必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.48.135.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60547
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.48.135.22.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121600 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 16 14:22:04 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
22.135.48.99.in-addr.arpa domain name pointer adsl-99-48-135-22.dsl.pltn13.sbcglobal.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
22.135.48.99.in-addr.arpa	name = adsl-99-48-135-22.dsl.pltn13.sbcglobal.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.50.149.2 attackbots
Apr 21 00:00:56 web01.agentur-b-2.de postfix/smtpd[1607985]: warning: unknown[185.50.149.2]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 21 00:00:56 web01.agentur-b-2.de postfix/smtpd[1607985]: lost connection after AUTH from unknown[185.50.149.2]
Apr 21 00:01:08 web01.agentur-b-2.de postfix/smtpd[1608128]: warning: unknown[185.50.149.2]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 21 00:01:08 web01.agentur-b-2.de postfix/smtpd[1608128]: lost connection after AUTH from unknown[185.50.149.2]
Apr 21 00:10:27 web01.agentur-b-2.de postfix/smtpd[1746814]: warning: unknown[185.50.149.2]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-04-21 06:51:34
88.230.67.186 attack
Unauthorized connection attempt detected from IP address 88.230.67.186 to port 445
2020-04-21 07:02:38
221.163.8.108 attack
Apr 20 23:44:46 lock-38 sshd[1301624]: Failed password for root from 221.163.8.108 port 38714 ssh2
Apr 20 23:44:47 lock-38 sshd[1301624]: Disconnected from authenticating user root 221.163.8.108 port 38714 [preauth]
Apr 20 23:49:28 lock-38 sshd[1301759]: Invalid user admin from 221.163.8.108 port 56638
Apr 20 23:49:28 lock-38 sshd[1301759]: Invalid user admin from 221.163.8.108 port 56638
Apr 20 23:49:28 lock-38 sshd[1301759]: Failed password for invalid user admin from 221.163.8.108 port 56638 ssh2
...
2020-04-21 07:01:42
185.50.149.24 attack
Apr 20 22:21:27 imap dovecot[17355]: auth: ldap(info@scream.dnet.hu,185.50.149.24): unknown user
Apr 20 22:21:43 imap dovecot[17355]: auth: ldap(info@scream.dnet.hu,185.50.149.24): unknown user
Apr 20 23:31:52 imap dovecot[17355]: auth: ldap(info@scream.dnet.hu,185.50.149.24): unknown user
Apr 21 00:42:33 imap dovecot[17355]: auth: ldap(info@scream.dnet.hu,185.50.149.24): unknown user
Apr 21 00:42:49 imap dovecot[17355]: auth: ldap(info@scream.dnet.hu,185.50.149.24): unknown user
...
2020-04-21 06:51:09
175.29.188.9 attackbotsspam
Brute force attempt
2020-04-21 06:55:41
190.196.64.93 attackbots
2020-04-20T19:51:06.715971shield sshd\[18730\]: Invalid user hadoop from 190.196.64.93 port 35244
2020-04-20T19:51:06.718659shield sshd\[18730\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.196.64.93
2020-04-20T19:51:08.401557shield sshd\[18730\]: Failed password for invalid user hadoop from 190.196.64.93 port 35244 ssh2
2020-04-20T19:54:44.489347shield sshd\[19657\]: Invalid user test123 from 190.196.64.93 port 49070
2020-04-20T19:54:44.492982shield sshd\[19657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.196.64.93
2020-04-21 07:01:57
104.236.94.202 attackbotsspam
Invalid user admin from 104.236.94.202 port 55686
2020-04-21 06:38:29
182.43.245.72 attack
SSH login attempts
2020-04-21 06:39:31
62.82.75.58 attackbotsspam
5x Failed Password
2020-04-21 07:08:49
142.93.52.3 attack
Apr 20 09:03:11: Invalid user test2 from 142.93.52.3 port 32798
2020-04-21 07:10:46
188.40.130.251 attack
hosting phishing website: stkaragiannis.gr/.well-known/tik
2020-04-21 06:57:20
84.232.78.2 attackspambots
Apr 21 00:21:55 mail.srvfarm.net postfix/smtpd[2491368]: NOQUEUE: reject: RCPT from unknown[84.232.78.2]: 554 5.7.1 Service unavailable; Client host [84.232.78.2] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?84.232.78.2; from= to= proto=ESMTP helo=<1rotc.bragg.army.mil>
Apr 21 00:21:57 mail.srvfarm.net postfix/smtpd[2491368]: NOQUEUE: reject: RCPT from unknown[84.232.78.2]: 554 5.7.1 Service unavailable; Client host [84.232.78.2] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?84.232.78.2; from= to= proto=ESMTP helo=<1rotc.bragg.army.mil>
Apr 21 00:21:58 mail.srvfarm.net postfix/smtpd[2491368]: NOQUEUE: reject: RCPT from unknown[84.232.78.2]: 554 5.7.1 Service unavailable; Client host [84.232.78.2] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?84.232.78.2; from= to= proto=ESMTP helo
2020-04-21 06:52:07
58.87.96.161 attackspambots
Invalid user admin from 58.87.96.161 port 57392
2020-04-21 07:00:28
42.113.1.181 attack
" "
2020-04-21 07:03:44
78.128.113.99 attack
Brute force attack stopped by firewall
2020-04-21 06:52:23

最近上报的IP列表

69.142.235.52 138.209.79.253 142.93.187.82 179.245.105.136
233.12.138.53 108.24.183.152 39.220.176.110 218.159.115.141
82.108.54.166 189.103.9.9 28.26.127.169 245.247.145.147
145.64.162.191 171.243.49.2 211.32.7.59 196.151.79.100
114.148.148.124 60.17.234.8 228.37.222.121 126.141.49.138