必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Pakistan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.52.148.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13029
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.52.148.137.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010700 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 07 20:37:12 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 137.148.52.121.in-addr.arpa not found: 5(REFUSED)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 137.148.52.121.in-addr.arpa: REFUSED
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.161.27.48 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 29 - port: 10000 proto: tcp cat: Misc Attackbytes: 60
2020-10-01 07:17:24
45.143.221.97 attackspambots
 TCP (SYN) 45.143.221.97:47878 -> port 65060, len 44
2020-10-01 07:18:29
45.129.33.82 attack
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-10-01 07:21:15
212.95.175.140 attack
 TCP (SYN) 212.95.175.140:41587 -> port 445, len 44
2020-10-01 06:59:06
45.227.254.30 attack
scans 6 times in preceeding hours on the ports (in chronological order) 44212 44211 44210 44214 33671 3895
2020-10-01 07:18:15
209.198.180.142 attackbots
2020-09-30T22:28:07.084504abusebot-5.cloudsearch.cf sshd[12069]: Invalid user template from 209.198.180.142 port 44672
2020-09-30T22:28:07.091754abusebot-5.cloudsearch.cf sshd[12069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.198.180.142
2020-09-30T22:28:07.084504abusebot-5.cloudsearch.cf sshd[12069]: Invalid user template from 209.198.180.142 port 44672
2020-09-30T22:28:09.194955abusebot-5.cloudsearch.cf sshd[12069]: Failed password for invalid user template from 209.198.180.142 port 44672 ssh2
2020-09-30T22:33:21.808484abusebot-5.cloudsearch.cf sshd[12273]: Invalid user coremail from 209.198.180.142 port 40048
2020-09-30T22:33:21.815409abusebot-5.cloudsearch.cf sshd[12273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.198.180.142
2020-09-30T22:33:21.808484abusebot-5.cloudsearch.cf sshd[12273]: Invalid user coremail from 209.198.180.142 port 40048
2020-09-30T22:33:24.024077abusebot-5.cloud
...
2020-10-01 07:26:38
92.63.197.74 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 80 - port: 54000 proto: tcp cat: Misc Attackbytes: 60
2020-10-01 07:11:56
206.189.47.166 attack
Sep 30 22:57:10 mx sshd[1078440]: Failed password for invalid user hb from 206.189.47.166 port 42594 ssh2
Sep 30 23:00:29 mx sshd[1078474]: Invalid user admin from 206.189.47.166 port 37234
Sep 30 23:00:29 mx sshd[1078474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.47.166 
Sep 30 23:00:29 mx sshd[1078474]: Invalid user admin from 206.189.47.166 port 37234
Sep 30 23:00:31 mx sshd[1078474]: Failed password for invalid user admin from 206.189.47.166 port 37234 ssh2
...
2020-10-01 07:27:19
195.54.161.105 attackbotsspam
Port scan: Attack repeated for 24 hours
2020-10-01 07:01:00
207.154.242.25 attackspambots
Invalid user admin from 207.154.242.25 port 53600
2020-10-01 07:27:07
183.207.176.78 attackbotsspam
2020-10-01T01:39:59.832911snf-827550 sshd[28003]: Failed password for invalid user galaxy from 183.207.176.78 port 44361 ssh2
2020-10-01T01:44:15.315419snf-827550 sshd[28032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.207.176.78  user=root
2020-10-01T01:44:16.973200snf-827550 sshd[28032]: Failed password for root from 183.207.176.78 port 47483 ssh2
...
2020-10-01 07:30:47
193.254.245.162 attackbotsspam
firewall-block, port(s): 5060/udp
2020-10-01 07:01:33
94.102.49.193 attackspam
Brute force attack stopped by firewall
2020-10-01 07:09:53
195.54.161.123 attackbotsspam
ET DROP Dshield Block Listed Source group 1 - port: 4645 proto: tcp cat: Misc Attackbytes: 60
2020-10-01 06:59:54
45.129.33.153 attackbots
ET DROP Dshield Block Listed Source group 1 - port: 16450 proto: tcp cat: Misc Attackbytes: 60
2020-10-01 07:19:32

最近上报的IP列表

192.168.10.97 14.155.229.252 14.153.241.27 93.199.253.250
44.141.61.80 1.32.250.226 113.128.36.97 95.31.40.43
249.30.198.210 216.250.38.198 52.13.212.161 178.235.211.144
39.77.224.74 46.10.148.105 191.96.85.116 198.18.53.30
111.90.50.197 183.199.188.129 60.170.232.179 39.153.180.172