61.136.86.206
2019-07-08 19:57:14
152.242.67.71 attackspambots
2019-07-08T15:24:13.715529enmeeting.mahidol.ac.th sshd\[31463\]: User root from 152.242.67.71 not allowed because not listed in AllowUsers
2019-07-08T15:24:14.220113enmeeting.mahidol.ac.th sshd\[31463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.242.67.71  user=root
2019-07-08T15:24:15.786333enmeeting.mahidol.ac.th sshd\[31463\]: Failed password for invalid user root from 152.242.67.71 port 35635 ssh2
...
2019-07-08 19:32:05
131.72.102.16 attackspambots
Scan or attack attempt on email service.
2019-07-08 19:21:18
188.0.146.200 attackspambots
19/7/8@04:24:30: FAIL: Alarm-Intrusion address from=188.0.146.200
...
2019-07-08 19:25:40
139.162.116.230 attackbots
port scan and connect, tcp 8443 (https-alt)
2019-07-08 19:49:00
125.86.185.123 attack
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-07-08 19:44:49
123.30.240.121 attackbots
Jul  8 11:12:40 * sshd[1471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.240.121
Jul  8 11:12:42 * sshd[1471]: Failed password for invalid user radio from 123.30.240.121 port 44316 ssh2
2019-07-08 19:17:21
59.23.190.100 attack
SSH Brute Force
2019-07-08 20:05:48
106.12.192.146 attackbotsspam
Jul  8 09:54:39 lola sshd[21395]: Invalid user ucpss from 106.12.192.146
Jul  8 09:54:39 lola sshd[21395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.192.146 
Jul  8 09:54:42 lola sshd[21395]: Failed password for invalid user ucpss from 106.12.192.146 port 44304 ssh2
Jul  8 09:54:42 lola sshd[21395]: Received disconnect from 106.12.192.146: 11: Bye Bye [preauth]
Jul  8 10:07:35 lola sshd[21667]: Invalid user postgres from 106.12.192.146
Jul  8 10:07:35 lola sshd[21667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.192.146 
Jul  8 10:07:37 lola sshd[21667]: Failed password for invalid user postgres from 106.12.192.146 port 18482 ssh2
Jul  8 10:07:37 lola sshd[21667]: Received disconnect from 106.12.192.146: 11: Bye Bye [preauth]
Jul  8 10:09:39 lola sshd[21708]: Invalid user user5 from 106.12.192.146
Jul  8 10:09:39 lola sshd[21708]: pam_unix(sshd:auth): authentication f........
-------------------------------
2019-07-08 19:37:00
131.100.79.134 attackspambots
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-07-08 19:32:56
176.235.187.147 attack
Mail sent to address hacked/leaked from atari.st
2019-07-08 19:59:29
208.115.196.2 attackbotsspam
Multiport scan 21 ports :  1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030
2019-07-08 19:56:49
212.92.98.160 attack
Jul  8 09:59:47 srv1 postfix/smtpd[17304]: connect from wertur.ru[212.92.98.160]
Jul x@x
Jul  8 09:59:55 srv1 postfix/smtpd[17304]: disconnect from wertur.ru[212.92.98.160]
Jul  8 10:08:46 srv1 postfix/smtpd[17304]: connect from wertur.ru[212.92.98.160]
Jul x@x
Jul  8 10:08:51 srv1 postfix/smtpd[17304]: disconnect from wertur.ru[212.92.98.160]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=212.92.98.160
2019-07-08 19:55:31
113.57.171.74 attackspam
Jul  8 11:44:50 s0 sshd\[53341\]: Failed password for root from 113.57.171.74 port 53724 ssh2
Jul  8 12:54:17 s0 sshd\[125002\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.57.171.74  user=root
Jul  8 12:54:19 s0 sshd\[125002\]: Failed password for root from 113.57.171.74 port 53729 ssh2
...
2019-07-08 19:47:28
131.221.179.39 attack
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-07-08 19:20:52

最近上报的IP列表

189.69.70.13 187.202.186.148 186.130.100.131 185.253.80.104
178.207.125.4 177.159.249.144 121.131.208.218 118.71.224.175
195.181.65.246 103.52.217.172 113.166.225.9 141.193.69.226
103.52.216.181 102.150.113.109 93.87.76.170 150.62.125.101
85.191.47.95 61.27.67.209 32.103.33.78 87.17.4.121