必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Johannesburg

省份(region): Gauteng

国家(country): South Africa

运营商(isp): Telkom

主机名(hostname): unknown

机构(organization): TELKOMMOBILE

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.252.145.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23347
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;102.252.145.133.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082300 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Aug 24 00:43:06 CST 2019
;; MSG SIZE  rcvd: 119
HOST信息:
133.145.252.102.in-addr.arpa domain name pointer 8ta-252-145-133.telkomadsl.co.za.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
133.145.252.102.in-addr.arpa	name = 8ta-252-145-133.telkomadsl.co.za.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
77.28.254.58 attackspambots
Port probing on unauthorized port 23
2020-02-14 20:53:26
176.114.238.33 attackspambots
Honeypot attack, port: 4567, PTR: klient.box3.pl.
2020-02-14 20:44:16
186.216.99.100 attackbots
Automatic report - Port Scan Attack
2020-02-14 20:49:56
179.108.56.244 attackbots
firewall-block, port(s): 445/tcp
2020-02-14 20:53:59
182.254.228.154 attack
445/tcp 1433/tcp...
[2019-12-25/2020-02-14]6pkt,2pt.(tcp)
2020-02-14 20:50:16
212.119.194.34 attackbotsspam
Feb 13 21:26:26 server sshd\[3367\]: Invalid user MAUROGPC from 212.119.194.34
Feb 13 21:26:26 server sshd\[3367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.119.194.34 
Feb 13 21:26:28 server sshd\[3367\]: Failed password for invalid user MAUROGPC from 212.119.194.34 port 48360 ssh2
Feb 14 07:50:47 server sshd\[19159\]: Invalid user cue from 212.119.194.34
Feb 14 07:50:47 server sshd\[19159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.119.194.34 
...
2020-02-14 20:37:57
45.55.136.206 attackbotsspam
$f2bV_matches
2020-02-14 20:43:02
60.210.40.210 attack
Feb 14 09:02:51 MK-Soft-VM8 sshd[6783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.210.40.210 
Feb 14 09:02:53 MK-Soft-VM8 sshd[6783]: Failed password for invalid user ubuntu1404 from 60.210.40.210 port 10023 ssh2
...
2020-02-14 20:23:16
14.47.20.195 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 20:08:49
58.27.250.114 attackbotsspam
Unauthorized connection attempt detected from IP address 58.27.250.114 to port 445
2020-02-14 20:44:31
121.40.214.23 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-14 20:45:38
146.88.240.4 attackbots
146.88.240.4 was recorded 16 times by 13 hosts attempting to connect to the following ports: 3702,123. Incident counter (4h, 24h, all-time): 16, 378, 55237
2020-02-14 20:29:07
119.202.212.133 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 20:39:48
185.176.27.122 attack
scans 5 times in preceeding hours on the ports (in chronological order) 50011 3444 6500 3369 3889 resulting in total of 193 scans from 185.176.27.0/24 block.
2020-02-14 20:52:09
185.157.185.186 attackspambots
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-14 20:25:09

最近上报的IP列表

3.222.123.113 185.202.124.57 172.2.207.68 90.76.204.34
27.219.73.146 222.116.145.77 218.164.196.75 141.48.78.113
123.4.129.147 214.121.126.157 153.254.3.165 120.1.111.249
180.211.203.51 2.50.135.134 115.100.57.56 111.170.195.178
103.245.138.155 206.108.82.46 147.135.158.99 90.215.128.62