必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.72.131.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38956
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.72.131.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 00:42:39 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 149.131.72.141.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.131.72.141.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.77.157.106 attack
51.77.157.106 - - [15/Sep/2020:11:43:22 +0100] "POST /wp-login.php HTTP/1.1" 200 1948 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.77.157.106 - - [15/Sep/2020:11:43:23 +0100] "POST /wp-login.php HTTP/1.1" 200 1890 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.77.157.106 - - [15/Sep/2020:11:43:24 +0100] "POST /wp-login.php HTTP/1.1" 200 1926 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-16 00:30:31
129.226.61.157 attackbots
Sep 15 14:15:53 PorscheCustomer sshd[17185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.61.157
Sep 15 14:15:56 PorscheCustomer sshd[17185]: Failed password for invalid user hadoop from 129.226.61.157 port 50244 ssh2
Sep 15 14:22:59 PorscheCustomer sshd[17374]: Failed password for root from 129.226.61.157 port 56474 ssh2
...
2020-09-15 23:44:03
209.124.90.241 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-09-15 23:58:34
194.187.110.38 attack
Excessive crawling, exceed limits robots.txt
2020-09-16 00:12:14
186.226.37.125 attackspam
Sep 15 18:15:22 mout sshd[18585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.226.37.125  user=root
Sep 15 18:15:24 mout sshd[18585]: Failed password for root from 186.226.37.125 port 52542 ssh2
Sep 15 18:15:24 mout sshd[18585]: Disconnected from authenticating user root 186.226.37.125 port 52542 [preauth]
2020-09-16 00:21:15
124.13.28.191 attackspam
DATE:2020-09-15 13:59:29, IP:124.13.28.191, PORT:ssh SSH brute force auth (docker-dc)
2020-09-15 23:44:35
140.82.10.111 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2020-09-15 23:48:40
190.25.49.114 attack
Sep 15 14:27:49 pve1 sshd[25268]: Failed password for root from 190.25.49.114 port 17846 ssh2
...
2020-09-16 00:32:41
94.201.52.66 attackspambots
Sep 15 18:06:38 mout sshd[17504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.201.52.66  user=root
Sep 15 18:06:39 mout sshd[17504]: Failed password for root from 94.201.52.66 port 47022 ssh2
Sep 15 18:06:40 mout sshd[17504]: Disconnected from authenticating user root 94.201.52.66 port 47022 [preauth]
2020-09-16 00:16:26
202.77.112.245 attackbots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-14T23:06:47Z and 2020-09-14T23:15:19Z
2020-09-16 00:01:15
167.172.163.162 attackspam
SSH Brute-Force reported by Fail2Ban
2020-09-16 00:24:41
177.124.74.47 attack
(sshd) Failed SSH login from 177.124.74.47 (BR/Brazil/177-124-74-47.fxnet.com.br): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD
2020-09-16 00:33:45
167.114.103.140 attackspambots
Sep 15 11:17:12 itv-usvr-01 sshd[709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.103.140  user=root
Sep 15 11:17:14 itv-usvr-01 sshd[709]: Failed password for root from 167.114.103.140 port 38099 ssh2
Sep 15 11:18:29 itv-usvr-01 sshd[745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.103.140  user=root
Sep 15 11:18:32 itv-usvr-01 sshd[745]: Failed password for root from 167.114.103.140 port 44245 ssh2
Sep 15 11:19:27 itv-usvr-01 sshd[820]: Invalid user wen from 167.114.103.140
2020-09-15 23:51:24
104.131.91.214 attack
Icarus honeypot on github
2020-09-15 23:51:44
61.133.232.254 attackbotsspam
Sep 15 14:32:27 prod4 sshd\[20031\]: Failed password for root from 61.133.232.254 port 16392 ssh2
Sep 15 14:36:25 prod4 sshd\[21931\]: Invalid user sshadm from 61.133.232.254
Sep 15 14:36:27 prod4 sshd\[21931\]: Failed password for invalid user sshadm from 61.133.232.254 port 29151 ssh2
...
2020-09-16 00:13:46

最近上报的IP列表

103.33.186.66 245.102.227.84 90.83.21.1 108.246.206.24
162.178.99.245 252.15.113.144 49.213.104.101 236.18.58.137
130.58.84.172 5.214.102.117 5.200.92.92 68.117.77.91
180.243.249.237 86.56.152.166 232.85.248.167 57.84.229.250
140.145.119.9 104.146.87.94 63.86.162.211 38.147.162.108