必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Gasteiz / Vitoria

省份(region): Basque Country

国家(country): Spain

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.49.27.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16285
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.49.27.106.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082500 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Aug 25 21:24:01 CST 2019
;; MSG SIZE  rcvd: 116
HOST信息:
106.27.49.85.in-addr.arpa domain name pointer 106.pool85-49-27.dynamic.orange.es.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
106.27.49.85.in-addr.arpa	name = 106.pool85-49-27.dynamic.orange.es.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
61.19.22.162 attackspambots
Oct 17 11:42:55 kapalua sshd\[30458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.19.22.162  user=root
Oct 17 11:42:57 kapalua sshd\[30458\]: Failed password for root from 61.19.22.162 port 42218 ssh2
Oct 17 11:47:34 kapalua sshd\[30881\]: Invalid user fwupgrade from 61.19.22.162
Oct 17 11:47:34 kapalua sshd\[30881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.19.22.162
Oct 17 11:47:36 kapalua sshd\[30881\]: Failed password for invalid user fwupgrade from 61.19.22.162 port 53242 ssh2
2019-10-18 06:02:04
62.234.190.190 attackspam
Oct 17 21:13:14 ms-srv sshd[38022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.190.190  user=root
Oct 17 21:13:16 ms-srv sshd[38022]: Failed password for invalid user root from 62.234.190.190 port 58694 ssh2
2019-10-18 05:54:16
190.145.78.66 attackspam
Oct 17 11:43:14 wbs sshd\[3132\]: Invalid user rajkot from 190.145.78.66
Oct 17 11:43:14 wbs sshd\[3132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.78.66
Oct 17 11:43:16 wbs sshd\[3132\]: Failed password for invalid user rajkot from 190.145.78.66 port 40904 ssh2
Oct 17 11:47:53 wbs sshd\[3513\]: Invalid user shao from 190.145.78.66
Oct 17 11:47:53 wbs sshd\[3513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.78.66
2019-10-18 05:59:54
140.143.66.239 attack
Oct 17 21:03:43 ip-172-31-62-245 sshd\[8156\]: Invalid user vegas from 140.143.66.239\
Oct 17 21:03:45 ip-172-31-62-245 sshd\[8156\]: Failed password for invalid user vegas from 140.143.66.239 port 40842 ssh2\
Oct 17 21:07:47 ip-172-31-62-245 sshd\[8176\]: Failed password for sshd from 140.143.66.239 port 50084 ssh2\
Oct 17 21:11:44 ip-172-31-62-245 sshd\[8292\]: Invalid user oneadmin from 140.143.66.239\
Oct 17 21:11:46 ip-172-31-62-245 sshd\[8292\]: Failed password for invalid user oneadmin from 140.143.66.239 port 59316 ssh2\
2019-10-18 05:47:06
201.21.115.162 attackspam
Nov 29 06:38:41 odroid64 sshd\[20030\]: Invalid user rabbitmq from 201.21.115.162
Nov 29 06:38:41 odroid64 sshd\[20030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.21.115.162
Nov 29 06:38:43 odroid64 sshd\[20030\]: Failed password for invalid user rabbitmq from 201.21.115.162 port 50755 ssh2
Nov 30 18:20:55 odroid64 sshd\[16629\]: Invalid user storage from 201.21.115.162
Nov 30 18:20:55 odroid64 sshd\[16629\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.21.115.162
Nov 30 18:20:57 odroid64 sshd\[16629\]: Failed password for invalid user storage from 201.21.115.162 port 57648 ssh2
Dec  2 01:04:33 odroid64 sshd\[27105\]: Invalid user midgear from 201.21.115.162
Dec  2 01:04:33 odroid64 sshd\[27105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.21.115.162
Dec  2 01:04:35 odroid64 sshd\[27105\]: Failed password for invalid user midgear fr
...
2019-10-18 06:06:09
106.13.106.46 attackbotsspam
5x Failed Password
2019-10-18 06:09:39
201.212.17.192 attackspambots
Jan 31 23:33:48 odroid64 sshd\[26909\]: Invalid user test from 201.212.17.192
Jan 31 23:33:48 odroid64 sshd\[26909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.212.17.192
Jan 31 23:33:50 odroid64 sshd\[26909\]: Failed password for invalid user test from 201.212.17.192 port 55422 ssh2
Feb  5 02:46:39 odroid64 sshd\[21485\]: Invalid user minecraft from 201.212.17.192
Feb  5 02:46:39 odroid64 sshd\[21485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.212.17.192
