必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 67.148.149.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12433
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;67.148.149.111.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011101 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 12 12:33:37 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 111.149.148.67.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 111.149.148.67.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
149.202.59.85 attackspam
2019-10-11T14:09:23.969982hub.schaetter.us sshd\[16877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.ip-149-202-59.eu  user=root
2019-10-11T14:09:25.662786hub.schaetter.us sshd\[16877\]: Failed password for root from 149.202.59.85 port 47209 ssh2
2019-10-11T14:13:21.621869hub.schaetter.us sshd\[16945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.ip-149-202-59.eu  user=root
2019-10-11T14:13:23.320386hub.schaetter.us sshd\[16945\]: Failed password for root from 149.202.59.85 port 38641 ssh2
2019-10-11T14:17:24.851560hub.schaetter.us sshd\[16986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.ip-149-202-59.eu  user=root
...
2019-10-11 23:47:18
222.186.190.2 attackbotsspam
Oct 11 20:58:24 herz-der-gamer sshd[3373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
Oct 11 20:58:26 herz-der-gamer sshd[3373]: Failed password for root from 222.186.190.2 port 65158 ssh2
...
2019-10-12 02:59:37
222.186.15.101 attack
2019-10-11T15:32:43.556505abusebot.cloudsearch.cf sshd\[9077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.101  user=root
2019-10-11 23:37:10
140.143.22.200 attack
Oct 11 17:17:07 vps647732 sshd[415]: Failed password for root from 140.143.22.200 port 46032 ssh2
...
2019-10-11 23:47:46
149.210.213.113 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/149.210.213.113/ 
 NL - 1H : (30)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : NL 
 NAME ASN : ASN20857 
 
 IP : 149.210.213.113 
 
 CIDR : 149.210.128.0/17 
 
 PREFIX COUNT : 26 
 
 UNIQUE IP COUNT : 144896 
 
 
 WYKRYTE ATAKI Z ASN20857 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 2 
 24H - 2 
 
