必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tokyo

省份(region): Tokyo

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.140.73.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53467
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;133.140.73.147.			IN	A

;; AUTHORITY SECTION:
.			354	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019103101 1800 900 604800 86400

;; Query time: 148 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 01 11:45:11 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
Host 147.73.140.133.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 147.73.140.133.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
200.123.119.163 attackspambots
Brute-force attempt banned
2020-02-05 02:05:10
180.150.7.159 attackbots
Feb  4 19:29:42 server sshd\[12728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180-150-7-159.b49607.syd.nbn.aussiebb.net  user=root
Feb  4 19:29:44 server sshd\[12728\]: Failed password for root from 180.150.7.159 port 56731 ssh2
Feb  4 19:45:53 server sshd\[15180\]: Invalid user demo from 180.150.7.159
Feb  4 19:45:53 server sshd\[15180\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180-150-7-159.b49607.syd.nbn.aussiebb.net 
Feb  4 19:45:55 server sshd\[15180\]: Failed password for invalid user demo from 180.150.7.159 port 42859 ssh2
...
2020-02-05 02:20:49
110.39.188.99 attackbotsspam
Unauthorised access (Feb  4) SRC=110.39.188.99 LEN=52 TTL=116 ID=17936 DF TCP DPT=445 WINDOW=8192 SYN
2020-02-05 02:05:57
89.218.177.234 attack
Feb  4 14:10:50 firewall sshd[27179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.218.177.234
Feb  4 14:10:50 firewall sshd[27179]: Invalid user orasso from 89.218.177.234
Feb  4 14:10:52 firewall sshd[27179]: Failed password for invalid user orasso from 89.218.177.234 port 46316 ssh2
...
2020-02-05 02:04:01
134.73.7.231 attackspambots
2019-04-26 10:24:12 1hJw9U-0004wG-BA SMTP connection from saw.sandyfadadu.com \(saw.wakeupnaveen.icu\) \[134.73.7.231\]:56568 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-04-26 10:26:31 1hJwBj-00051K-Jq SMTP connection from saw.sandyfadadu.com \(saw.wakeupnaveen.icu\) \[134.73.7.231\]:38235 I=\[193.107.90.29\]:25 closed by DROP in ACL
2019-04-26 10:27:49 1hJwCz-00053U-7f SMTP connection from saw.sandyfadadu.com \(saw.wakeupnaveen.icu\) \[134.73.7.231\]:38909 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-05 02:04:27
162.243.59.16 attack
Unauthorized connection attempt detected from IP address 162.243.59.16 to port 2220 [J]
2020-02-05 02:21:36
116.196.85.79 attackbotsspam
Unauthorized connection attempt detected from IP address 116.196.85.79 to port 2220 [J]
2020-02-05 02:30:55
134.73.7.238 attackbots
2019-04-28 03:45:50 1hKYt4-0002sd-DY SMTP connection from wicked.sandyfadadu.com \(wicked.kaarvi.icu\) \[134.73.7.238\]:55575 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-04-28 03:47:17 1hKYuS-0002vK-Va SMTP connection from wicked.sandyfadadu.com \(wicked.kaarvi.icu\) \[134.73.7.238\]:34177 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-04-28 03:49:41 1hKYwn-00030F-MM SMTP connection from wicked.sandyfadadu.com \(wicked.kaarvi.icu\) \[134.73.7.238\]:59467 I=\[193.107.90.29\]:25 closed by DROP in ACL
...
2020-02-05 01:58:43
45.184.24.5 attack
Feb  4 14:38:29 ns382633 sshd\[28859\]: Invalid user sales from 45.184.24.5 port 44268
Feb  4 14:38:29 ns382633 sshd\[28859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.184.24.5
Feb  4 14:38:30 ns382633 sshd\[28859\]: Failed password for invalid user sales from 45.184.24.5 port 44268 ssh2
Feb  4 14:49:57 ns382633 sshd\[30773\]: Invalid user sales from 45.184.24.5 port 52310
Feb  4 14:49:57 ns382633 sshd\[30773\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.184.24.5
2020-02-05 01:56:33
134.73.7.236 attackspambots
2019-05-04 05:37:49 1hMlUj-0004nN-AL SMTP connection from precinct.sandyfadadu.com \(precinct.acarifagic.icu\) \[134.73.7.236\]:49521 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-05-04 05:41:20 1hMlY8-0004tq-9E SMTP connection from precinct.sandyfadadu.com \(precinct.acarifagic.icu\) \[134.73.7.236\]:50128 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-05-04 05:41:21 1hMlY9-0004tr-FV SMTP connection from precinct.sandyfadadu.com \(precinct.acarifagic.icu\) \[134.73.7.236\]:52484 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-05 01:59:59
93.85.92.78 attackspam
Tried to access wp-includes/wlwmanifest.xml
2020-02-05 02:07:24
78.234.220.84 attackbotsspam
Unauthorized connection attempt detected from IP address 78.234.220.84 to port 80 [J]
2020-02-05 02:26:15
134.73.27.56 attack
2019-05-07 20:09:02 1hO4WT-00052g-Qb SMTP connection from \(strange.orcarpy.icu\) \[134.73.27.56\]:33297 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-05-07 20:12:45 1hO4a4-00059B-VM SMTP connection from \(strange.orcarpy.icu\) \[134.73.27.56\]:58333 I=\[193.107.90.29\]:25 closed by DROP in ACL
2019-05-07 20:12:59 1hO4aI-00059J-Ng SMTP connection from \(strange.orcarpy.icu\) \[134.73.27.56\]:34648 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-05 02:30:36
134.73.7.225 attackbots
2019-04-29 10:36:10 1hL1lh-0004oy-OP SMTP connection from pupil.sandyfadadu.com \(pupil.somintstudio.icu\) \[134.73.7.225\]:55667 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-04-29 10:36:28 1hL1m0-0004pQ-HY SMTP connection from pupil.sandyfadadu.com \(pupil.somintstudio.icu\) \[134.73.7.225\]:53742 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-04-29 10:38:27 1hL1nv-0004sS-Ke SMTP connection from pupil.sandyfadadu.com \(pupil.somintstudio.icu\) \[134.73.7.225\]:59872 I=\[193.107.90.29\]:25 closed by DROP in ACL
...
2020-02-05 02:08:29
122.164.200.108 attackspam
Feb  4 20:04:59 lukav-desktop sshd\[26646\]: Invalid user gmodserver from 122.164.200.108
Feb  4 20:04:59 lukav-desktop sshd\[26646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.164.200.108
Feb  4 20:05:01 lukav-desktop sshd\[26646\]: Failed password for invalid user gmodserver from 122.164.200.108 port 54404 ssh2
Feb  4 20:08:24 lukav-desktop sshd\[382\]: Invalid user ts3-1 from 122.164.200.108
Feb  4 20:08:24 lukav-desktop sshd\[382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.164.200.108
2020-02-05 02:35:34

最近上报的IP列表

44.184.173.0 35.65.96.207 138.22.136.173 97.208.224.37
121.100.166.227 172.28.248.133 194.223.150.140 214.231.53.117
248.133.40.199 244.168.156.189 131.11.119.126 215.150.189.95
249.136.131.126 241.231.0.21 192.137.52.156 210.59.177.26
141.117.164.113 40.159.75.180 237.54.64.4 165.196.230.192