Feb  5 02:46:40 odroid64 sshd\[21485\]: Failed password for invalid user minecraft from 201.212.17.192 port 41316 ssh2
Feb 28 19:51:39 odroid64 sshd\[32080\]: Invalid user mou from 201.212.17.192
Feb 28 19:51:39 odroid64 sshd\[32080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.212.17.192
Feb 28 19:51:41 odroid64 sshd\[32080\]: Failed password for invalid user mou from 201.212.1
...
2019-10-18 05:58:36
49.235.134.224 attackbotsspam
Invalid user anna from 49.235.134.224 port 52464
2019-10-18 05:44:39
138.68.57.207 attackspam
Automatic report - Banned IP Access
2019-10-18 05:59:04
138.68.215.182 attackbots
Automatic report - XMLRPC Attack
2019-10-18 05:36:44
180.121.82.41 attack
(Oct 18)  LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=26165 TCP DPT=8080 WINDOW=60650 SYN 
 (Oct 17)  LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=22138 TCP DPT=8080 WINDOW=5907 SYN 
 (Oct 17)  LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=19275 TCP DPT=8080 WINDOW=60650 SYN 
 (Oct 16)  LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=7643 TCP DPT=8080 WINDOW=60650 SYN 
 (Oct 16)  LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=42474 TCP DPT=8080 WINDOW=5907 SYN 
 (Oct 15)  LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=22129 TCP DPT=8080 WINDOW=5907 SYN 
 (Oct 15)  LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=16875 TCP DPT=8080 WINDOW=5907 SYN 
 (Oct 15)  LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=21660 TCP DPT=8080 WINDOW=5907 SYN 
 (Oct 14)  LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=31596 TCP DPT=8080 WINDOW=60650 SYN
2019-10-18 06:01:26
164.132.44.25 attackbotsspam
Oct 17 20:44:39 venus sshd\[6445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.44.25  user=root
Oct 17 20:44:41 venus sshd\[6445\]: Failed password for root from 164.132.44.25 port 57826 ssh2
Oct 17 20:48:27 venus sshd\[6474\]: Invalid user qs from 164.132.44.25 port 41342
...
2019-10-18 05:44:26
201.219.186.243 attackspam
Apr 18 03:12:37 odroid64 sshd\[29004\]: Invalid user iconn from 201.219.186.243
Apr 18 03:12:37 odroid64 sshd\[29004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.219.186.243
Apr 18 03:12:39 odroid64 sshd\[29004\]: Failed password for invalid user iconn from 201.219.186.243 port 51629 ssh2
Apr 19 15:32:58 odroid64 sshd\[13938\]: Invalid user Admin from 201.219.186.243
Apr 19 15:32:58 odroid64 sshd\[13938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.219.186.243
Apr 19 15:33:00 odroid64 sshd\[13938\]: Failed password for invalid user Admin from 201.219.186.243 port 51517 ssh2
...
2019-10-18 05:39:35
89.36.216.125 attackspambots
2019-10-17T22:02:17.635850hub.schaetter.us sshd\[4421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.36.216.125  user=root
2019-10-17T22:02:18.843749hub.schaetter.us sshd\[4421\]: Failed password for root from 89.36.216.125 port 44640 ssh2
2019-10-17T22:05:58.630416hub.schaetter.us sshd\[4464\]: Invalid user mb from 89.36.216.125 port 55142
2019-10-17T22:05:58.641595hub.schaetter.us sshd\[4464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.36.216.125
2019-10-17T22:06:01.189196hub.schaetter.us sshd\[4464\]: Failed password for invalid user mb from 89.36.216.125 port 55142 ssh2
...
2019-10-18 06:08:46
201.203.21.241 attackspam
Feb 24 00:32:06 odroid64 sshd\[5964\]: Invalid user webadmin from 201.203.21.241
Feb 24 00:32:06 odroid64 sshd\[5964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.203.21.241
Feb 24 00:32:08 odroid64 sshd\[5964\]: Failed password for invalid user webadmin from 201.203.21.241 port 33678 ssh2
Mar  9 01:25:33 odroid64 sshd\[29061\]: Invalid user ann from 201.203.21.241
Mar  9 01:25:33 odroid64 sshd\[29061\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.203.21.241
Mar  9 01:25:35 odroid64 sshd\[29061\]: Failed password for invalid user ann from 201.203.21.241 port 42032 ssh2
...
2019-10-18 06:09:04

最近上报的IP列表

180.125.27.48 193.25.173.245 37.36.166.86 89.210.193.247
34.2.194.83 185.104.249.110 103.138.109.95 86.108.109.131
80.211.252.40 94.179.129.198 87.113.112.254 105.138.238.77
96.75.169.157 157.71.76.224 88.140.78.131 41.4.100.211
125.154.40.204 81.102.78.236 135.220.160.157 65.122.136.75