必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Friesoythe

省份(region): Niedersachsen

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.249.16.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36002
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;91.249.16.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 18:54:50 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
12.16.249.91.in-addr.arpa domain name pointer dyndsl-091-249-016-012.ewe-ip-backbone.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.16.249.91.in-addr.arpa	name = dyndsl-091-249-016-012.ewe-ip-backbone.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
211.159.159.238 attackbotsspam
Invalid user server from 211.159.159.238 port 45770
2019-12-14 21:23:16
5.249.159.139 attackbots
Invalid user rakewell from 5.249.159.139 port 60708
2019-12-14 21:31:07
92.241.106.14 attackbotsspam
1576304566 - 12/14/2019 07:22:46 Host: 92.241.106.14/92.241.106.14 Port: 445 TCP Blocked
2019-12-14 21:25:47
54.221.110.84 attack
2019-12-14 x@x
2019-12-14 05:35:33 unexpected disconnection while reading SMTP command from em3-54-221-110-84.compute-1.amazonaws.com (Penelope.suxinhotel.com) [54.221.110.84]:43276 I=[10.100.18.20]:25 (error: Connection reset by peer)
2019-12-14 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=54.221.110.84
2019-12-14 21:37:57
186.122.147.189 attackbotsspam
Dec 14 13:47:55 microserver sshd[586]: Invalid user zia from 186.122.147.189 port 44340
Dec 14 13:47:55 microserver sshd[586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.147.189
Dec 14 13:47:57 microserver sshd[586]: Failed password for invalid user zia from 186.122.147.189 port 44340 ssh2
Dec 14 13:55:09 microserver sshd[1834]: Invalid user kingdon from 186.122.147.189 port 52834
Dec 14 13:55:09 microserver sshd[1834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.147.189
Dec 14 14:10:21 microserver sshd[4304]: Invalid user crv from 186.122.147.189 port 41296
Dec 14 14:10:21 microserver sshd[4304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.147.189
Dec 14 14:10:24 microserver sshd[4304]: Failed password for invalid user crv from 186.122.147.189 port 41296 ssh2
Dec 14 14:17:35 microserver sshd[5245]: pam_unix(sshd:auth): authentication failure; logname= ui
2019-12-14 21:36:29
185.176.27.26 attackbots
Dec 14 16:12:51 debian-2gb-vpn-nbg1-1 kernel: [707545.847772] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.26 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=54088 PROTO=TCP SPT=44535 DPT=8889 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-14 21:20:06
123.207.61.134 attackbotsspam
Dec 14 05:57:54 zimbra sshd[9437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.61.134  user=r.r
Dec 14 05:57:55 zimbra sshd[9437]: Failed password for r.r from 123.207.61.134 port 52332 ssh2
Dec 14 05:57:56 zimbra sshd[9437]: Received disconnect from 123.207.61.134 port 52332:11: Bye Bye [preauth]
Dec 14 05:57:56 zimbra sshd[9437]: Disconnected from 123.207.61.134 port 52332 [preauth]
Dec 14 06:09:37 zimbra sshd[19208]: Invalid user ue from 123.207.61.134
Dec 14 06:09:37 zimbra sshd[19208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.61.134
Dec 14 06:09:40 zimbra sshd[19208]: Failed password for invalid user ue from 123.207.61.134 port 43662 ssh2
Dec 14 06:09:40 zimbra sshd[19208]: Received disconnect from 123.207.61.134 port 43662:11: Bye Bye [preauth]
Dec 14 06:09:40 zimbra sshd[19208]: Disconnected from 123.207.61.134 port 43662 [preauth]
Dec 14 06:14:52 zimbra ssh........
-------------------------------
2019-12-14 21:18:47
185.162.235.107 attackbotsspam
Dec 14 12:08:33 mail postfix/smtpd[18804]: warning: unknown[185.162.235.107]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 14 12:08:33 mail postfix/smtpd[20020]: warning: unknown[185.162.235.107]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 14 12:08:33 mail postfix/smtpd[20021]: warning: unknown[185.162.235.107]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 14 12:08:33 mail postfix/smtpd[19939]: warning: unknown[185.162.235.107]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-12-14 21:55:58
112.85.42.173 attackspambots
Dec 13 00:37:06 microserver sshd[38975]: Failed none for root from 112.85.42.173 port 3801 ssh2
Dec 13 00:37:07 microserver sshd[38975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173  user=root
Dec 13 00:37:09 microserver sshd[38975]: Failed password for root from 112.85.42.173 port 3801 ssh2
Dec 13 00:37:13 microserver sshd[38975]: Failed password for root from 112.85.42.173 port 3801 ssh2
Dec 13 00:37:16 microserver sshd[38975]: Failed password for root from 112.85.42.173 port 3801 ssh2
Dec 13 01:44:28 microserver sshd[50084]: Failed none for root from 112.85.42.173 port 17034 ssh2
Dec 13 01:44:29 microserver sshd[50084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173  user=root
Dec 13 01:44:31 microserver sshd[50084]: Failed password for root from 112.85.42.173 port 17034 ssh2
Dec 13 01:44:34 microserver sshd[50084]: Failed password for root from 112.85.42.173 port 17034 ssh2
Dec 13 01:44:38 micro
2019-12-14 21:21:28
212.64.28.77 attackspambots
Dec 13 21:55:58 web9 sshd\[32608\]: Invalid user sshd1235 from 212.64.28.77
Dec 13 21:55:58 web9 sshd\[32608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.28.77
Dec 13 21:56:00 web9 sshd\[32608\]: Failed password for invalid user sshd1235 from 212.64.28.77 port 35810 ssh2
Dec 13 22:03:41 web9 sshd\[1374\]: Invalid user ffffff from 212.64.28.77
Dec 13 22:03:41 web9 sshd\[1374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.28.77
2019-12-14 21:53:57
95.137.217.72 attackbots
12/14/2019-07:22:18.846737 95.137.217.72 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-12-14 21:48:07
112.133.248.97 attack
1576304555 - 12/14/2019 07:22:35 Host: 112.133.248.97/112.133.248.97 Port: 445 TCP Blocked
2019-12-14 21:34:23
39.53.168.130 attackbotsspam
Dec 14 11:16:25 marvibiene sshd[25879]: Invalid user RPM from 39.53.168.130 port 62938
Dec 14 11:16:26 marvibiene sshd[25879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.53.168.130
Dec 14 11:16:25 marvibiene sshd[25879]: Invalid user RPM from 39.53.168.130 port 62938
Dec 14 11:16:28 marvibiene sshd[25879]: Failed password for invalid user RPM from 39.53.168.130 port 62938 ssh2
...
2019-12-14 21:45:36
46.38.242.158 attack
Dec 14 14:14:12 MK-Soft-VM3 sshd[21763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.38.242.158 
Dec 14 14:14:13 MK-Soft-VM3 sshd[21763]: Failed password for invalid user zeine from 46.38.242.158 port 53884 ssh2
...
2019-12-14 21:17:29
54.37.233.192 attackbots
Invalid user direction from 54.37.233.192 port 55496
2019-12-14 21:39:35

最近上报的IP列表

172.185.164.92 114.117.52.159 135.170.61.130 250.204.142.165
110.254.108.32 53.141.225.5 203.103.238.251 218.224.240.62
150.43.3.136 33.142.174.100 97.221.93.8 169.212.17.212
100.86.246.115 203.239.86.72 37.125.33.220 30.118.58.81
190.215.14.236 188.119.60.111 120.72.118.182 118.192.240.231