必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.116.47.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40773
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.116.47.13.			IN	A

;; AUTHORITY SECTION:
.			411	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030200 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 02 21:41:43 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 13.47.116.113.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.47.116.113.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
201.122.102.21 attack
SSH Brute Force
2020-05-25 04:33:22
66.115.173.18 attackbots
66.115.173.18 - - \[24/May/2020:22:31:36 +0200\] "POST /wp-login.php HTTP/1.0" 200 6718 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
66.115.173.18 - - \[24/May/2020:22:31:38 +0200\] "POST /wp-login.php HTTP/1.0" 200 6548 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
66.115.173.18 - - \[24/May/2020:22:31:40 +0200\] "POST /wp-login.php HTTP/1.0" 200 6542 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-05-25 05:07:18
196.11.231.36 attackspam
May 24 22:21:08 vps647732 sshd[24930]: Failed password for root from 196.11.231.36 port 55166 ssh2
...
2020-05-25 04:34:28
189.62.69.106 attack
May 24 22:45:04 vps647732 sshd[25905]: Failed password for root from 189.62.69.106 port 41632 ssh2
...
2020-05-25 04:58:30
194.126.183.16 attack
[MK-VM1] Blocked by UFW
2020-05-25 05:02:57
178.128.26.233 attackbotsspam
May 24 16:28:41 ny01 sshd[12897]: Failed password for root from 178.128.26.233 port 59934 ssh2
May 24 16:32:18 ny01 sshd[13389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.26.233
May 24 16:32:20 ny01 sshd[13389]: Failed password for invalid user nfs from 178.128.26.233 port 37642 ssh2
2020-05-25 04:35:55
185.153.208.21 attackbotsspam
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-05-25 04:38:37
106.12.175.218 attackspambots
May 24 22:56:45 PorscheCustomer sshd[24537]: Failed password for root from 106.12.175.218 port 40964 ssh2
May 24 23:00:58 PorscheCustomer sshd[24674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.175.218
May 24 23:01:00 PorscheCustomer sshd[24674]: Failed password for invalid user camera from 106.12.175.218 port 40064 ssh2
...
2020-05-25 05:02:18
139.59.31.101 attack
May 24 22:28:12 home sshd[30503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.31.101
May 24 22:28:13 home sshd[30503]: Failed password for invalid user gmike from 139.59.31.101 port 36966 ssh2
May 24 22:32:06 home sshd[30868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.31.101
...
2020-05-25 04:48:24
14.187.179.198 attack
Automatic report - Port Scan Attack
2020-05-25 04:47:08
82.131.160.225 attackspam
Wordpress_xmlrpc_attack
2020-05-25 04:45:03
103.79.90.72 attackspam
SSH Brute-Forcing (server2)
2020-05-25 04:44:29
150.109.34.190 attackspam
May 24 22:58:40 abendstille sshd\[5406\]: Invalid user hunter from 150.109.34.190
May 24 22:58:40 abendstille sshd\[5406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.34.190
May 24 22:58:42 abendstille sshd\[5406\]: Failed password for invalid user hunter from 150.109.34.190 port 45128 ssh2
May 24 23:02:41 abendstille sshd\[9532\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.34.190  user=root
May 24 23:02:43 abendstille sshd\[9532\]: Failed password for root from 150.109.34.190 port 51624 ssh2
...
2020-05-25 05:05:36
49.236.195.150 attackbots
May 24 22:31:37 pve1 sshd[2459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.236.195.150 
May 24 22:31:38 pve1 sshd[2459]: Failed password for invalid user p from 49.236.195.150 port 34046 ssh2
...
2020-05-25 05:09:41
87.251.74.50 attackbots
May 24 20:39:27 scw-6657dc sshd[19305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.251.74.50
May 24 20:39:27 scw-6657dc sshd[19305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.251.74.50
May 24 20:39:29 scw-6657dc sshd[19305]: Failed password for invalid user user from 87.251.74.50 port 55368 ssh2
...
2020-05-25 04:48:53

最近上报的IP列表

206.56.137.114 113.116.47.133 113.116.47.196 113.116.47.202
113.116.47.229 113.116.47.240 113.116.47.47 113.116.48.10
113.116.48.126 113.117.116.5 113.117.117.116 88.155.147.24
245.186.8.85 113.117.117.123 113.117.117.154 113.117.117.162
113.117.117.172 113.117.117.174 113.117.117.19 113.117.117.212