必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.94.245.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6173
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.94.245.39.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022801 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 02:54:27 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 39.245.94.49.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 39.245.94.49.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
81.70.18.39 attack
Sep 26 08:20:14 propaganda sshd[36315]: Connection from 81.70.18.39 port 55898 on 10.0.0.161 port 22 rdomain ""
Sep 26 08:20:15 propaganda sshd[36315]: Connection closed by 81.70.18.39 port 55898 [preauth]
2020-09-27 00:25:16
125.24.41.62 attack
1601066211 - 09/25/2020 22:36:51 Host: 125.24.41.62/125.24.41.62 Port: 445 TCP Blocked
2020-09-27 00:33:29
82.165.73.245 attackbotsspam
Automatic report - Banned IP Access
2020-09-27 00:01:11
121.69.89.78 attack
(sshd) Failed SSH login from 121.69.89.78 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 26 00:16:16 cvps sshd[11050]: Invalid user laravel from 121.69.89.78
Sep 26 00:16:16 cvps sshd[11050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.69.89.78 
Sep 26 00:16:18 cvps sshd[11050]: Failed password for invalid user laravel from 121.69.89.78 port 47804 ssh2
Sep 26 00:27:21 cvps sshd[15075]: Invalid user ftpusr from 121.69.89.78
Sep 26 00:27:21 cvps sshd[15075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.69.89.78
2020-09-27 00:22:08
222.186.173.142 attack
Sep 26 18:25:31 pve1 sshd[29024]: Failed password for root from 222.186.173.142 port 25070 ssh2
Sep 26 18:25:35 pve1 sshd[29024]: Failed password for root from 222.186.173.142 port 25070 ssh2
...
2020-09-27 00:25:47
175.140.84.208 attackbotsspam
Sep 26 15:50:39 django-0 sshd[2403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.140.84.208 
Sep 26 15:50:39 django-0 sshd[2403]: Invalid user vyatta from 175.140.84.208
Sep 26 15:50:41 django-0 sshd[2403]: Failed password for invalid user vyatta from 175.140.84.208 port 38804 ssh2
...
2020-09-27 00:30:08
81.71.9.75 attackbots
Invalid user paul from 81.71.9.75 port 37632
2020-09-27 00:34:07
5.255.253.138 attackbotsspam
[Sat Sep 26 03:36:50.928764 2020] [:error] [pid 16537:tid 140694825400064] [client 5.255.253.138:61924] [client 5.255.253.138] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/coreruleset-3.3.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "756"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.3.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "X25U4pu7GLUg53phw52smgAAAC0"]
...
2020-09-27 00:35:37
52.247.66.65 attack
Sep 26 18:03:39 santamaria sshd\[8905\]: Invalid user 238 from 52.247.66.65
Sep 26 18:03:39 santamaria sshd\[8905\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.247.66.65
Sep 26 18:03:41 santamaria sshd\[8905\]: Failed password for invalid user 238 from 52.247.66.65 port 40243 ssh2
...
2020-09-27 00:23:09
106.13.230.219 attackspambots
Sep 26 17:48:20 v22019038103785759 sshd\[6239\]: Invalid user richard from 106.13.230.219 port 54194
Sep 26 17:48:20 v22019038103785759 sshd\[6239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.230.219
Sep 26 17:48:21 v22019038103785759 sshd\[6239\]: Failed password for invalid user richard from 106.13.230.219 port 54194 ssh2
Sep 26 17:54:31 v22019038103785759 sshd\[6746\]: Invalid user max from 106.13.230.219 port 60682
Sep 26 17:54:31 v22019038103785759 sshd\[6746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.230.219
...
2020-09-27 00:33:44
2.86.145.123 attack
Automatic report - Port Scan Attack
2020-09-27 00:16:58
218.92.0.251 attackspam
Sep 26 17:47:56 inter-technics sshd[20447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.251  user=root
Sep 26 17:47:58 inter-technics sshd[20447]: Failed password for root from 218.92.0.251 port 26377 ssh2
Sep 26 17:48:02 inter-technics sshd[20447]: Failed password for root from 218.92.0.251 port 26377 ssh2
Sep 26 17:47:56 inter-technics sshd[20447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.251  user=root
Sep 26 17:47:58 inter-technics sshd[20447]: Failed password for root from 218.92.0.251 port 26377 ssh2
Sep 26 17:48:02 inter-technics sshd[20447]: Failed password for root from 218.92.0.251 port 26377 ssh2
Sep 26 17:47:56 inter-technics sshd[20447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.251  user=root
Sep 26 17:47:58 inter-technics sshd[20447]: Failed password for root from 218.92.0.251 port 26377 ssh2
Sep 26 17:48:02 i
...
2020-09-26 23:56:25
208.109.54.139 attackbots
208.109.54.139 - - [26/Sep/2020:14:41:49 +0100] "POST /wp-login.php HTTP/1.1" 200 2673 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
208.109.54.139 - - [26/Sep/2020:14:41:52 +0100] "POST /wp-login.php HTTP/1.1" 200 2643 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
208.109.54.139 - - [26/Sep/2020:14:41:54 +0100] "POST /wp-login.php HTTP/1.1" 200 2645 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-27 00:07:23
27.128.168.225 attack
Invalid user matteo from 27.128.168.225 port 51273
2020-09-27 00:34:34
192.157.233.175 attack
$f2bV_matches
2020-09-27 00:12:38

最近上报的IP列表

187.165.230.196 38.225.135.255 165.232.7.217 25.39.250.155
196.230.188.252 57.55.45.70 82.129.5.229 49.116.96.139
252.63.7.94 133.67.163.40 88.122.228.12 35.67.189.12
186.200.107.200 246.228.216.120 85.182.171.137 63.123.112.192
48.43.82.236 171.232.55.149 47.243.123.205 98.169.133.55