必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Czechia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.102.248.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53106
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;89.102.248.194.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 20:12:28 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
194.248.102.89.in-addr.arpa domain name pointer ip-89-102-248-194.bb.vodafone.cz.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
194.248.102.89.in-addr.arpa	name = ip-89-102-248-194.bb.vodafone.cz.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
170.238.230.42 attack
$f2bV_matches
2019-07-24 01:13:38
194.62.202.146 attack
Automatic report - Port Scan Attack
2019-07-24 02:08:56
106.75.172.225 attackbotsspam
Spam Timestamp : 23-Jul-19 10:04 _ BlockList Provider  barracudacentral _ (404)
2019-07-24 01:18:07
217.156.250.153 attackbotsspam
ICMP MP Probe, Scan -
2019-07-24 01:56:14
217.79.128.197 attackspambots
ICMP MP Probe, Scan -
2019-07-24 01:39:40
218.92.0.184 attack
SSH bruteforce
2019-07-24 01:27:37
134.209.226.69 attack
Jul 23 18:00:47 OPSO sshd\[24653\]: Invalid user sysadmin from 134.209.226.69 port 43566
Jul 23 18:00:47 OPSO sshd\[24653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.226.69
Jul 23 18:00:49 OPSO sshd\[24653\]: Failed password for invalid user sysadmin from 134.209.226.69 port 43566 ssh2
Jul 23 18:05:26 OPSO sshd\[25259\]: Invalid user patrick from 134.209.226.69 port 40554
Jul 23 18:05:26 OPSO sshd\[25259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.226.69
2019-07-24 01:46:01
41.72.105.171 attack
2019-07-23T17:15:53.653512abusebot-4.cloudsearch.cf sshd\[324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.72.105.171  user=root
2019-07-24 01:28:52
179.214.131.170 attackbotsspam
Jul 23 20:12:18 server sshd\[21068\]: User root from 179.214.131.170 not allowed because listed in DenyUsers
Jul 23 20:12:18 server sshd\[21068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.214.131.170  user=root
Jul 23 20:12:21 server sshd\[21068\]: Failed password for invalid user root from 179.214.131.170 port 60428 ssh2
Jul 23 20:22:13 server sshd\[6726\]: Invalid user del from 179.214.131.170 port 58852
Jul 23 20:22:13 server sshd\[6726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.214.131.170
2019-07-24 01:39:10
46.101.204.20 attack
Jul 23 17:58:31 yabzik sshd[29880]: Failed password for root from 46.101.204.20 port 45990 ssh2
Jul 23 18:03:00 yabzik sshd[31407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.204.20
Jul 23 18:03:01 yabzik sshd[31407]: Failed password for invalid user uniform from 46.101.204.20 port 41646 ssh2
2019-07-24 01:55:40
206.180.162.6 attackbotsspam
firewall-block, port(s): 445/tcp
2019-07-24 02:06:18
178.164.136.227 attack
firewall-block, port(s): 22/tcp
2019-07-24 02:11:45
91.125.195.139 attack
Spam Timestamp : 23-Jul-19 09:47 _ BlockList Provider  combined abuse _ (403)
2019-07-24 01:18:31
94.29.73.233 attackbotsspam
Automatic report - Banned IP Access
2019-07-24 02:05:43
221.149.134.160 attack
Jul 23 10:56:38 mxgate1 postfix/postscreen[17275]: CONNECT from [221.149.134.160]:30574 to [176.31.12.44]:25
Jul 23 10:56:38 mxgate1 postfix/dnsblog[17554]: addr 221.149.134.160 listed by domain cbl.abuseat.org as 127.0.0.2
Jul 23 10:56:38 mxgate1 postfix/dnsblog[17553]: addr 221.149.134.160 listed by domain zen.spamhaus.org as 127.0.0.4
Jul 23 10:56:38 mxgate1 postfix/dnsblog[17553]: addr 221.149.134.160 listed by domain zen.spamhaus.org as 127.0.0.3
Jul 23 10:56:38 mxgate1 postfix/dnsblog[17550]: addr 221.149.134.160 listed by domain bl.spamcop.net as 127.0.0.2
Jul 23 10:56:38 mxgate1 postfix/dnsblog[17551]: addr 221.149.134.160 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jul 23 10:56:38 mxgate1 postfix/dnsblog[17552]: addr 221.149.134.160 listed by domain b.barracudacentral.org as 127.0.0.2
Jul 23 10:56:44 mxgate1 postfix/postscreen[17275]: DNSBL rank 6 for [221.149.134.160]:30574
Jul x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=221.149.134.1
2019-07-24 01:34:57

最近上报的IP列表

133.18.229.61 24.115.238.240 76.146.200.241 180.255.98.126
214.167.152.234 107.101.222.226 208.214.243.141 185.48.162.243
118.148.242.217 223.52.183.132 41.129.247.228 118.54.238.75
122.36.130.23 63.133.162.119 127.64.155.153 142.48.66.186
30.228.164.167 36.118.168.36 161.157.17.239 237.48.194.99