必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.52.146.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21453
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;133.52.146.253.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 15:52:50 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
253.146.52.133.in-addr.arpa domain name pointer pc146-253.client.cera.fukushima-u.ac.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
253.146.52.133.in-addr.arpa	name = pc146-253.client.cera.fukushima-u.ac.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
148.70.180.217 attackspam
Feb  6 04:18:57 pi sshd[4750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.180.217 
Feb  6 04:18:58 pi sshd[4750]: Failed password for invalid user liu from 148.70.180.217 port 36940 ssh2
2020-03-14 00:25:17
210.48.146.61 attackbotsspam
Mar 13 17:16:34 h2646465 sshd[12039]: Invalid user ejsa-rot@1234 from 210.48.146.61
Mar 13 17:16:35 h2646465 sshd[12039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.48.146.61
Mar 13 17:16:34 h2646465 sshd[12039]: Invalid user ejsa-rot@1234 from 210.48.146.61
Mar 13 17:16:36 h2646465 sshd[12039]: Failed password for invalid user ejsa-rot@1234 from 210.48.146.61 port 45348 ssh2
Mar 13 17:20:36 h2646465 sshd[13374]: Invalid user ftpuser from 210.48.146.61
Mar 13 17:20:36 h2646465 sshd[13374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.48.146.61
Mar 13 17:20:36 h2646465 sshd[13374]: Invalid user ftpuser from 210.48.146.61
Mar 13 17:20:38 h2646465 sshd[13374]: Failed password for invalid user ftpuser from 210.48.146.61 port 43112 ssh2
Mar 13 17:24:35 h2646465 sshd[14254]: Invalid user ejsa-rot from 210.48.146.61
...
2020-03-14 00:32:52
202.158.17.253 attackspam
20/3/13@10:46:29: FAIL: Alarm-Network address from=202.158.17.253
20/3/13@10:46:29: FAIL: Alarm-Network address from=202.158.17.253
...
2020-03-14 01:01:34
148.204.211.136 attackspambots
Jan 24 11:30:51 pi sshd[11719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.204.211.136  user=root
Jan 24 11:30:53 pi sshd[11719]: Failed password for invalid user root from 148.204.211.136 port 54124 ssh2
2020-03-14 00:49:32
177.191.5.28 attackspam
trying to access non-authorized port
2020-03-14 00:36:52
185.221.253.95 attackspambots
(imapd) Failed IMAP login from 185.221.253.95 (AL/Albania/ptr.abcom.al): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Mar 13 16:16:20 ir1 dovecot[4133960]: imap-login: Disconnected (auth failed, 1 attempts in 4 secs): user=, method=PLAIN, rip=185.221.253.95, lip=5.63.12.44, TLS, session=
2020-03-14 01:02:18
148.70.187.205 attackspam
Mar 13 14:24:49  sshd\[29109\]: User root from 148.70.187.205 not allowed because not listed in AllowUsersMar 13 14:24:51  sshd\[29109\]: Failed password for invalid user root from 148.70.187.205 port 35824 ssh2
...
2020-03-14 00:23:57
138.186.176.27 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-14 01:04:29
178.62.33.138 attackbots
Invalid user odoo from 178.62.33.138 port 55726
2020-03-14 00:29:39
101.12.134.78 attackspambots
Unauthorized connection attempt from IP address 101.12.134.78 on Port 445(SMB)
2020-03-14 00:54:01
148.70.178.70 attackbots
Mar 13 16:45:13 plex sshd[10275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.178.70  user=root
Mar 13 16:45:15 plex sshd[10275]: Failed password for root from 148.70.178.70 port 54800 ssh2
2020-03-14 00:26:43
80.234.43.229 attack
Unauthorized connection attempt from IP address 80.234.43.229 on Port 445(SMB)
2020-03-14 00:41:56
157.44.16.94 attackspambots
Unauthorized connection attempt from IP address 157.44.16.94 on Port 445(SMB)
2020-03-14 00:31:11
112.119.40.139 attack
Honeypot attack, port: 5555, PTR: n11211940139.netvigator.com.
2020-03-14 00:27:28
148.204.86.18 attack
Feb 17 22:32:40 pi sshd[24804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.204.86.18 
Feb 17 22:32:42 pi sshd[24804]: Failed password for invalid user user from 148.204.86.18 port 58450 ssh2
2020-03-14 00:44:17

最近上报的IP列表

31.79.142.60 160.140.139.231 91.87.67.96 163.162.28.135
40.123.121.9 195.37.161.205 23.129.35.43 186.71.191.250
52.99.166.140 42.247.151.151 18.119.215.61 5.174.29.35
38.99.237.14 139.73.76.152 13.40.39.143 160.246.110.111
233.121.7.37 192.209.231.57 114.104.50.158 226.80.114.109