必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Shanghai

省份(region): Shanghai

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.129.63.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9654
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.129.63.147.			IN	A

;; AUTHORITY SECTION:
.			392	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022012400 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 24 16:54:21 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 147.63.129.113.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 147.63.129.113.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
206.189.30.229 attack
Oct 13 22:19:46 php1 sshd\[15317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.30.229  user=root
Oct 13 22:19:48 php1 sshd\[15317\]: Failed password for root from 206.189.30.229 port 46516 ssh2
Oct 13 22:23:19 php1 sshd\[15623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.30.229  user=root
Oct 13 22:23:22 php1 sshd\[15623\]: Failed password for root from 206.189.30.229 port 57346 ssh2
Oct 13 22:26:53 php1 sshd\[15900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.30.229  user=root
2019-10-14 19:34:29
54.38.184.235 attack
Oct 14 05:35:38 ncomp sshd[17547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.184.235  user=root
Oct 14 05:35:41 ncomp sshd[17547]: Failed password for root from 54.38.184.235 port 59602 ssh2
Oct 14 05:45:19 ncomp sshd[17726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.184.235  user=root
Oct 14 05:45:21 ncomp sshd[17726]: Failed password for root from 54.38.184.235 port 46632 ssh2
2019-10-14 19:36:49
36.74.117.5 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 14-10-2019 04:45:19.
2019-10-14 19:39:36
58.215.198.2 attackbotsspam
Automatic report - Banned IP Access
2019-10-14 19:25:50
106.12.56.143 attack
Oct 14 03:37:53 giraffe sshd[3658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.56.143  user=r.r
Oct 14 03:37:55 giraffe sshd[3658]: Failed password for r.r from 106.12.56.143 port 33470 ssh2
Oct 14 03:37:56 giraffe sshd[3658]: Received disconnect from 106.12.56.143 port 33470:11: Bye Bye [preauth]
Oct 14 03:37:56 giraffe sshd[3658]: Disconnected from 106.12.56.143 port 33470 [preauth]
Oct 14 04:00:05 giraffe sshd[4712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.56.143  user=r.r
Oct 14 04:00:07 giraffe sshd[4712]: Failed password for r.r from 106.12.56.143 port 40864 ssh2
Oct 14 04:00:07 giraffe sshd[4712]: Received disconnect from 106.12.56.143 port 40864:11: Bye Bye [preauth]
Oct 14 04:00:07 giraffe sshd[4712]: Disconnected from 106.12.56.143 port 40864 [preauth]
Oct 14 04:04:17 giraffe sshd[4849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 t........
-------------------------------
2019-10-14 19:13:46
218.5.244.218 attackbotsspam
$f2bV_matches
2019-10-14 19:34:10
186.147.237.51 attack
Oct 14 06:59:08 www5 sshd\[11631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.147.237.51  user=root
Oct 14 06:59:09 www5 sshd\[11631\]: Failed password for root from 186.147.237.51 port 54712 ssh2
Oct 14 07:03:48 www5 sshd\[12745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.147.237.51  user=root
...
2019-10-14 19:38:04
164.132.98.75 attackspambots
Oct 14 09:21:46 SilenceServices sshd[23803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.98.75
Oct 14 09:21:48 SilenceServices sshd[23803]: Failed password for invalid user Debian2019 from 164.132.98.75 port 48200 ssh2
Oct 14 09:25:50 SilenceServices sshd[24944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.98.75
2019-10-14 19:06:00
134.73.76.16 attack
Oct 14 05:31:53 tux postfix/smtpd[8764]: connect from chop.juntosms.com[134.73.76.16]
Oct x@x
Oct 14 05:31:53 tux postfix/smtpd[8764]: disconnect from chop.juntosms.com[134.73.76.16]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=134.73.76.16
2019-10-14 19:25:25
109.129.78.127 attack
2019-10-14T10:15:10.305579homeassistant sshd[16555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.129.78.127  user=root
2019-10-14T10:15:12.047670homeassistant sshd[16555]: Failed password for root from 109.129.78.127 port 51790 ssh2
...
2019-10-14 19:12:07
140.143.90.154 attack
Oct 14 11:46:41 v22018076622670303 sshd\[12197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.90.154  user=root
Oct 14 11:46:43 v22018076622670303 sshd\[12197\]: Failed password for root from 140.143.90.154 port 39064 ssh2
Oct 14 11:51:22 v22018076622670303 sshd\[12220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.90.154  user=root
...
2019-10-14 19:15:14
36.232.176.253 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 14-10-2019 04:45:18.
2019-10-14 19:42:13
123.31.30.199 attackbots
ThinkPHP Remote Code Execution Vulnerability
2019-10-14 19:47:22
51.77.140.111 attack
Oct 14 12:50:50 ArkNodeAT sshd\[16813\]: Invalid user Play123 from 51.77.140.111
Oct 14 12:50:50 ArkNodeAT sshd\[16813\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.140.111
Oct 14 12:50:53 ArkNodeAT sshd\[16813\]: Failed password for invalid user Play123 from 51.77.140.111 port 39852 ssh2
2019-10-14 19:15:33
79.143.186.36 attackspam
Lines containing failures of 79.143.186.36
Oct 14 12:26:45 shared02 sshd[10082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.143.186.36  user=r.r
Oct 14 12:26:47 shared02 sshd[10082]: Failed password for r.r from 79.143.186.36 port 57188 ssh2
Oct 14 12:26:47 shared02 sshd[10082]: Received disconnect from 79.143.186.36 port 57188:11: Bye Bye [preauth]
Oct 14 12:26:47 shared02 sshd[10082]: Disconnected from authenticating user r.r 79.143.186.36 port 57188 [preauth]
Oct 14 12:48:49 shared02 sshd[17862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.143.186.36  user=r.r
Oct 14 12:48:51 shared02 sshd[17862]: Failed password for r.r from 79.143.186.36 port 52320 ssh2
Oct 14 12:48:52 shared02 sshd[17862]: Received disconnect from 79.143.186.36 port 52320:11: Bye Bye [preauth]
Oct 14 12:48:52 shared02 sshd[17862]: Disconnected from authenticating user r.r 79.143.186.36 port 52320 [preauth........
------------------------------
2019-10-14 19:29:53

最近上报的IP列表

98.128.92.244 82.227.96.148 211.245.157.211 160.47.250.8
248.146.151.174 1.233.38.164 87.235.29.134 122.245.124.123
224.32.7.18 201.131.92.233 247.49.123.131 25.82.201.83
249.253.46.86 73.251.1.200 185.254.71.29 200.141.20.89
155.173.235.133 120.40.217.123 243.34.79.35 19.129.122.186