必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.147.129.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60672
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.147.129.52.			IN	A

;; AUTHORITY SECTION:
.			478	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010901 1800 900 604800 86400

;; Query time: 88 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 13:08:35 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
52.129.147.114.in-addr.arpa domain name pointer p2052-ipgvpnf21marunouchi.tokyo.ocn.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
52.129.147.114.in-addr.arpa	name = p2052-ipgvpnf21marunouchi.tokyo.ocn.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
220.180.192.152 attackbots
Aug 11 14:40:31 haigwepa sshd[21127]: Failed password for root from 220.180.192.152 port 55018 ssh2
...
2020-08-12 03:13:06
117.254.147.40 attackbots
1597147594 - 08/11/2020 14:06:34 Host: 117.254.147.40/117.254.147.40 Port: 445 TCP Blocked
...
2020-08-12 02:59:13
5.190.81.33 attackbotsspam
Aug 11 16:32:57 mail.srvfarm.net postfix/smtpd[2435561]: warning: unknown[5.190.81.33]: SASL PLAIN authentication failed: 
Aug 11 16:32:57 mail.srvfarm.net postfix/smtpd[2435561]: lost connection after AUTH from unknown[5.190.81.33]
Aug 11 16:34:20 mail.srvfarm.net postfix/smtps/smtpd[2432197]: warning: unknown[5.190.81.33]: SASL PLAIN authentication failed: 
Aug 11 16:34:20 mail.srvfarm.net postfix/smtps/smtpd[2432197]: lost connection after AUTH from unknown[5.190.81.33]
Aug 11 16:42:00 mail.srvfarm.net postfix/smtpd[2432835]: warning: unknown[5.190.81.33]: SASL PLAIN authentication failed:
2020-08-12 03:19:28
43.225.67.123 attack
Failed password for root from 43.225.67.123 port 55285 ssh2
2020-08-12 03:23:10
45.129.33.10 attackspambots
Port scan: Attack repeated for 24 hours
2020-08-12 03:06:26
191.241.242.47 attackspam
20/8/11@08:06:49: FAIL: Alarm-Network address from=191.241.242.47
20/8/11@08:06:49: FAIL: Alarm-Network address from=191.241.242.47
...
2020-08-12 02:47:13
181.210.19.228 attackspam
Aug 11 20:50:27 PorscheCustomer sshd[10639]: Failed password for root from 181.210.19.228 port 47686 ssh2
Aug 11 20:55:09 PorscheCustomer sshd[10853]: Failed password for root from 181.210.19.228 port 33324 ssh2
...
2020-08-12 03:07:27
182.184.112.215 attack
Automatic report - Banned IP Access
2020-08-12 03:02:30
148.251.109.210 attack
Automatic report - Port Scan Attack
2020-08-12 03:16:46
145.239.19.252 attackbots
[portscan] Port scan
2020-08-12 02:58:53
202.117.111.196 attackbots
Unauthorised access (Aug 11) SRC=202.117.111.196 LEN=40 TOS=0x08 PREC=0x20 TTL=36 ID=2493 TCP DPT=8080 WINDOW=31798 SYN 
Unauthorised access (Aug 11) SRC=202.117.111.196 LEN=40 TOS=0x08 PREC=0x20 TTL=35 ID=52288 TCP DPT=8080 WINDOW=31798 SYN 
Unauthorised access (Aug  9) SRC=202.117.111.196 LEN=40 TOS=0x08 PREC=0x20 TTL=36 ID=39915 TCP DPT=8080 WINDOW=31798 SYN 
Unauthorised access (Aug  9) SRC=202.117.111.196 LEN=40 TOS=0x08 PREC=0x20 TTL=36 ID=62345 TCP DPT=8080 WINDOW=42822 SYN
2020-08-12 03:17:48
40.117.102.188 attackbotsspam
40.117.102.188 - - [11/Aug/2020:17:30:06 +0100] "POST //wp-login.php HTTP/1.1" 302 5 "https://emresolutions.com//wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36"
40.117.102.188 - - [11/Aug/2020:17:30:09 +0100] "POST //wp-login.php HTTP/1.1" 302 5 "https://emresolutions.com//wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36"
40.117.102.188 - - [11/Aug/2020:17:30:11 +0100] "POST //wp-login.php HTTP/1.1" 302 5 "https://emresolutions.com//wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36"
...
2020-08-12 02:46:17
185.153.197.32 attack
Aug 11 20:13:04 [host] kernel: [2836585.496725] [U
Aug 11 20:13:14 [host] kernel: [2836595.997460] [U
Aug 11 20:15:19 [host] kernel: [2836720.397165] [U
Aug 11 20:16:55 [host] kernel: [2836816.596679] [U
Aug 11 20:18:35 [host] kernel: [2836916.519477] [U
Aug 11 20:19:50 [host] kernel: [2836991.876321] [U
2020-08-12 03:12:11
138.68.178.64 attack
Failed password for root from 138.68.178.64 port 60990 ssh2
2020-08-12 03:11:26
141.98.10.200 attackspam
invalid user
2020-08-12 02:44:37

最近上报的IP列表

13.64.5.170 109.174.144.232 19.104.180.92 250.184.14.183
21.118.230.104 23.94.160.236 125.70.132.216 36.229.36.245
135.122.248.51 150.174.61.68 109.21.45.163 112.33.112.48
227.168.213.186 178.136.138.32 133.45.160.141 220.169.130.207
105.3.253.7 143.63.187.200 156.202.2.30 45.71.228.141