必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.200.150.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24820
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.200.150.30.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 21:36:57 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 30.150.200.141.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 30.150.200.141.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
123.206.41.68 attack
$f2bV_matches
2020-07-09 03:47:33
167.172.208.189 attackspambots
[Fri May 22 20:27:12 2020] - DDoS Attack From IP: 167.172.208.189 Port: 44023
2020-07-09 03:43:41
189.98.100.224 attackbotsspam
Probing for vulnerable services
2020-07-09 03:23:59
162.243.139.241 attackbotsspam
[Thu May 28 12:09:43 2020] - DDoS Attack From IP: 162.243.139.241 Port: 46028
2020-07-09 03:12:30
162.243.138.96 attackbots
[Sat May 23 01:11:21 2020] - DDoS Attack From IP: 162.243.138.96 Port: 38759
2020-07-09 03:41:31
156.96.128.182 attackspam
[2020-07-08 15:06:05] NOTICE[1150][C-00000b28] chan_sip.c: Call from '' (156.96.128.182:58967) to extension '088846184445696' rejected because extension not found in context 'public'.
[2020-07-08 15:06:05] SECURITY[1167] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-07-08T15:06:05.354-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="088846184445696",SessionID="0x7fcb4c16aa68",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/156.96.128.182/58967",ACLName="no_extension_match"
[2020-07-08 15:09:53] NOTICE[1150][C-00000b2a] chan_sip.c: Call from '' (156.96.128.182:63694) to extension '113346184445696' rejected because extension not found in context 'public'.
[2020-07-08 15:09:53] SECURITY[1167] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-07-08T15:09:53.984-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="113346184445696",SessionID="0x7fcb4c0dfe08",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/U
...
2020-07-09 03:12:44
180.76.152.157 attack
Jul  8 14:33:13 Tower sshd[39940]: Connection from 180.76.152.157 port 49988 on 192.168.10.220 port 22 rdomain ""
Jul  8 14:33:16 Tower sshd[39940]: Invalid user liberty from 180.76.152.157 port 49988
Jul  8 14:33:16 Tower sshd[39940]: error: Could not get shadow information for NOUSER
Jul  8 14:33:16 Tower sshd[39940]: Failed password for invalid user liberty from 180.76.152.157 port 49988 ssh2
Jul  8 14:33:16 Tower sshd[39940]: Received disconnect from 180.76.152.157 port 49988:11: Bye Bye [preauth]
Jul  8 14:33:16 Tower sshd[39940]: Disconnected from invalid user liberty 180.76.152.157 port 49988 [preauth]
2020-07-09 03:36:04
218.92.0.223 attackspambots
2020-07-08T21:30:47.182776vps773228.ovh.net sshd[661]: Failed password for root from 218.92.0.223 port 13017 ssh2
2020-07-08T21:30:50.554000vps773228.ovh.net sshd[661]: Failed password for root from 218.92.0.223 port 13017 ssh2
2020-07-08T21:30:54.771348vps773228.ovh.net sshd[661]: Failed password for root from 218.92.0.223 port 13017 ssh2
2020-07-08T21:30:58.246803vps773228.ovh.net sshd[661]: Failed password for root from 218.92.0.223 port 13017 ssh2
2020-07-08T21:31:01.463958vps773228.ovh.net sshd[661]: Failed password for root from 218.92.0.223 port 13017 ssh2
...
2020-07-09 03:32:45
106.75.85.37 attackbotsspam
564/tcp 5985/tcp 5672/tcp...
[2020-05-08/07-08]46pkt,17pt.(tcp)
2020-07-09 03:11:25
62.234.192.132 attackspam
ssh brute force
2020-07-09 03:47:56
112.33.55.210 attack
Jul  8 21:24:44 ns382633 sshd\[16712\]: Invalid user kim from 112.33.55.210 port 46546
Jul  8 21:24:44 ns382633 sshd\[16712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.33.55.210
Jul  8 21:24:46 ns382633 sshd\[16712\]: Failed password for invalid user kim from 112.33.55.210 port 46546 ssh2
Jul  8 21:41:56 ns382633 sshd\[20227\]: Invalid user carlton from 112.33.55.210 port 51036
Jul  8 21:41:56 ns382633 sshd\[20227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.33.55.210
2020-07-09 03:44:16
82.200.168.87 attackbotsspam
Unauthorized connection attempt from IP address 82.200.168.87 on Port 445(SMB)
2020-07-09 03:09:38
167.172.241.91 attackbotsspam
SSH authentication failure x 6 reported by Fail2Ban
...
2020-07-09 03:43:12
103.24.75.58 attack
Unauthorised access (Jul  8) SRC=103.24.75.58 LEN=52 TTL=109 ID=12172 DF TCP DPT=445 WINDOW=8192 SYN
2020-07-09 03:41:43
81.213.167.181 attackbotsspam
8080/tcp
[2020-06-28/07-08]2pkt
2020-07-09 03:15:21

最近上报的IP列表

216.94.63.247 237.147.46.190 130.133.213.247 50.148.183.195
133.185.134.233 69.151.43.119 165.17.59.219 147.185.44.72
99.220.224.149 3.7.170.15 18.29.228.126 233.8.42.148
99.198.197.218 83.158.34.237 215.244.21.152 250.158.19.3
76.4.223.116 38.218.7.207 46.95.27.253 204.34.217.179