必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Denmark

运营商(isp): Telenor

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.149.112.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2136
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.149.112.112.			IN	A

;; AUTHORITY SECTION:
.			207	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020032601 1800 900 604800 86400

;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 27 05:30:10 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
Host 112.112.149.94.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 112.112.149.94.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
119.163.244.32 attackbotsspam
Wed, 2019-08-07 16:05:38 - TCP Packet - Source:119.163.244.32,22234
Destination:,80 - [DVR-HTTP rule match]
2019-09-11 23:45:39
124.90.207.226 attackspam
SSH Bruteforce attempt
2019-09-11 23:35:56
45.136.109.38 attackspambots
Sep 10 18:28:50 lenivpn01 kernel: \[365734.849668\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.38 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=25337 PROTO=TCP SPT=50516 DPT=6006 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 10 18:34:22 lenivpn01 kernel: \[366066.642794\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.38 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=17398 PROTO=TCP SPT=50516 DPT=6800 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 10 18:36:12 lenivpn01 kernel: \[366176.962211\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.38 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=48492 PROTO=TCP SPT=50516 DPT=6074 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 10 21:04:16 lenivpn01 kernel: \[375060.613315\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.38 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=
...
2019-09-12 00:39:37
49.234.18.158 attackbotsspam
Sep 11 05:41:26 web9 sshd\[2735\]: Invalid user test1 from 49.234.18.158
Sep 11 05:41:26 web9 sshd\[2735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.18.158
Sep 11 05:41:27 web9 sshd\[2735\]: Failed password for invalid user test1 from 49.234.18.158 port 56200 ssh2
Sep 11 05:46:57 web9 sshd\[3748\]: Invalid user sinusbot from 49.234.18.158
Sep 11 05:46:57 web9 sshd\[3748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.18.158
2019-09-11 23:54:43
207.46.13.53 attackbots
Automatic report - Banned IP Access
2019-09-11 23:44:25
218.2.88.25 attackspam
Unauthorised access (Sep 11) SRC=218.2.88.25 LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=60097 TCP DPT=8080 WINDOW=9636 SYN
2019-09-12 00:00:31
54.83.91.255 attack
xmlrpc attack
2019-09-11 23:43:52
82.55.89.79 attack
Honeypot attack, port: 23, PTR: host79-89-dynamic.55-82-r.retail.telecomitalia.it.
2019-09-12 00:30:34
121.35.98.34 attackspam
firewall-block, port(s): 23/tcp
2019-09-11 23:41:42
94.102.56.181 attackspam
Sep 10 18:34:25 lenivpn01 kernel: \[366069.807104\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=94.102.56.181 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=10021 PROTO=TCP SPT=55512 DPT=6281 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 10 18:38:04 lenivpn01 kernel: \[366289.451770\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=94.102.56.181 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=45618 PROTO=TCP SPT=55512 DPT=6287 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 10 18:54:44 lenivpn01 kernel: \[367288.503290\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=94.102.56.181 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=39251 PROTO=TCP SPT=55512 DPT=6299 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 10 20:11:37 lenivpn01 kernel: \[371902.186405\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=94.102.56.181 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=
...
2019-09-12 00:24:43
208.115.196.14 attackbotsspam
CloudCIX Reconnaissance Scan Detected, PTR: 14-196-115-208.static.reverse.lstn.net.
2019-09-12 00:01:47
77.247.108.110 attackspam
09/11/2019-06:44:49.304151 77.247.108.110 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 75
2019-09-12 01:34:07
45.136.109.33 attackspambots
Sep 11 18:24:59 mc1 kernel: \[769664.710925\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.33 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=8301 PROTO=TCP SPT=44546 DPT=2721 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 11 18:29:16 mc1 kernel: \[769921.516077\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.33 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=20316 PROTO=TCP SPT=44546 DPT=2289 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 11 18:30:56 mc1 kernel: \[770021.926485\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.33 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=53488 PROTO=TCP SPT=44546 DPT=2354 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-09-12 00:43:01
185.175.93.105 attackbotsspam
firewall-block, port(s): 44512/tcp, 48512/tcp, 52912/tcp, 55212/tcp, 61512/tcp, 62712/tcp
2019-09-12 01:03:18
92.119.160.143 attack
proto=tcp  .  spt=57610  .  dpt=3389  .  src=92.119.160.143  .  dst=xx.xx.4.1  .     (listed on  rbldns-ru)     (650)
2019-09-12 01:20:32

最近上报的IP列表

107.212.60.237 84.135.179.249 116.239.205.121 141.236.120.9
202.27.20.198 116.132.53.89 46.229.113.183 174.251.63.88
105.71.146.107 90.100.78.179 149.152.157.7 89.213.125.57
159.178.11.154 27.136.254.18 71.75.56.169 216.153.154.253
196.154.206.193 84.133.114.29 75.135.76.176 191.63.7.194