必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.69.64.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51653
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.69.64.34.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 04:54:30 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 34.64.69.49.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.64.69.49.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
76.98.206.47 attackbotsspam
5555/tcp 5555/tcp 5555/tcp
[2019-08-15]3pkt
2019-08-16 13:21:13
180.126.159.22 attackspambots
Aug 16 01:23:18 debian sshd[4345]: Invalid user pi from 180.126.159.22 port 33500
Aug 16 01:23:18 debian sshd[4345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.126.159.22 
Aug 16 01:23:21 debian sshd[4345]: Failed password for invalid user pi from 180.126.159.22 port 33500 ssh2
Aug 16 01:23:27 debian sshd[4347]: Invalid user pi from 180.126.159.22 port 37478
Aug 16 01:23:27 debian sshd[4347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.126.159.22 
...
2019-08-16 13:56:09
149.202.214.11 attackspambots
Aug 15 18:49:13 hanapaa sshd\[31746\]: Invalid user pv from 149.202.214.11
Aug 15 18:49:13 hanapaa sshd\[31746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3070189.ip-149-202-214.eu
Aug 15 18:49:14 hanapaa sshd\[31746\]: Failed password for invalid user pv from 149.202.214.11 port 45546 ssh2
Aug 15 18:53:16 hanapaa sshd\[32137\]: Invalid user one from 149.202.214.11
Aug 15 18:53:16 hanapaa sshd\[32137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3070189.ip-149-202-214.eu
2019-08-16 13:19:32
124.236.22.54 attackspam
Aug 16 05:35:46 hcbbdb sshd\[9374\]: Invalid user fluffy from 124.236.22.54
Aug 16 05:35:46 hcbbdb sshd\[9374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.236.22.54
Aug 16 05:35:48 hcbbdb sshd\[9374\]: Failed password for invalid user fluffy from 124.236.22.54 port 48906 ssh2
Aug 16 05:38:55 hcbbdb sshd\[9699\]: Invalid user lz from 124.236.22.54
Aug 16 05:38:55 hcbbdb sshd\[9699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.236.22.54
2019-08-16 13:38:59
183.135.112.119 attackbots
37215/tcp
[2019-08-16]1pkt
2019-08-16 13:37:48
139.59.4.57 attackspam
Aug 16 07:00:39 eventyay sshd[3761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.4.57
Aug 16 07:00:42 eventyay sshd[3761]: Failed password for invalid user nikhil from 139.59.4.57 port 55312 ssh2
Aug 16 07:05:41 eventyay sshd[5093]: Failed password for root from 139.59.4.57 port 51093 ssh2
...
2019-08-16 13:23:07
177.133.228.29 attackbots
23/tcp
[2019-08-16]1pkt
2019-08-16 13:55:37
177.154.227.28 attackspambots
2019-08-1522:47:36dovecot_plainauthenticatorfailedforip-166-62-43-235.ip.secureserver.net\(drc6uw4dmq6mulqkqjc9xna3x20l\)[166.62.43.235]:55830:535Incorrectauthenticationdata\(set_id=info\)2019-08-1521:56:18dovecot_plainauthenticatorfailedfor\([177.154.227.28]\)[177.154.227.28]:59174:535Incorrectauthenticationdata\(set_id=info\)2019-08-1522:46:43dovecot_plainauthenticatorfailedfor101.ip-51-38-71.eu\(fmwg94qrykzrrx7fgvsgjq1v9g9q\)[51.38.71.101]:34823:535Incorrectauthenticationdata\(set_id=info\)2019-08-1522:47:18dovecot_plainauthenticatorfailedfor\(nexuqx41zlkrsxzp6z278kxtt1dg\)[128.199.36.147]:34099:535Incorrectauthenticationdata\(set_id=info\)2019-08-1522:47:21dovecot_plainauthenticatorfailedforip-104-238-97-230.ip.secureserver.net\(03vytzu0y0wadhi4s5igpt\)[104.238.97.230]:48078:535Incorrectauthenticationdata\(set_id=info\)2019-08-1522:46:37dovecot_plainauthenticatorfailedfor\(xr947l52tg1sax3y3kik5bvot4qo4rt\)[103.241.227.107]:47629:535Incorrectauthenticationdata\(set_id=info\)2019-08-1522:46:02dovecot_plaina
2019-08-16 13:18:15
35.0.127.52 attackspambots
Aug 16 07:23:43 ns41 sshd[16855]: Failed password for root from 35.0.127.52 port 35206 ssh2
Aug 16 07:23:45 ns41 sshd[16855]: Failed password for root from 35.0.127.52 port 35206 ssh2
Aug 16 07:23:48 ns41 sshd[16855]: Failed password for root from 35.0.127.52 port 35206 ssh2
Aug 16 07:23:51 ns41 sshd[16855]: Failed password for root from 35.0.127.52 port 35206 ssh2
2019-08-16 13:28:22
177.91.98.181 attackbotsspam
Automatic report - Port Scan Attack
2019-08-16 13:46:38
23.129.64.165 attackbotsspam
$f2bV_matches
2019-08-16 13:22:10
66.249.73.150 attackspambots
Automatic report - Banned IP Access
2019-08-16 13:39:26
148.70.113.127 attack
Aug 16 06:56:40 microserver sshd[37985]: Invalid user rio from 148.70.113.127 port 51506
Aug 16 06:56:40 microserver sshd[37985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.113.127
Aug 16 06:56:43 microserver sshd[37985]: Failed password for invalid user rio from 148.70.113.127 port 51506 ssh2
Aug 16 07:02:50 microserver sshd[38758]: Invalid user loyal from 148.70.113.127 port 42676
Aug 16 07:02:50 microserver sshd[38758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.113.127
Aug 16 07:14:34 microserver sshd[40314]: Invalid user ten from 148.70.113.127 port 53230
Aug 16 07:14:34 microserver sshd[40314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.113.127
Aug 16 07:14:36 microserver sshd[40314]: Failed password for invalid user ten from 148.70.113.127 port 53230 ssh2
Aug 16 07:21:06 microserver sshd[41516]: Invalid user server2 from 148.70.113.127 port 44428
Au
2019-08-16 13:57:41
150.95.184.153 attackspam
Aug 15 19:38:11 kapalua sshd\[17875\]: Invalid user lw from 150.95.184.153
Aug 15 19:38:11 kapalua sshd\[17875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=purazyana.info
Aug 15 19:38:13 kapalua sshd\[17875\]: Failed password for invalid user lw from 150.95.184.153 port 40004 ssh2
Aug 15 19:43:04 kapalua sshd\[18522\]: Invalid user emmanuel from 150.95.184.153
Aug 15 19:43:04 kapalua sshd\[18522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=purazyana.info
2019-08-16 13:59:37
37.187.54.67 attackbots
Aug 16 01:38:46 TORMINT sshd\[30683\]: Invalid user chipmast from 37.187.54.67
Aug 16 01:38:46 TORMINT sshd\[30683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.54.67
Aug 16 01:38:48 TORMINT sshd\[30683\]: Failed password for invalid user chipmast from 37.187.54.67 port 53349 ssh2
...
2019-08-16 13:43:26

最近上报的IP列表

91.136.12.245 93.44.3.22 117.20.66.124 52.29.234.63
94.59.198.18 142.124.128.225 19.130.190.183 252.242.223.44
244.77.125.131 232.249.208.135 37.8.78.74 22.193.230.11
131.108.156.88 98.225.40.34 216.65.91.64 226.180.142.244
240.160.142.116 46.11.43.173 224.241.160.117 73.190.92.250