必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.138.149.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51961
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;61.138.149.113.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 09:55:41 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
113.149.138.61.in-addr.arpa domain name pointer 113.149.138.61.adsl-pool.jlccptt.net.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
113.149.138.61.in-addr.arpa	name = 113.149.138.61.adsl-pool.jlccptt.net.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
41.175.125.118 attack
Oct  7 12:23:53 our-server-hostname postfix/smtpd[12659]: connect from unknown[41.175.125.118]
Oct  7 12:23:57 our-server-hostname sqlgrey: grey: new: 41.175.125.118(41.175.125.118), x@x -> x@x
Oct  7 12:23:57 our-server-hostname postfix/policy-spf[12607]: : Policy action=550 Please see hxxp://www.openspf.org/Why?s=mfrom;id=dnathand%40apex.net.au;ip=41.175.125.118;r=mx1.cbr.spam-filtering-appliance 
Oct x@x
Oct  7 12:23:58 our-server-hostname postfix/smtpd[12659]: lost connection after DATA from unknown[41.175.125.118]
Oct  7 12:23:58 our-server-hostname postfix/smtpd[12659]: disconnect from unknown[41.175.125.118]
Oct  7 12:25:20 our-server-hostname postfix/smtpd[22311]: connect from unknown[41.175.125.118]
Oct  7 12:25:21 our-server-hostname sqlgrey: grey: new: 41.175.125.118(41.175.125.118), x@x -> x@x
Oct  7 12:25:22 our-server-hostname postfix/policy-spf[13581]: : Policy action=550 Please see hxxp://www.openspf.org/Why?s=mfrom;id=diminno%40apex.net.au;ip=41.175.125........
-------------------------------
2019-10-07 21:48:53
137.59.162.169 attackspambots
2019-10-07T13:19:55.925255abusebot-5.cloudsearch.cf sshd\[22107\]: Invalid user waggoner from 137.59.162.169 port 58657
2019-10-07 21:55:07
39.73.175.45 attackspam
Unauthorised access (Oct  7) SRC=39.73.175.45 LEN=40 TTL=49 ID=36825 TCP DPT=8080 WINDOW=28817 SYN 
Unauthorised access (Oct  7) SRC=39.73.175.45 LEN=40 TTL=49 ID=36889 TCP DPT=8080 WINDOW=33377 SYN 
Unauthorised access (Oct  7) SRC=39.73.175.45 LEN=40 TTL=49 ID=19257 TCP DPT=8080 WINDOW=33377 SYN
2019-10-07 21:32:52
51.77.109.98 attack
2019-10-07T13:24:44.097071abusebot-2.cloudsearch.cf sshd\[28145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.109.98  user=root
2019-10-07 21:39:02
166.62.100.99 attackspambots
WordPress wp-login brute force :: 166.62.100.99 0.124 BYPASS [07/Oct/2019:22:46:11  1100] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-07 21:53:28
176.231.4.113 attack
Oct  7 09:04:13 our-server-hostname postfix/smtpd[7878]: connect from unknown[176.231.4.113]
Oct  7 09:04:16 our-server-hostname sqlgrey: grey: new: 176.231.4.113(176.231.4.113), x@x -> x@x
Oct  7 09:04:17 our-server-hostname postfix/policy-spf[27114]: : Policy action=550 Please see hxxp://www.openspf.org/Why?s=mfrom;id=hoffmannd%40orac.net.au;ip=176.231.4.113;r=mx1.cbr.spam-filtering-appliance 
Oct x@x
Oct  7 09:04:17 our-server-hostname postfix/smtpd[7878]: lost connection after DATA from unknown[176.231.4.113]
Oct  7 09:04:17 our-server-hostname postfix/smtpd[7878]: disconnect from unknown[176.231.4.113]
Oct  7 09:04:25 our-server-hostname postfix/smtpd[7878]: connect from unknown[176.231.4.113]
Oct  7 09:04:25 our-server-hostname sqlgrey: grey: new: 176.231.4.113(176.231.4.113), x@x -> x@x
Oct  7 09:04:25 our-server-hostname postfix/policy-spf[27114]: : Policy action=550 Please see hxxp://www.openspf.org/Why?s=mfrom;id=hoffyb%40orac.net.au;ip=176.231.4.113;r=mx1.cbr........
