必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands

运营商(isp): Incrediserve Ltd

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attack
massive Port Scan
2020-10-07 04:15:40
attackspambots
massive Port Scan
2020-10-06 20:19:06
attackbotsspam
Connection by 94.102.49.117 on port: 3389 got caught by honeypot at 5/11/2020 3:45:07 PM
2020-05-12 03:28:47
attackspam
scan r
2020-05-02 00:51:37
相同子网IP讨论:
IP 类型 评论内容 时间
94.102.49.193 botsattackproxy
Bot
2024-04-11 12:03:13
94.102.49.190 proxy
VPN fraud
2023-05-29 12:52:27
94.102.49.191 attackspam
ET DROP Dshield Block Listed Source group 1 - port: 132 proto: tcp cat: Misc Attackbytes: 60
2020-10-14 05:37:55
94.102.49.191 attackspambots
Port-scan: detected 174 distinct ports within a 24-hour window.
2020-10-07 17:07:10
94.102.49.59 attack
port scan
2020-10-07 00:57:42
94.102.49.59 attack
Hacker
2020-10-06 16:51:13
94.102.49.193 attackbots
 TCP (SYN) 94.102.49.193:6707 -> port 502, len 44
2020-10-05 03:01:09
94.102.49.193 attackspambots
 TCP (SYN) 94.102.49.193:6707 -> port 502, len 44
2020-10-04 18:45:20
94.102.49.93 attackbotsspam
Port-scan: detected 200 distinct ports within a 24-hour window.
2020-10-04 06:25:39
94.102.49.93 attackbotsspam
Port-scan: detected 200 distinct ports within a 24-hour window.
2020-10-03 22:30:11
94.102.49.93 attackspam
[Sun Sep 27 22:47:43 2020] - Syn Flood From IP: 94.102.49.93 Port: 59653
2020-10-03 14:13:26
94.102.49.137 attackspam
Fri, 2020-10-02 08:33:48 - TCP Packet - Source:94.102.49.137 Destination:xxx.xxx.xxx.xxx - [PORT SCAN]
2020-10-03 04:32:19
94.102.49.137 attack
Oct 2 15:35:22 *hidden* kernel: [UFW BLOCK] IN=ens192 OUT= MAC=00:50:56:bc:13:b8:30:e4:db:97:3e:3f:08:00 SRC=94.102.49.137 DST=217.198.117.163 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=42330 PROTO=TCP SPT=45720 DPT=11117 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 2 15:35:22 *hidden* kernel: [UFW BLOCK] IN=ens192 OUT= MAC=00:50:56:bc:13:b8:30:e4:db:97:3e:3f:08:00 SRC=94.102.49.137 DST=217.198.117.163 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=28079 PROTO=TCP SPT=45720 DPT=11218 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 2 15:35:25 *hidden* kernel: [UFW BLOCK] IN=ens192 OUT= MAC=00:50:56:bc:13:b8:30:e4:db:97:3e:3f:08:00 SRC=94.102.49.137 DST=217.198.117.163 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=3153 PROTO=TCP SPT=45720 DPT=11222 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 2 15:35:25 *hidden* kernel: [UFW BLOCK] IN=ens192 OUT= MAC=00:50:56:bc:13:b8:30:e4:db:97:3e:3f:08:00 SRC=94.102.49.137 DST=217.198.117.163 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=16947 PROTO=TCP SPT=45720 DPT=11215 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 2 15:
...
2020-10-02 23:52:54
94.102.49.137 attackbotsspam
no-reverse-dns-configured.com
2020-10-02 20:24:29
94.102.49.137 attackspambots
port scan
2020-10-02 16:56:50
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.102.49.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42916
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.102.49.117.			IN	A

;; AUTHORITY SECTION:
.			270	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020050101 1800 900 604800 86400

;; Query time: 98 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 02 00:51:31 CST 2020
;; MSG SIZE  rcvd: 117
HOST信息:
117.49.102.94.in-addr.arpa domain name pointer r210new-ip2.idfnv.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
117.49.102.94.in-addr.arpa	name = r210new-ip2.idfnv.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
118.165.85.195 attackbots
$f2bV_matches
2020-04-21 22:15:31
106.12.91.36 attack
Invalid user sz from 106.12.91.36 port 47834
2020-04-21 22:25:47
89.223.26.166 attackbots
Invalid user tq from 89.223.26.166 port 34143
2020-04-21 22:30:53
119.193.27.90 attackbotsspam
Invalid user yc from 119.193.27.90 port 20691
2020-04-21 22:13:17
113.162.141.24 attackbotsspam
Invalid user supervisor from 113.162.141.24 port 55196
2020-04-21 22:18:53
113.21.98.67 attackspambots
Invalid user admin from 113.21.98.67 port 36708
2020-04-21 22:19:58
51.91.156.199 attackspam
Invalid user yx from 51.91.156.199 port 34970
2020-04-21 22:39:17
139.59.33.255 attack
Invalid user backups from 139.59.33.255 port 39945
2020-04-21 22:04:05
120.131.3.144 attackbotsspam
Invalid user ni from 120.131.3.144 port 59722
2020-04-21 22:12:13
130.61.113.33 attackbots
Invalid user concat from 130.61.113.33 port 43529
2020-04-21 22:06:26
129.213.107.56 attack
Invalid user bv from 129.213.107.56 port 58094
2020-04-21 22:07:08
122.224.131.116 attackbots
Apr 21 13:22:34 scw-6657dc sshd[28147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.131.116
Apr 21 13:22:34 scw-6657dc sshd[28147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.131.116
Apr 21 13:22:36 scw-6657dc sshd[28147]: Failed password for invalid user ib from 122.224.131.116 port 47782 ssh2
...
2020-04-21 22:10:25
122.70.153.228 attackspambots
Invalid user admin from 122.70.153.228 port 34028
2020-04-21 22:10:54
119.29.152.172 attack
2020-04-21T13:03:58.262963homeassistant sshd[9484]: Invalid user f from 119.29.152.172 port 48274
2020-04-21T13:03:58.274150homeassistant sshd[9484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.152.172
...
2020-04-21 22:14:29
83.9.120.184 attackbots
Invalid user techuser from 83.9.120.184 port 46592
2020-04-21 22:34:29

最近上报的IP列表

107.45.146.226 46.253.5.8 190.118.129.238 91.29.33.48
200.29.32.205 164.150.171.58 112.221.27.180 74.39.206.46
206.59.119.141 104.144.74.173 51.195.5.232 201.200.66.162
71.212.212.34 152.8.231.217 158.209.68.218 200.201.82.104
88.58.35.56 58.185.76.173 213.66.116.65 50.72.40.227