必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.48.13.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3376
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;61.48.13.118.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 18:19:34 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 118.13.48.61.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 118.13.48.61.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.128.89.86 attackbotsspam
Jun 12 12:56:46 itv-usvr-02 sshd[30661]: Invalid user packer from 178.128.89.86 port 53368
Jun 12 12:56:46 itv-usvr-02 sshd[30661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.89.86
Jun 12 12:56:46 itv-usvr-02 sshd[30661]: Invalid user packer from 178.128.89.86 port 53368
Jun 12 12:56:48 itv-usvr-02 sshd[30661]: Failed password for invalid user packer from 178.128.89.86 port 53368 ssh2
Jun 12 13:01:45 itv-usvr-02 sshd[30803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.89.86  user=root
Jun 12 13:01:47 itv-usvr-02 sshd[30803]: Failed password for root from 178.128.89.86 port 33806 ssh2
2020-06-12 16:25:38
219.92.253.183 attackbots
port scan and connect, tcp 23 (telnet)
2020-06-12 16:20:56
222.221.248.242 attackbots
Jun 12 07:02:13 mout sshd[24253]: Invalid user vevaughan from 222.221.248.242 port 41868
2020-06-12 16:28:27
144.172.73.44 attackbotsspam
Jun 12 14:56:24 itv-usvr-01 sshd[18779]: Invalid user honey from 144.172.73.44
Jun 12 14:56:24 itv-usvr-01 sshd[18779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.172.73.44
Jun 12 14:56:24 itv-usvr-01 sshd[18779]: Invalid user honey from 144.172.73.44
Jun 12 14:56:26 itv-usvr-01 sshd[18779]: Failed password for invalid user honey from 144.172.73.44 port 39264 ssh2
Jun 12 14:56:30 itv-usvr-01 sshd[18781]: Invalid user admin from 144.172.73.44
2020-06-12 16:18:26
189.206.165.62 attack
Jun 12 05:53:21 ncomp sshd[4880]: Invalid user rsyncd from 189.206.165.62
Jun 12 05:53:21 ncomp sshd[4880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.206.165.62
Jun 12 05:53:21 ncomp sshd[4880]: Invalid user rsyncd from 189.206.165.62
Jun 12 05:53:23 ncomp sshd[4880]: Failed password for invalid user rsyncd from 189.206.165.62 port 4084 ssh2
2020-06-12 16:35:20
139.155.127.59 attackspam
Invalid user rodrigoal from 139.155.127.59 port 46822
2020-06-12 16:50:59
180.166.114.14 attackbotsspam
Jun 12 06:13:26 gestao sshd[1063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.166.114.14 
Jun 12 06:13:28 gestao sshd[1063]: Failed password for invalid user bot2 from 180.166.114.14 port 37695 ssh2
Jun 12 06:16:03 gestao sshd[1136]: Failed password for root from 180.166.114.14 port 55069 ssh2
...
2020-06-12 16:48:02
140.143.56.61 attackbots
(sshd) Failed SSH login from 140.143.56.61 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 12 07:43:17 srv sshd[14832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.56.61  user=root
Jun 12 07:43:19 srv sshd[14832]: Failed password for root from 140.143.56.61 port 38596 ssh2
Jun 12 08:01:05 srv sshd[15217]: Invalid user webadmin from 140.143.56.61 port 39526
Jun 12 08:01:07 srv sshd[15217]: Failed password for invalid user webadmin from 140.143.56.61 port 39526 ssh2
Jun 12 08:06:19 srv sshd[15306]: Invalid user nqe from 140.143.56.61 port 36428
2020-06-12 16:47:27
164.52.24.179 attackbotsspam
Unauthorized connection attempt detected from IP address 164.52.24.179 to port 5900 [T]
2020-06-12 16:36:40
37.152.183.18 attackbots
Jun 12 07:57:11 jumpserver sshd[56915]: Invalid user xiang from 37.152.183.18 port 46958
Jun 12 07:57:13 jumpserver sshd[56915]: Failed password for invalid user xiang from 37.152.183.18 port 46958 ssh2
Jun 12 08:00:50 jumpserver sshd[56920]: Invalid user ejabberd123456. from 37.152.183.18 port 48246
...
2020-06-12 16:40:19
112.85.42.181 attackbots
2020-06-12T08:00:11.176963shield sshd\[12971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.181  user=root
2020-06-12T08:00:12.810685shield sshd\[12971\]: Failed password for root from 112.85.42.181 port 40002 ssh2
2020-06-12T08:00:16.182630shield sshd\[12971\]: Failed password for root from 112.85.42.181 port 40002 ssh2
2020-06-12T08:00:19.299039shield sshd\[12971\]: Failed password for root from 112.85.42.181 port 40002 ssh2
2020-06-12T08:00:22.841843shield sshd\[12971\]: Failed password for root from 112.85.42.181 port 40002 ssh2
2020-06-12 16:26:28
89.154.4.249 attackbotsspam
2020-06-12T01:53:26.3739021495-001 sshd[19504]: Failed password for invalid user MARTE from 89.154.4.249 port 35900 ssh2
2020-06-12T01:57:32.4598071495-001 sshd[19617]: Invalid user admin from 89.154.4.249 port 35752
2020-06-12T01:57:32.4644221495-001 sshd[19617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=a89-154-4-249.cpe.netcabo.pt
2020-06-12T01:57:32.4598071495-001 sshd[19617]: Invalid user admin from 89.154.4.249 port 35752
2020-06-12T01:57:33.8385271495-001 sshd[19617]: Failed password for invalid user admin from 89.154.4.249 port 35752 ssh2
2020-06-12T02:01:33.7812431495-001 sshd[19773]: Invalid user monitor from 89.154.4.249 port 35606
...
2020-06-12 16:24:56
60.249.82.121 attackspam
Jun 12 05:52:53 ns37 sshd[7669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.249.82.121
Jun 12 05:52:53 ns37 sshd[7669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.249.82.121
2020-06-12 16:58:35
51.68.189.69 attackbots
Jun 12 06:40:03 vps647732 sshd[12721]: Failed password for root from 51.68.189.69 port 33051 ssh2
...
2020-06-12 16:27:01
118.25.74.199 attackbots
Jun 12 06:27:36 mout sshd[21293]: Invalid user johanb from 118.25.74.199 port 49596
2020-06-12 16:34:14

最近上报的IP列表

2.103.33.221 245.10.168.14 174.251.108.199 175.17.218.185
219.146.249.168 32.107.114.148 194.1.130.4 226.77.252.225
213.90.146.41 56.208.51.103 57.193.105.138 244.2.231.219
80.190.175.165 101.207.32.18 99.24.57.129 233.121.47.89
60.198.146.150 5.229.47.225 122.158.38.151 4.183.124.105