必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Changzhou

省份(region): Jiangsu

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): No.31,Jin-rong Street

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.80.93.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 927
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;49.80.93.21.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042001 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sun Apr 21 12:18:58 +08 2019
;; MSG SIZE  rcvd: 115

HOST信息:
Host 21.93.80.49.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 21.93.80.49.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
201.178.238.11 attackbots
1593818137 - 07/04/2020 01:15:37 Host: 201.178.238.11/201.178.238.11 Port: 445 TCP Blocked
2020-07-04 10:10:15
23.94.5.104 attack
(From wanda.kellermann@msn.com) Hi,

Do you have a Website? Of course you do because I am looking at your website expresslifechiro.com now.

Are you struggling for Leads and Sales?

You’re not the only one.

So many Website owners struggle to convert their Visitors into Leads & Sales.

There’s a simple way to fix this problem.

You could use a Live Chat app on your Website expresslifechiro.com and hire Chat Agents.

But only if you’ve got deep pockets and you’re happy to fork out THOUSANDS of dollars for the quality you need.

=====

But what if you could automate Live Chat so it’s HUMAN-FREE?

What if you could exploit NEW “AI” Technology to engage with your Visitors INSTANTLY.

And AUTOMATICALLY convert them into Leads & Sales.

WITHOUT spending THOUSANDS of dollars on Live Chat Agents.

And WITHOUT hiring expensive coders.

In fact, all you need to do to activate this LATEST “AI” Website Tech..

..is to COPY & PASTE a single line of “Website Code”.

