必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom of Great Britain and Northern Ireland (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.4.213.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57840
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.4.213.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 07:39:56 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
149.213.4.80.in-addr.arpa domain name pointer smal-16-b2-v4wan-171203-cust404.vm20.cable.virginm.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.213.4.80.in-addr.arpa	name = smal-16-b2-v4wan-171203-cust404.vm20.cable.virginm.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
144.217.83.201 attack
Aug 13 13:13:28 game-panel sshd[3378]: Failed password for root from 144.217.83.201 port 47726 ssh2
Aug 13 13:17:40 game-panel sshd[3626]: Failed password for root from 144.217.83.201 port 57770 ssh2
2020-08-13 21:42:29
222.186.42.137 attack
Aug 13 15:30:40 theomazars sshd[1728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137  user=root
Aug 13 15:30:43 theomazars sshd[1728]: Failed password for root from 222.186.42.137 port 21540 ssh2
2020-08-13 21:44:13
42.118.48.233 spambotsattackproxynormal
BLOCK or LOG
2020-08-13 22:13:16
112.85.42.87 attackspam
2020-08-13T14:02:32.548188shield sshd\[27633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87  user=root
2020-08-13T14:02:34.521273shield sshd\[27633\]: Failed password for root from 112.85.42.87 port 42121 ssh2
2020-08-13T14:02:36.776038shield sshd\[27633\]: Failed password for root from 112.85.42.87 port 42121 ssh2
2020-08-13T14:02:39.451700shield sshd\[27633\]: Failed password for root from 112.85.42.87 port 42121 ssh2
2020-08-13T14:03:38.844461shield sshd\[27775\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87  user=root
2020-08-13 22:06:50
42.118.48.233 spambotsattackproxynormal
BLOCK or LOG
2020-08-13 22:13:10
5.135.165.55 attackspambots
Aug 13 02:37:54 web9 sshd\[12980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.165.55  user=root
Aug 13 02:37:56 web9 sshd\[12980\]: Failed password for root from 5.135.165.55 port 36358 ssh2
Aug 13 02:41:39 web9 sshd\[13552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.165.55  user=root
Aug 13 02:41:41 web9 sshd\[13552\]: Failed password for root from 5.135.165.55 port 46584 ssh2
Aug 13 02:45:33 web9 sshd\[14118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.165.55  user=root
2020-08-13 21:35:10
42.118.48.233 spambotsattackproxynormal
LOG
2020-08-13 22:14:59
2.39.120.180 attackspam
Aug 13 02:15:48 php1 sshd\[11545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.39.120.180  user=root
Aug 13 02:15:49 php1 sshd\[11545\]: Failed password for root from 2.39.120.180 port 47318 ssh2
Aug 13 02:17:48 php1 sshd\[11682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.39.120.180  user=root
Aug 13 02:17:50 php1 sshd\[11682\]: Failed password for root from 2.39.120.180 port 39698 ssh2
Aug 13 02:19:50 php1 sshd\[11819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.39.120.180  user=root
2020-08-13 21:37:17
172.245.22.219 attackspambots
2020-08-13T14:06:57.801038abusebot-8.cloudsearch.cf sshd[16215]: Invalid user ubnt from 172.245.22.219 port 49453
2020-08-13T14:06:57.807412abusebot-8.cloudsearch.cf sshd[16215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.245.22.219
2020-08-13T14:06:57.801038abusebot-8.cloudsearch.cf sshd[16215]: Invalid user ubnt from 172.245.22.219 port 49453
2020-08-13T14:06:59.825645abusebot-8.cloudsearch.cf sshd[16215]: Failed password for invalid user ubnt from 172.245.22.219 port 49453 ssh2
2020-08-13T14:07:01.730767abusebot-8.cloudsearch.cf sshd[16217]: Invalid user admin from 172.245.22.219 port 53429
2020-08-13T14:07:01.738482abusebot-8.cloudsearch.cf sshd[16217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.245.22.219
2020-08-13T14:07:01.730767abusebot-8.cloudsearch.cf sshd[16217]: Invalid user admin from 172.245.22.219 port 53429
2020-08-13T14:07:03.972407abusebot-8.cloudsearch.cf sshd[16217]: Fa
...
2020-08-13 22:07:11
95.243.136.198 attackbotsspam
Aug 13 02:32:09 web9 sshd\[12145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.243.136.198  user=root
Aug 13 02:32:12 web9 sshd\[12145\]: Failed password for root from 95.243.136.198 port 65134 ssh2
Aug 13 02:36:16 web9 sshd\[12760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.243.136.198  user=root
Aug 13 02:36:18 web9 sshd\[12760\]: Failed password for root from 95.243.136.198 port 63645 ssh2
Aug 13 02:40:18 web9 sshd\[13339\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.243.136.198  user=root
2020-08-13 21:34:26
88.216.30.243 attackspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-08-13 22:00:51
51.91.100.120 attackspambots
Aug 13 13:59:02 django-0 sshd[31190]: Failed password for root from 51.91.100.120 port 44590 ssh2
Aug 13 14:03:20 django-0 sshd[31244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps-21708951.vps.ovh.net  user=root
Aug 13 14:03:23 django-0 sshd[31244]: Failed password for root from 51.91.100.120 port 54864 ssh2
...
2020-08-13 22:00:26
218.92.0.215 attackbots
Aug 13 15:56:43 v22018053744266470 sshd[19827]: Failed password for root from 218.92.0.215 port 37062 ssh2
Aug 13 15:56:51 v22018053744266470 sshd[19838]: Failed password for root from 218.92.0.215 port 54249 ssh2
...
2020-08-13 21:57:24
111.229.121.142 attackbots
Aug 13 19:14:29 webhost01 sshd[3797]: Failed password for root from 111.229.121.142 port 47824 ssh2
...
2020-08-13 21:30:12
185.39.10.213 attack
Another port scanner
2020-08-13 22:13:05

最近上报的IP列表

120.5.147.149 137.201.126.244 245.245.151.238 65.201.25.216
131.48.72.103 15.135.104.176 152.28.166.74 247.81.135.154
187.33.66.238 176.196.214.32 195.109.123.48 143.57.105.90
241.43.219.83 113.36.20.39 201.178.179.197 173.65.237.212
134.144.27.67 4.4.97.6 181.200.60.197 135.241.143.12