-------------------------------
2019-10-07 21:54:03
47.74.244.144 attackspambots
Connection by 47.74.244.144 on port: 5900 got caught by honeypot at 10/7/2019 6:13:35 AM
2019-10-07 21:16:51
172.104.41.167 attackbots
Lines containing failures of 172.104.41.167
Oct  7 13:09:56 shared06 sshd[22111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.104.41.167  user=r.r
Oct  7 13:09:59 shared06 sshd[22111]: Failed password for r.r from 172.104.41.167 port 60834 ssh2
Oct  7 13:09:59 shared06 sshd[22111]: Received disconnect from 172.104.41.167 port 60834:11: Bye Bye [preauth]
Oct  7 13:09:59 shared06 sshd[22111]: Disconnected from authenticating user r.r 172.104.41.167 port 60834 [preauth]
Oct  7 13:31:57 shared06 sshd[30261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.104.41.167  user=r.r
Oct  7 13:31:59 shared06 sshd[30261]: Failed password for r.r from 172.104.41.167 port 44606 ssh2
Oct  7 13:31:59 shared06 sshd[30261]: Received disconnect from 172.104.41.167 port 44606:11: Bye Bye [preauth]
Oct  7 13:31:59 shared06 sshd[30261]: Disconnected from authenticating user r.r 172.104.41.167 port 44606........
------------------------------
2019-10-07 21:38:29
122.225.48.214 attackbotsspam
(Oct  7)  LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=27391 TCP DPT=23 WINDOW=17117 SYN 
 (Oct  7)  LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=27391 TCP DPT=23 WINDOW=17117 SYN 
 (Oct  7)  LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=27391 TCP DPT=23 WINDOW=17117 SYN 
 (Oct  7)  LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=27391 TCP DPT=23 WINDOW=17117 SYN 
 (Oct  7)  LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=27391 TCP DPT=23 WINDOW=17117 SYN 
 (Oct  7)  LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=27391 TCP DPT=23 WINDOW=17117 SYN 
 (Oct  7)  LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=27391 TCP DPT=23 WINDOW=17117 SYN 
 (Oct  7)  LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=27391 TCP DPT=23 WINDOW=17117 SYN 
 (Oct  6)  LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=27391 TCP DPT=23 WINDOW=17117 SYN 
 (Oct  6)  LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=27391 TCP DPT=23 WINDOW=17117 SYN 
 (Oct  6)  LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=27391 TCP DPT=23 WINDOW=17117 SYN 
 (Oct  6)  LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=27391 TCP DPT=23 WINDOW=17117 SYN 
 (Oct  6)  LEN=4...
2019-10-07 21:27:54
78.42.60.138 attackspam
Oct  7 13:37:33 *** sshd[648364]: refused connect from 78.42.60.138 (78=
.42.60.138)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=78.42.60.138
2019-10-07 21:52:42
193.188.22.188 attackbotsspam
ssh bruteforce or scan
...
2019-10-07 21:29:10
109.202.117.133 attackspam
Port scan
2019-10-07 21:32:34
5.45.73.40 attackbots
Multiple failed RDP login attempts
2019-10-07 21:24:50
201.26.150.31 attackspambots
php injection
2019-10-07 21:55:58
101.96.113.50 attack
Oct  7 03:26:02 php1 sshd\[15569\]: Invalid user 123qwe123qwe from 101.96.113.50
Oct  7 03:26:02 php1 sshd\[15569\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.96.113.50
Oct  7 03:26:04 php1 sshd\[15569\]: Failed password for invalid user 123qwe123qwe from 101.96.113.50 port 50504 ssh2
Oct  7 03:31:13 php1 sshd\[15948\]: Invalid user Contrasena1q from 101.96.113.50
Oct  7 03:31:13 php1 sshd\[15948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.96.113.50
2019-10-07 21:40:07

最近上报的IP列表

179.106.179.70 128.76.51.96 140.0.33.42 145.39.174.186
241.207.56.129 219.76.230.199 196.249.207.115 185.106.9.240
170.50.136.74 215.153.71.77 224.100.9.179 225.225.53.126
60.65.35.65 27.60.175.83 73.200.79.223 228.80.3.42
156.186.153.40 96.176.239.114 242.95.115.10 209.166.250.51