必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): China Unicom Shanghai Network

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
类型 评论内容 时间
attackbotsspam
Oct 12 03:30:48 xtremcommunity sshd\[439884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.246.149.142  user=root
Oct 12 03:30:50 xtremcommunity sshd\[439884\]: Failed password for root from 58.246.149.142 port 40454 ssh2
Oct 12 03:34:53 xtremcommunity sshd\[439982\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.246.149.142  user=root
Oct 12 03:34:55 xtremcommunity sshd\[439982\]: Failed password for root from 58.246.149.142 port 42670 ssh2
Oct 12 03:39:00 xtremcommunity sshd\[440060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.246.149.142  user=root
...
2019-10-12 19:02:27
attackspambots
Oct  2 07:48:12 MK-Soft-Root1 sshd[10777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.246.149.142 
Oct  2 07:48:14 MK-Soft-Root1 sshd[10777]: Failed password for invalid user marcus from 58.246.149.142 port 43978 ssh2
...
2019-10-02 18:01:06
attack
Sep 24 06:52:29 www5 sshd\[29202\]: Invalid user salvia from 58.246.149.142
Sep 24 06:52:29 www5 sshd\[29202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.246.149.142
Sep 24 06:52:31 www5 sshd\[29202\]: Failed password for invalid user salvia from 58.246.149.142 port 56616 ssh2
...
2019-09-24 16:38:33
attack
Sep 23 23:06:04 vtv3 sshd\[5107\]: Invalid user ex from 58.246.149.142 port 35478
Sep 23 23:06:04 vtv3 sshd\[5107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.246.149.142
Sep 23 23:06:07 vtv3 sshd\[5107\]: Failed password for invalid user ex from 58.246.149.142 port 35478 ssh2
Sep 23 23:09:44 vtv3 sshd\[6635\]: Invalid user zq from 58.246.149.142 port 40146
Sep 23 23:09:44 vtv3 sshd\[6635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.246.149.142
Sep 23 23:21:07 vtv3 sshd\[12590\]: Invalid user bot from 58.246.149.142 port 54150
Sep 23 23:21:07 vtv3 sshd\[12590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.246.149.142
Sep 23 23:21:08 vtv3 sshd\[12590\]: Failed password for invalid user bot from 58.246.149.142 port 54150 ssh2
Sep 23 23:24:59 vtv3 sshd\[14119\]: Invalid user user from 58.246.149.142 port 58810
Sep 23 23:24:59 vtv3 sshd\[14119\]: pam_unix\(sshd:
2019-09-24 06:21:51
attackspam
Sep 15 05:41:08 mail sshd[13150]: Failed password for invalid user public from 58.246.149.142 port 35182 ssh2
Sep 15 05:41:09 mail sshd[13150]: Received disconnect from 58.246.149.142: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=58.246.149.142
2019-09-16 04:33:28
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 58.246.149.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51869
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;58.246.149.142.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091501 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Sep 16 04:33:24 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
Host 142.149.246.58.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 142.149.246.58.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
85.186.38.228 attackbotsspam
IP blocked
2020-07-13 15:29:09
81.68.76.28 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-13 15:06:49
92.169.67.98 attack
php vulnerability probing
2020-07-13 15:13:51
61.177.172.142 attackbots
2020-07-13T07:16:10.288304shield sshd\[26991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.142  user=root
2020-07-13T07:16:12.029822shield sshd\[26991\]: Failed password for root from 61.177.172.142 port 49129 ssh2
2020-07-13T07:16:15.110320shield sshd\[26991\]: Failed password for root from 61.177.172.142 port 49129 ssh2
2020-07-13T07:16:18.602957shield sshd\[26991\]: Failed password for root from 61.177.172.142 port 49129 ssh2
2020-07-13T07:16:21.858175shield sshd\[26991\]: Failed password for root from 61.177.172.142 port 49129 ssh2
2020-07-13 15:16:24
116.228.131.26 attack
SSH/22 MH Probe, BF, Hack -
2020-07-13 15:15:29
14.164.7.1 attack
1594612403 - 07/13/2020 05:53:23 Host: 14.164.7.1/14.164.7.1 Port: 445 TCP Blocked
2020-07-13 14:55:04
211.57.153.250 attack
(sshd) Failed SSH login from 211.57.153.250 (KR/South Korea/-): 5 in the last 3600 secs
2020-07-13 15:00:43
23.129.64.180 attack
Unauthorized connection attempt detected from IP address 23.129.64.180 to port 5984
2020-07-13 15:11:51
167.99.75.240 attackbotsspam
Jul 13 06:54:43 home sshd[7413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.75.240
Jul 13 06:54:45 home sshd[7413]: Failed password for invalid user admin from 167.99.75.240 port 60500 ssh2
Jul 13 06:58:02 home sshd[7814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.75.240
...
2020-07-13 15:26:49
118.70.239.146 attackbotsspam
118.70.239.146 - - [13/Jul/2020:06:41:01 +0100] "POST /wp-login.php HTTP/1.1" 200 2046 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
118.70.239.146 - - [13/Jul/2020:06:41:05 +0100] "POST /wp-login.php HTTP/1.1" 200 2020 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
118.70.239.146 - - [13/Jul/2020:06:41:08 +0100] "POST /wp-login.php HTTP/1.1" 200 2019 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-13 15:13:24
97.74.24.205 attackbotsspam
C2,WP GET /news/wp-includes/wlwmanifest.xml
2020-07-13 15:00:19
162.243.129.121 attackbotsspam
Port scan denied
2020-07-13 14:56:54
139.162.138.232 attack
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: 139.162.138.232.li.binaryedge.ninja.
2020-07-13 14:54:08
78.217.177.232 attackspambots
Jul 13 08:38:53 santamaria sshd\[2313\]: Invalid user xwb from 78.217.177.232
Jul 13 08:38:53 santamaria sshd\[2313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.217.177.232
Jul 13 08:38:55 santamaria sshd\[2313\]: Failed password for invalid user xwb from 78.217.177.232 port 41560 ssh2
...
2020-07-13 15:30:24
106.13.42.52 attackbotsspam
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-07-13 15:02:53

最近上报的IP列表

201.138.175.50 83.247.153.117 182.84.28.168 3.180.184.98
2.27.207.219 202.151.30.145 45.221.88.146 103.192.76.65
187.27.27.39 104.225.223.8 18.222.89.246 139.198.121.125
118.241.173.147 47.219.220.240 14.161.23.220 149.56.22.122
92.118.38.52 82.127.237.205 51.91.164.154 151.73.61.3