必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Ashburn

省份(region): Virginia

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.182.249.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15914
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.182.249.49.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121802 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 19 03:55:11 CST 2024
;; MSG SIZE  rcvd: 106
HOST信息:
Host 49.249.182.68.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.249.182.68.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
138.197.171.149 attackbotsspam
Unauthorized connection attempt detected from IP address 138.197.171.149 to port 2220 [J]
2020-01-12 00:43:22
46.38.144.57 attackspam
Jan 11 17:34:51 webserver postfix/smtpd\[30410\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 11 17:35:40 webserver postfix/smtpd\[30410\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 11 17:36:27 webserver postfix/smtpd\[30410\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 11 17:37:15 webserver postfix/smtpd\[30410\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 11 17:38:02 webserver postfix/smtpd\[30623\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-01-12 00:48:11
137.59.162.169 attack
Unauthorized connection attempt detected from IP address 137.59.162.169 to port 2220 [J]
2020-01-12 00:53:12
132.248.192.9 attackspam
$f2bV_matches
2020-01-12 01:15:33
222.186.30.187 attack
Jan 11 18:11:55 h2177944 sshd\[18417\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.187  user=root
Jan 11 18:11:58 h2177944 sshd\[18417\]: Failed password for root from 222.186.30.187 port 61412 ssh2
Jan 11 18:12:00 h2177944 sshd\[18417\]: Failed password for root from 222.186.30.187 port 61412 ssh2
Jan 11 18:12:02 h2177944 sshd\[18417\]: Failed password for root from 222.186.30.187 port 61412 ssh2
...
2020-01-12 01:13:05
132.232.4.33 attackbotsspam
Jan 11 17:31:47 MK-Soft-Root2 sshd[31495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.4.33 
Jan 11 17:31:50 MK-Soft-Root2 sshd[31495]: Failed password for invalid user PlcmSpIp from 132.232.4.33 port 41070 ssh2
...
2020-01-12 01:19:05
159.192.157.216 attackbots
port scan and connect, tcp 22 (ssh)
2020-01-12 01:12:23
137.74.44.162 attack
ssh failed login
2020-01-12 00:50:50
107.174.33.167 attackbotsspam
Netis/Netcore Router Default Credential Remote Code Execution Vulnerability
2020-01-12 00:49:11
134.175.167.203 attackbotsspam
$f2bV_matches
2020-01-12 01:08:16
134.209.163.236 attackbotsspam
$f2bV_matches
2020-01-12 01:01:52
138.197.175.236 attackbots
Jan 11 16:30:07 vps670341 sshd[25847]: Invalid user gkf from 138.197.175.236 port 45254
2020-01-12 00:42:01
138.197.151.248 attack
Unauthorized connection attempt detected from IP address 138.197.151.248 to port 2220 [J]
2020-01-12 00:45:42
159.203.193.51 attack
Unauthorized connection attempt detected from IP address 159.203.193.51 to port 135
2020-01-12 00:55:52
133.130.90.174 attack
$f2bV_matches
2020-01-12 01:14:44

最近上报的IP列表

195.87.12.18 40.108.207.253 23.17.174.239 219.166.222.5
223.151.96.173 28.177.81.20 134.141.17.63 7.65.26.99
175.242.17.119 238.175.255.67 133.219.163.22 233.197.199.43
145.128.100.254 200.81.10.115 43.250.109.164 124.53.45.173
7.2.149.96 69.87.55.188 104.137.106.177 32.229.98.132