必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 127.47.116.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13054
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;127.47.116.142.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 15:40:52 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 142.116.47.127.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.116.47.127.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
162.158.93.41 attack
srv02 DDoS Malware Target(80:http) ..
2020-10-10 21:24:32
113.166.80.100 attack
Unauthorized connection attempt from IP address 113.166.80.100 on Port 445(SMB)
2020-10-10 21:26:18
213.100.219.99 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-10-10 21:42:35
164.163.23.19 attackbotsspam
Oct 10 15:04:45 electroncash sshd[57357]: Invalid user wwwdata1 from 164.163.23.19 port 43628
Oct 10 15:04:45 electroncash sshd[57357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.163.23.19 
Oct 10 15:04:45 electroncash sshd[57357]: Invalid user wwwdata1 from 164.163.23.19 port 43628
Oct 10 15:04:48 electroncash sshd[57357]: Failed password for invalid user wwwdata1 from 164.163.23.19 port 43628 ssh2
Oct 10 15:08:40 electroncash sshd[58826]: Invalid user user1 from 164.163.23.19 port 42856
...
2020-10-10 21:25:28
51.38.238.205 attackspam
Auto Fail2Ban report, multiple SSH login attempts.
2020-10-10 21:21:10
112.85.42.200 attackspambots
Oct 10 15:18:04 abendstille sshd\[6792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.200  user=root
Oct 10 15:18:06 abendstille sshd\[6803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.200  user=root
Oct 10 15:18:07 abendstille sshd\[6792\]: Failed password for root from 112.85.42.200 port 40742 ssh2
Oct 10 15:18:08 abendstille sshd\[6803\]: Failed password for root from 112.85.42.200 port 37872 ssh2
Oct 10 15:18:10 abendstille sshd\[6792\]: Failed password for root from 112.85.42.200 port 40742 ssh2
...
2020-10-10 21:19:13
176.31.162.82 attackspambots
Oct 10 10:55:56 eventyay sshd[6180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.162.82
Oct 10 10:55:58 eventyay sshd[6180]: Failed password for invalid user apache2 from 176.31.162.82 port 38936 ssh2
Oct 10 10:59:30 eventyay sshd[6371]: Failed password for root from 176.31.162.82 port 42494 ssh2
...
2020-10-10 21:18:10
185.133.229.139 attack
2020-10-10T09:23:01.893791devel sshd[4067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.133.229.139  user=root
2020-10-10T09:23:04.302940devel sshd[4067]: Failed password for root from 185.133.229.139 port 55316 ssh2
2020-10-10T09:27:02.483977devel sshd[4681]: Invalid user kafka from 185.133.229.139 port 58938
2020-10-10 21:33:57
52.130.85.229 attack
Oct 10 15:14:27 jane sshd[2729]: Failed password for root from 52.130.85.229 port 57800 ssh2
...
2020-10-10 21:22:27
167.60.245.126 attack
Oct 8 03:03:51 *hidden* sshd[388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.60.245.126 Oct 8 03:03:53 *hidden* sshd[388]: Failed password for invalid user ubuntu from 167.60.245.126 port 48656 ssh2 Oct 8 07:00:23 *hidden* sshd[9370]: Invalid user admin from 167.60.245.126 port 32888
2020-10-10 21:09:06
54.160.120.29 attack
Oct  9 22:48:41 zimbra sshd[1908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.160.120.29  user=r.r
Oct  9 22:48:43 zimbra sshd[1908]: Failed password for r.r from 54.160.120.29 port 60106 ssh2
Oct  9 22:48:43 zimbra sshd[1908]: Received disconnect from 54.160.120.29 port 60106:11: Bye Bye [preauth]
Oct  9 22:48:43 zimbra sshd[1908]: Disconnected from 54.160.120.29 port 60106 [preauth]
Oct  9 23:02:08 zimbra sshd[13256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.160.120.29  user=r.r
Oct  9 23:02:09 zimbra sshd[13256]: Failed password for r.r from 54.160.120.29 port 56100 ssh2
Oct  9 23:02:10 zimbra sshd[13256]: Received disconnect from 54.160.120.29 port 56100:11: Bye Bye [preauth]
Oct  9 23:02:10 zimbra sshd[13256]: Disconnected from 54.160.120.29 port 56100 [preauth]
Oct  9 23:06:28 zimbra sshd[16603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=s........
-------------------------------
2020-10-10 21:32:43
112.85.42.174 attackspam
Oct 10 14:40:25 mavik sshd[31117]: Failed password for root from 112.85.42.174 port 48575 ssh2
Oct 10 14:40:29 mavik sshd[31117]: Failed password for root from 112.85.42.174 port 48575 ssh2
Oct 10 14:40:32 mavik sshd[31117]: Failed password for root from 112.85.42.174 port 48575 ssh2
Oct 10 14:40:35 mavik sshd[31117]: Failed password for root from 112.85.42.174 port 48575 ssh2
Oct 10 14:40:38 mavik sshd[31117]: Failed password for root from 112.85.42.174 port 48575 ssh2
...
2020-10-10 21:41:29
37.98.196.42 attack
2020-10-10T06:24:16.031814abusebot-4.cloudsearch.cf sshd[10013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=dhcp-37-98-196-42.cm.hcn.gr  user=root
2020-10-10T06:24:18.102102abusebot-4.cloudsearch.cf sshd[10013]: Failed password for root from 37.98.196.42 port 50862 ssh2
2020-10-10T06:28:03.315046abusebot-4.cloudsearch.cf sshd[10141]: Invalid user tina from 37.98.196.42 port 61264
2020-10-10T06:28:03.323893abusebot-4.cloudsearch.cf sshd[10141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=dhcp-37-98-196-42.cm.hcn.gr
2020-10-10T06:28:03.315046abusebot-4.cloudsearch.cf sshd[10141]: Invalid user tina from 37.98.196.42 port 61264
2020-10-10T06:28:05.221003abusebot-4.cloudsearch.cf sshd[10141]: Failed password for invalid user tina from 37.98.196.42 port 61264 ssh2
2020-10-10T06:32:03.555822abusebot-4.cloudsearch.cf sshd[10323]: Invalid user manager from 37.98.196.42 port 34380
...
2020-10-10 21:39:00
96.67.97.105 attackspambots
" "
2020-10-10 21:07:07
37.252.88.3 attackspambots
Port Scan
...
2020-10-10 21:27:09

最近上报的IP列表

67.83.172.62 242.62.65.21 179.181.128.152 80.80.104.87
139.235.6.12 154.183.34.121 137.17.36.60 141.1.195.118
229.38.91.5 98.157.19.169 214.60.51.229 235.149.109.20
33.124.90.236 169.99.223.67 168.0.144.108 187.89.115.68
70.242.178.44 156.119.129.173 122.33.207.47 27.162.108.6