必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.127.149.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11422
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.127.149.117.			IN	A

;; AUTHORITY SECTION:
.			196	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 11:44:43 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
117.149.127.13.in-addr.arpa domain name pointer ec2-13-127-149-117.ap-south-1.compute.amazonaws.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
117.149.127.13.in-addr.arpa	name = ec2-13-127-149-117.ap-south-1.compute.amazonaws.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
191.97.78.22 attackbotsspam
Listed on    zen-spamhaus also abuseat.org   / proto=6  .  srcport=63598  .  dstport=445 SMB  .     (3553)
2020-10-05 21:48:35
23.245.202.186 attack
1601844016 - 10/04/2020 22:40:16 Host: 23.245.202.186/23.245.202.186 Port: 445 TCP Blocked
2020-10-05 22:02:56
45.148.122.102 attackbotsspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-10-05 22:14:13
167.248.133.20 attackspam
 TCP (SYN) 167.248.133.20:13234 -> port 993, len 44
2020-10-05 21:59:53
58.69.58.87 attackspam
Automatic report - Banned IP Access
2020-10-05 22:00:54
106.12.91.225 attackbots
Oct  5 09:38:59 NPSTNNYC01T sshd[12686]: Failed password for root from 106.12.91.225 port 42708 ssh2
Oct  5 09:41:31 NPSTNNYC01T sshd[12761]: Failed password for root from 106.12.91.225 port 41772 ssh2
...
2020-10-05 21:45:00
217.117.75.98 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-10-05 22:01:14
139.59.40.240 attackbots
$f2bV_matches
2020-10-05 22:20:50
182.117.99.23 attackspambots
23/tcp
[2020-10-04]1pkt
2020-10-05 22:06:29
95.252.8.106 attackbotsspam
firewall-block, port(s): 445/tcp
2020-10-05 22:06:16
71.66.22.194 attackbotsspam
Automatic report - Banned IP Access
2020-10-05 22:07:11
103.153.210.9 attackbots
32636/tcp
[2020-10-04]1pkt
2020-10-05 22:16:23
165.227.169.7 attackspam
Oct  5 13:49:57 localhost sshd\[21135\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.169.7  user=root
Oct  5 13:49:59 localhost sshd\[21135\]: Failed password for root from 165.227.169.7 port 37094 ssh2
Oct  5 13:53:47 localhost sshd\[21588\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.169.7  user=root
Oct  5 13:53:49 localhost sshd\[21588\]: Failed password for root from 165.227.169.7 port 44224 ssh2
Oct  5 13:57:37 localhost sshd\[21908\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.169.7  user=root
...
2020-10-05 21:54:24
94.182.222.66 attackspam
1433/tcp
[2020-10-04]1pkt
2020-10-05 21:49:28
202.91.248.42 attackbotsspam
Found on   Binary Defense     / proto=6  .  srcport=62888  .  dstport=1433  .     (3551)
2020-10-05 22:07:41

最近上报的IP列表

13.127.149.143 13.127.143.240 13.127.148.184 13.127.149.44
13.127.15.149 13.127.150.255 13.127.151.115 13.127.155.26
13.127.16.95 13.127.153.152 13.127.152.117 13.127.165.136
13.127.166.170 13.127.162.236 13.127.167.210 13.127.154.24
13.127.171.134 13.127.18.122 13.127.181.241 13.127.176.14