必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Egypt

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.47.20.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58621
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;102.47.20.44.			IN	A

;; AUTHORITY SECTION:
.			529	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023102100 1800 900 604800 86400

;; Query time: 431 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 22 00:19:13 CST 2023
;; MSG SIZE  rcvd: 105
HOST信息:
44.20.47.102.in-addr.arpa domain name pointer host-102.47.20.44.tedata.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
44.20.47.102.in-addr.arpa	name = host-102.47.20.44.tedata.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
113.188.218.211 attackbotsspam
Unauthorized connection attempt from IP address 113.188.218.211 on Port 445(SMB)
2020-01-16 19:25:01
5.88.155.130 attack
$f2bV_matches
2020-01-16 19:43:32
216.12.28.98 attack
Unauthorized connection attempt detected from IP address 216.12.28.98 to port 23 [J]
2020-01-16 19:24:32
203.150.221.195 attack
Unauthorized connection attempt detected from IP address 203.150.221.195 to port 2220 [J]
2020-01-16 19:25:38
112.85.42.173 attackspambots
Triggered by Fail2Ban at Vostok web server
2020-01-16 19:31:31
148.227.208.7 attack
Jan 15 18:23:14 plesk sshd[14667]: Invalid user tq from 148.227.208.7
Jan 15 18:23:14 plesk sshd[14667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.227.208.7 
Jan 15 18:23:16 plesk sshd[14667]: Failed password for invalid user tq from 148.227.208.7 port 18849 ssh2
Jan 15 18:23:16 plesk sshd[14667]: Received disconnect from 148.227.208.7: 11: Bye Bye [preauth]
Jan 15 18:26:34 plesk sshd[14959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.227.208.7  user=r.r
Jan 15 18:26:36 plesk sshd[14959]: Failed password for r.r from 148.227.208.7 port 32801 ssh2
Jan 15 18:26:36 plesk sshd[14959]: Received disconnect from 148.227.208.7: 11: Bye Bye [preauth]
Jan 15 18:29:47 plesk sshd[15045]: Invalid user cp1 from 148.227.208.7
Jan 15 18:29:47 plesk sshd[15045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.227.208.7 
Jan 15 18:29:50 plesk sshd........
-------------------------------
2020-01-16 19:46:16
103.100.209.228 attackbotsspam
Jan 15 22:37:26 cumulus sshd[25882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.100.209.228  user=r.r
Jan 15 22:37:28 cumulus sshd[25882]: Failed password for r.r from 103.100.209.228 port 55003 ssh2
Jan 15 22:37:29 cumulus sshd[25882]: Received disconnect from 103.100.209.228 port 55003:11: Bye Bye [preauth]
Jan 15 22:37:29 cumulus sshd[25882]: Disconnected from 103.100.209.228 port 55003 [preauth]
Jan 15 22:41:48 cumulus sshd[26201]: Invalid user rf from 103.100.209.228 port 44721
Jan 15 22:41:48 cumulus sshd[26201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.100.209.228
Jan 15 22:41:49 cumulus sshd[26201]: Failed password for invalid user rf from 103.100.209.228 port 44721 ssh2
Jan 15 22:41:50 cumulus sshd[26201]: Received disconnect from 103.100.209.228 port 44721:11: Bye Bye [preauth]
Jan 15 22:41:50 cumulus sshd[26201]: Disconnected from 103.100.209.228 port 44721 [pr........
-------------------------------
2020-01-16 19:59:40
45.252.245.239 attackbots
Unauthorized connection attempt from IP address 45.252.245.239 on Port 445(SMB)
2020-01-16 19:23:41
201.71.229.130 attackspambots
Unauthorized connection attempt from IP address 201.71.229.130 on Port 445(SMB)
2020-01-16 19:36:52
196.188.240.13 attack
1579149913 - 01/16/2020 05:45:13 Host: 196.188.240.13/196.188.240.13 Port: 445 TCP Blocked
2020-01-16 19:51:05
159.192.104.2 attack
Unauthorized connection attempt from IP address 159.192.104.2 on Port 445(SMB)
2020-01-16 19:34:17
125.160.60.167 attack
Unauthorized connection attempt from IP address 125.160.60.167 on Port 445(SMB)
2020-01-16 19:47:32
52.66.206.135 attackbots
Unauthorized connection attempt detected from IP address 52.66.206.135 to port 2220 [J]
2020-01-16 19:47:55
14.172.89.219 attackbotsspam
Unauthorized connection attempt from IP address 14.172.89.219 on Port 445(SMB)
2020-01-16 19:41:38
34.216.58.98 attackspambots
REQUESTED PAGE: /
2020-01-16 20:00:40

最近上报的IP列表

102.47.196.128 102.47.209.201 102.47.212.35 102.47.202.194
102.47.179.8 102.47.211.252 102.47.181.169 102.47.180.79
102.47.191.12 102.47.171.33 102.47.164.30 102.47.167.142
102.47.22.109 102.47.155.138 102.47.141.90 102.47.14.93
102.47.115.177 102.47.120.4 102.47.212.150 102.47.103.198