必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Verein zur Foerderung eines Deutschen Forschungsnetzes e.V.

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.61.56.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31787
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;141.61.56.157.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019083102 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Sep 01 01:40:02 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
Host 157.56.61.141.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 157.56.61.141.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
161.10.238.226 attack
Unauthorized connection attempt detected from IP address 161.10.238.226 to port 2220 [J]
2020-01-08 01:35:36
123.21.144.252 attack
SASL Brute Force
2020-01-08 01:14:17
113.239.161.3 attack
firewall-block, port(s): 23/tcp
2020-01-08 01:15:50
111.200.52.85 attackbots
Unauthorized connection attempt detected from IP address 111.200.52.85 to port 22 [T]
2020-01-08 01:41:37
203.91.115.56 attack
Unauthorized connection attempt from IP address 203.91.115.56 on Port 445(SMB)
2020-01-08 01:22:18
218.255.148.182 attack
Unauthorized connection attempt from IP address 218.255.148.182 on Port 445(SMB)
2020-01-08 01:17:28
181.10.197.139 attackbots
Unauthorized SSH login attempts
2020-01-08 01:50:12
200.115.137.42 attack
Input Traffic from this IP, but critial abuseconfidencescore
2020-01-08 01:41:08
51.38.186.207 attackbotsspam
Unauthorized connection attempt detected from IP address 51.38.186.207 to port 2220 [J]
2020-01-08 01:46:07
113.61.245.220 attack
Unauthorized connection attempt detected from IP address 113.61.245.220 to port 5555 [J]
2020-01-08 01:18:29
159.203.36.154 attack
Brute-force attempt banned
2020-01-08 01:19:59
108.162.216.232 attack
Fake GoogleBot
2020-01-08 01:16:21
196.52.43.65 attack
Unauthorized connection attempt detected from IP address 196.52.43.65 to port 5901 [J]
2020-01-08 01:17:59
209.17.96.250 attackbots
The IP has triggered Cloudflare WAF. CF-Ray: 55168a9ca8aac5f4 | WAF_Rule_ID: ipr24 | WAF_Kind: firewall | CF_Action: challenge | Country: US | CF_IPClass: unknown | Protocol: HTTP/1.1 | Method: GET | Host: notes.skk.moe | User-Agent: Mozilla/5.0 (compatible; Nimbostratus-Bot/v1.3.2; http://cloudsystemnetworks.com) | CF_DC: EWR. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2020-01-08 01:15:32
5.178.86.78 attack
winbox attack
2020-01-08 01:28:13

最近上报的IP列表

52.237.32.212 42.177.34.134 55.5.96.50 92.15.0.96
211.248.122.160 114.253.233.71 44.81.107.223 195.32.212.45
213.187.156.227 151.199.28.11 130.17.2.134 216.180.120.157
66.88.226.39 63.200.205.226 123.212.138.135 216.14.189.236
109.52.135.190 50.2.116.124 135.121.56.39 66.219.110.176