==> http://www.zoomsoft.n
2020-07-04 09:52:53
125.26.111.153 attack
Unauthorized connection attempt from IP address 125.26.111.153 on Port 445(SMB)
2020-07-04 09:50:38
113.172.127.82 attack
2020-07-0401:15:021jrUtZ-0000ye-F2\<=info@whatsup2013.chH=\(localhost\)[14.169.134.140]:46493P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2887id=256807545f74a1ad8acf792ade19939faaa2f79f@whatsup2013.chT="Hookupclubhouseinvite"foremonred58@gmail.comangelglenn123@gmail.comgarypain9@gmail.com2020-07-0401:10:571jrUpZ-0000dO-6Z\<=info@whatsup2013.chH=\(localhost\)[113.172.145.74]:39305P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2944id=2ea9a3848fa47182a15fa9faf1251cb0937fdb7a7c@whatsup2013.chT="Sexclubhouseinvitation"foroebayanez725@gmail.commy.2email33@gmail.commadijr642@gmail.com2020-07-0401:15:121jrUtj-0000zb-RX\<=info@whatsup2013.chH=\(localhost\)[113.172.127.82]:51361P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2877id=0a7cca9992b9939b0702b418ff8ba1bbd3096f@whatsup2013.chT="Here'syourownadultclubhouseinvite"forcameroningles4@gmail.comjosephgmail@icloud.comvalariekirkla
2020-07-04 10:00:28
61.177.172.41 attackbotsspam
Jul  3 18:37:36 dignus sshd[3313]: error: maximum authentication attempts exceeded for root from 61.177.172.41 port 15612 ssh2 [preauth]
Jul  3 18:37:42 dignus sshd[3336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.41  user=root
Jul  3 18:37:44 dignus sshd[3336]: Failed password for root from 61.177.172.41 port 46722 ssh2
Jul  3 18:38:01 dignus sshd[3336]: Failed password for root from 61.177.172.41 port 46722 ssh2
Jul  3 18:38:01 dignus sshd[3336]: error: maximum authentication attempts exceeded for root from 61.177.172.41 port 46722 ssh2 [preauth]
...
2020-07-04 09:54:47
103.215.205.161 attack
Unauthorised access (Jul  4) SRC=103.215.205.161 LEN=40 TTL=49 ID=37560 TCP DPT=8080 WINDOW=56916 SYN
2020-07-04 10:15:44
106.12.175.218 attackspambots
Jul  4 00:50:51 rush sshd[2166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.175.218
Jul  4 00:50:53 rush sshd[2166]: Failed password for invalid user paul from 106.12.175.218 port 54832 ssh2
Jul  4 00:52:24 rush sshd[2200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.175.218
...
2020-07-04 10:13:44
138.68.236.50 attackspambots
Jul  4 03:14:10 Ubuntu-1404-trusty-64-minimal sshd\[15932\]: Invalid user steam from 138.68.236.50
Jul  4 03:14:10 Ubuntu-1404-trusty-64-minimal sshd\[15932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.236.50
Jul  4 03:14:12 Ubuntu-1404-trusty-64-minimal sshd\[15932\]: Failed password for invalid user steam from 138.68.236.50 port 42326 ssh2
Jul  4 03:27:13 Ubuntu-1404-trusty-64-minimal sshd\[21050\]: Invalid user ips from 138.68.236.50
Jul  4 03:27:13 Ubuntu-1404-trusty-64-minimal sshd\[21050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.236.50
2020-07-04 10:04:23
79.70.16.35 attackspam
20 attempts against mh-ssh on sand
2020-07-04 10:03:08
41.76.242.118 attack
Unauthorized connection attempt from IP address 41.76.242.118 on Port 445(SMB)
2020-07-04 09:52:40
222.186.15.62 attackspam
Jul  4 04:01:01 v22018053744266470 sshd[11046]: Failed password for root from 222.186.15.62 port 60049 ssh2
Jul  4 04:01:11 v22018053744266470 sshd[11096]: Failed password for root from 222.186.15.62 port 36247 ssh2
...
2020-07-04 10:01:52
167.99.155.36 attackspam
Scanned 3 times in the last 24 hours on port 22
2020-07-04 10:06:55
5.56.27.145 attackbotsspam
Portscan detected
2020-07-04 09:55:39
46.38.145.6 attack
2020-07-04 01:56:35 auth_plain authenticator failed for (User) [46.38.145.6]: 535 Incorrect authentication data (set_id=simple@mail.csmailer.org)
2020-07-04 01:57:22 auth_plain authenticator failed for (User) [46.38.145.6]: 535 Incorrect authentication data (set_id=andromede@mail.csmailer.org)
2020-07-04 01:58:09 auth_plain authenticator failed for (User) [46.38.145.6]: 535 Incorrect authentication data (set_id=donny@mail.csmailer.org)
2020-07-04 01:58:56 auth_plain authenticator failed for (User) [46.38.145.6]: 535 Incorrect authentication data (set_id=suffix@mail.csmailer.org)
2020-07-04 01:59:43 auth_plain authenticator failed for (User) [46.38.145.6]: 535 Incorrect authentication data (set_id=ie@mail.csmailer.org)
...
2020-07-04 09:58:45
202.152.27.10 attackspambots
Lines containing failures of 202.152.27.10
Jul  2 08:45:52 shared05 sshd[1311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.152.27.10  user=r.r
Jul  2 08:45:55 shared05 sshd[1311]: Failed password for r.r from 202.152.27.10 port 41928 ssh2
Jul  2 08:45:55 shared05 sshd[1311]: Received disconnect from 202.152.27.10 port 41928:11: Bye Bye [preauth]
Jul  2 08:45:55 shared05 sshd[1311]: Disconnected from authenticating user r.r 202.152.27.10 port 41928 [preauth]
Jul  2 08:56:22 shared05 sshd[5324]: Invalid user gabriel from 202.152.27.10 port 43648
Jul  2 08:56:22 shared05 sshd[5324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.152.27.10
Jul  2 08:56:24 shared05 sshd[5324]: Failed password for invalid user gabriel from 202.152.27.10 port 43648 ssh2
Jul  2 08:56:24 shared05 sshd[5324]: Received disconnect from 202.152.27.10 port 43648:11: Bye Bye [preauth]
Jul  2 08:56:24 shared05 ........
------------------------------
2020-07-04 09:51:17

最近上报的IP列表

217.201.119.17 76.39.111.145 200.32.70.218 130.179.75.110
72.197.155.161 139.199.89.117 165.144.156.172 155.75.139.109
189.161.111.215 193.150.101.6 193.141.22.183 80.234.231.95
97.157.43.89 106.51.5.83 67.163.26.168 168.177.13.35
44.11.249.66 111.230.212.81 32.191.245.141 137.104.235.30