必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.141.97.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13035
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.141.97.55.			IN	A

;; AUTHORITY SECTION:
.			559	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040702 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 08 01:46:59 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
55.97.141.103.in-addr.arpa domain name pointer sv10854.xserver.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.97.141.103.in-addr.arpa	name = sv10854.xserver.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
168.187.18.73 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-02 02:31:35,275 INFO [amun_request_handler] PortScan Detected on Port: 445 (168.187.18.73)
2019-07-02 14:50:54
158.69.222.121 attackspam
Jul  2 06:35:44 giegler sshd[31351]: Invalid user factorio from 158.69.222.121 port 34650
2019-07-02 15:10:11
165.227.122.7 attackbotsspam
02.07.2019 05:11:27 SSH access blocked by firewall
2019-07-02 14:48:28
134.19.218.94 attack
Wordpress XMLRPC attack
2019-07-02 15:17:56
37.187.196.64 attackspambots
Automatic report - Web App Attack
2019-07-02 15:07:04
193.32.161.150 attackspam
02.07.2019 05:30:27 Connection to port 5188 blocked by firewall
2019-07-02 14:46:52
157.230.225.222 attackspambots
Jul  2 05:51:20 ncomp sshd[26081]: Invalid user test from 157.230.225.222
Jul  2 05:51:20 ncomp sshd[26081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.225.222
Jul  2 05:51:20 ncomp sshd[26081]: Invalid user test from 157.230.225.222
Jul  2 05:51:22 ncomp sshd[26081]: Failed password for invalid user test from 157.230.225.222 port 47710 ssh2
2019-07-02 14:57:13
191.193.187.200 attack
PHI,WP GET /wp-login.php
2019-07-02 14:47:28
172.104.242.173 attackspam
CloudCIX Reconnaissance Scan Detected, PTR: li1819-173.members.linode.com.
2019-07-02 15:27:32
145.239.88.31 attackbotsspam
145.239.88.31 - - [02/Jul/2019:08:41:09 +0200] "GET /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
145.239.88.31 - - [02/Jul/2019:08:41:09 +0200] "POST /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
145.239.88.31 - - [02/Jul/2019:08:41:09 +0200] "GET /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
145.239.88.31 - - [02/Jul/2019:08:41:10 +0200] "POST /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
145.239.88.31 - - [02/Jul/2019:08:41:10 +0200] "GET /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
145.239.88.31 - - [02/Jul/2019:08:41:10 +0200] "POST /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-07-02 15:14:06
189.90.46.84 attack
445/tcp 445/tcp 445/tcp...
[2019-05-11/07-02]16pkt,1pt.(tcp)
2019-07-02 14:56:03
84.54.201.18 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-02 00:05:40,973 INFO [shellcode_manager] (84.54.201.18) no match, writing hexdump (4260aa52032b0c53124fa2de41347fa8 :2168721) - MS17010 (EternalBlue)
2019-07-02 14:56:42
14.239.0.109 attackbots
Triggered by Fail2Ban
2019-07-02 15:21:55
45.32.213.73 attackspam
Jul  2 05:43:48 localhost sshd\[13930\]: Invalid user 123456 from 45.32.213.73 port 38645
Jul  2 05:43:48 localhost sshd\[13930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.32.213.73
...
2019-07-02 15:29:02
211.195.12.33 attackbotsspam
Invalid user run from 211.195.12.33 port 54773
2019-07-02 15:17:03

最近上报的IP列表

103.141.97.146 103.142.121.109 103.142.121.138 103.142.140.123
103.142.140.126 103.142.140.133 103.142.140.204 103.142.174.237
103.142.175.17 103.142.175.208 103.142.219.68 103.142.26.128
103.142.26.148 103.142.26.167 103.142.26.219 103.143.158.12
103.143.170.44 103.143.170.50 103.143.20.83 103.143.208.164