 DateTime : 2019-10-11 13:58:21 
 
 INFO : DNS DENIED Scan Detected and Blocked by ADMIN  - data recovery
2019-10-11 23:15:18
192.241.246.50 attackbotsspam
Jan 30 15:00:29 microserver sshd[55515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.246.50  user=mysql
Jan 30 15:00:31 microserver sshd[55515]: Failed password for mysql from 192.241.246.50 port 49011 ssh2
Jan 30 15:03:59 microserver sshd[55556]: Invalid user oracle from 192.241.246.50 port 33392
Jan 30 15:03:59 microserver sshd[55556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.246.50
Jan 30 15:04:01 microserver sshd[55556]: Failed password for invalid user oracle from 192.241.246.50 port 33392 ssh2
Feb  1 18:06:25 microserver sshd[30067]: Invalid user admin from 192.241.246.50 port 44445
Feb  1 18:06:25 microserver sshd[30067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.246.50
Feb  1 18:06:27 microserver sshd[30067]: Failed password for invalid user admin from 192.241.246.50 port 44445 ssh2
Feb  1 18:09:49 microserver sshd[30162]: Invalid user support
2019-10-12 02:58:42
94.191.50.114 attack
Oct 11 10:59:22 xtremcommunity sshd\[411874\]: Invalid user !23$QweRAsdF from 94.191.50.114 port 43228
Oct 11 10:59:22 xtremcommunity sshd\[411874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.50.114
Oct 11 10:59:24 xtremcommunity sshd\[411874\]: Failed password for invalid user !23$QweRAsdF from 94.191.50.114 port 43228 ssh2
Oct 11 11:04:40 xtremcommunity sshd\[411986\]: Invalid user Isabel_123 from 94.191.50.114 port 45792
Oct 11 11:04:40 xtremcommunity sshd\[411986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.50.114
...
2019-10-11 23:18:13
47.75.86.153 attackbotsspam
Automatic report - Banned IP Access
2019-10-11 23:21:01
128.199.52.45 attackspam
Oct 11 05:44:25 php1 sshd\[30891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.52.45  user=root
Oct 11 05:44:27 php1 sshd\[30891\]: Failed password for root from 128.199.52.45 port 45962 ssh2
Oct 11 05:48:32 php1 sshd\[31355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.52.45  user=root
Oct 11 05:48:34 php1 sshd\[31355\]: Failed password for root from 128.199.52.45 port 56622 ssh2
Oct 11 05:52:33 php1 sshd\[31819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.52.45  user=root
2019-10-12 03:01:27
104.236.28.167 attackspam
2019-10-11T13:04:28.084826hub.schaetter.us sshd\[16383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.28.167  user=root
2019-10-11T13:04:30.032321hub.schaetter.us sshd\[16383\]: Failed password for root from 104.236.28.167 port 57858 ssh2
2019-10-11T13:08:23.365409hub.schaetter.us sshd\[16415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.28.167  user=root
2019-10-11T13:08:25.573925hub.schaetter.us sshd\[16415\]: Failed password for root from 104.236.28.167 port 40994 ssh2
2019-10-11T13:12:16.582480hub.schaetter.us sshd\[16481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.28.167  user=root
...
2019-10-11 23:18:00
177.37.161.46 attack
Automatic report - Port Scan Attack
2019-10-11 23:42:54
171.244.140.174 attackspam
$f2bV_matches
2019-10-11 23:43:43
92.63.194.26 attack
Oct 11 17:31:06 srv206 sshd[5805]: Invalid user admin from 92.63.194.26
Oct 11 17:31:06 srv206 sshd[5805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.26
Oct 11 17:31:06 srv206 sshd[5805]: Invalid user admin from 92.63.194.26
Oct 11 17:31:08 srv206 sshd[5805]: Failed password for invalid user admin from 92.63.194.26 port 37964 ssh2
...
2019-10-11 23:31:45
115.94.204.156 attack
Oct 11 02:49:21 auw2 sshd\[22092\]: Invalid user Pa\$\$word@1234 from 115.94.204.156
Oct 11 02:49:21 auw2 sshd\[22092\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.94.204.156
Oct 11 02:49:23 auw2 sshd\[22092\]: Failed password for invalid user Pa\$\$word@1234 from 115.94.204.156 port 40024 ssh2
Oct 11 02:54:15 auw2 sshd\[22507\]: Invalid user P@ssword01 from 115.94.204.156
Oct 11 02:54:15 auw2 sshd\[22507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.94.204.156
2019-10-11 23:49:20
203.146.170.167 attackspam
2019-10-11T17:27:59.884756tmaserv sshd\[13459\]: Invalid user P@r0la0101 from 203.146.170.167 port 60326
2019-10-11T17:27:59.889875tmaserv sshd\[13459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.146.170.167
2019-10-11T17:28:02.092577tmaserv sshd\[13459\]: Failed password for invalid user P@r0la0101 from 203.146.170.167 port 60326 ssh2
2019-10-11T18:31:11.902002tmaserv sshd\[16231\]: Invalid user P@ssw0rt1q from 203.146.170.167 port 45236
2019-10-11T18:31:11.905723tmaserv sshd\[16231\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.146.170.167
2019-10-11T18:31:13.349763tmaserv sshd\[16231\]: Failed password for invalid user P@ssw0rt1q from 203.146.170.167 port 45236 ssh2
...
2019-10-11 23:39:47

最近上报的IP列表

223.10.144.190 58.31.112.181 175.239.72.254 12.120.86.85
20.173.80.174 203.33.2.168 181.107.255.254 231.17.103.177
7.4.19.96 213.194.225.217 155.124.107.113 62.88.231.73
51.72.106.12 236.223.57.224 133.0.68.45 131.32.248.146
103.214.152.90 39.222.217.59 76.113.95.9 212.131.165.22