必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.106.48.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31805
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.106.48.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 01:53:16 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 145.48.106.147.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.48.106.147.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
142.44.137.62 attack
Sep 24 02:31:19 tdfoods sshd\[1865\]: Invalid user devsql from 142.44.137.62
Sep 24 02:31:19 tdfoods sshd\[1865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns549998.ip-142-44-137.net
Sep 24 02:31:21 tdfoods sshd\[1865\]: Failed password for invalid user devsql from 142.44.137.62 port 40760 ssh2
Sep 24 02:35:32 tdfoods sshd\[2263\]: Invalid user jboss from 142.44.137.62
Sep 24 02:35:32 tdfoods sshd\[2263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns549998.ip-142-44-137.net
2019-09-25 04:47:01
138.197.145.26 attack
Sep 24 17:52:18 lnxded63 sshd[26516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.145.26
2019-09-25 04:29:00
119.187.7.190 attack
Unauthorised access (Sep 24) SRC=119.187.7.190 LEN=40 TTL=48 ID=63669 TCP DPT=8080 WINDOW=22871 SYN 
Unauthorised access (Sep 24) SRC=119.187.7.190 LEN=40 TTL=49 ID=38714 TCP DPT=8080 WINDOW=34113 SYN 
Unauthorised access (Sep 24) SRC=119.187.7.190 LEN=40 TTL=49 ID=50980 TCP DPT=8080 WINDOW=46866 SYN 
Unauthorised access (Sep 23) SRC=119.187.7.190 LEN=40 TTL=49 ID=52256 TCP DPT=8080 WINDOW=11249 SYN 
Unauthorised access (Sep 23) SRC=119.187.7.190 LEN=40 TTL=49 ID=7117 TCP DPT=8080 WINDOW=45758 SYN 
Unauthorised access (Sep 23) SRC=119.187.7.190 LEN=40 TTL=49 ID=8668 TCP DPT=8080 WINDOW=46866 SYN 
Unauthorised access (Sep 22) SRC=119.187.7.190 LEN=40 TTL=49 ID=33530 TCP DPT=8080 WINDOW=45758 SYN 
Unauthorised access (Sep 22) SRC=119.187.7.190 LEN=40 TTL=49 ID=12523 TCP DPT=8080 WINDOW=11249 SYN 
Unauthorised access (Sep 22) SRC=119.187.7.190 LEN=40 TTL=49 ID=9997 TCP DPT=8080 WINDOW=45758 SYN
2019-09-25 04:42:33
203.186.57.191 attackspambots
Sep 24 10:46:41 tdfoods sshd\[18417\]: Invalid user west from 203.186.57.191
Sep 24 10:46:41 tdfoods sshd\[18417\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203186057191.static.ctinets.com
Sep 24 10:46:43 tdfoods sshd\[18417\]: Failed password for invalid user west from 203.186.57.191 port 55508 ssh2
Sep 24 10:50:20 tdfoods sshd\[18711\]: Invalid user cody from 203.186.57.191
Sep 24 10:50:20 tdfoods sshd\[18711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203186057191.static.ctinets.com
2019-09-25 04:55:29
104.236.252.162 attackbots
Sep 24 23:00:05 server sshd\[29391\]: Invalid user toor from 104.236.252.162 port 46676
Sep 24 23:00:05 server sshd\[29391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.252.162
Sep 24 23:00:07 server sshd\[29391\]: Failed password for invalid user toor from 104.236.252.162 port 46676 ssh2
Sep 24 23:04:01 server sshd\[3774\]: Invalid user gt from 104.236.252.162 port 58342
Sep 24 23:04:01 server sshd\[3774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.252.162
2019-09-25 04:21:08
201.76.178.51 attack
Sep 24 14:30:41 dev0-dcde-rnet sshd[3995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.76.178.51
Sep 24 14:30:43 dev0-dcde-rnet sshd[3995]: Failed password for invalid user 1 from 201.76.178.51 port 40474 ssh2
Sep 24 14:35:09 dev0-dcde-rnet sshd[4012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.76.178.51
2019-09-25 04:58:52
106.75.152.63 attackspam
Sep 24 17:45:26 dedicated sshd[10561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.152.63  user=root
Sep 24 17:45:29 dedicated sshd[10561]: Failed password for root from 106.75.152.63 port 54322 ssh2
2019-09-25 04:17:59
222.186.175.183 attackspambots
Sep 24 09:51:24 hiderm sshd\[9907\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183  user=root
Sep 24 09:51:27 hiderm sshd\[9907\]: Failed password for root from 222.186.175.183 port 58848 ssh2
Sep 24 09:51:51 hiderm sshd\[9946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183  user=root
Sep 24 09:51:52 hiderm sshd\[9946\]: Failed password for root from 222.186.175.183 port 1236 ssh2
Sep 24 09:52:20 hiderm sshd\[9978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183  user=root
2019-09-25 04:23:31
124.143.10.113 attackspam
Unauthorised access (Sep 24) SRC=124.143.10.113 LEN=44 TTL=48 ID=45752 TCP DPT=8080 WINDOW=6443 SYN 
Unauthorised access (Sep 24) SRC=124.143.10.113 LEN=44 TTL=48 ID=36087 TCP DPT=8080 WINDOW=6443 SYN 
Unauthorised access (Sep 24) SRC=124.143.10.113 LEN=44 TTL=48 ID=18000 TCP DPT=8080 WINDOW=6443 SYN
2019-09-25 04:44:12
146.185.175.132 attackbotsspam
Sep 24 21:21:17 cp sshd[12352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.175.132
2019-09-25 05:00:33
62.234.99.172 attackbotsspam
Sep 24 22:11:08 vps647732 sshd[17493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.99.172
Sep 24 22:11:10 vps647732 sshd[17493]: Failed password for invalid user mark from 62.234.99.172 port 55307 ssh2
...
2019-09-25 04:36:20
144.217.91.86 attack
Sep 24 08:57:57 aiointranet sshd\[8494\]: Invalid user porno from 144.217.91.86
Sep 24 08:57:57 aiointranet sshd\[8494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.91.86
Sep 24 08:57:59 aiointranet sshd\[8494\]: Failed password for invalid user porno from 144.217.91.86 port 54964 ssh2
Sep 24 09:02:09 aiointranet sshd\[8790\]: Invalid user pi from 144.217.91.86
Sep 24 09:02:09 aiointranet sshd\[8790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.91.86
2019-09-25 04:31:26
41.221.168.167 attack
Sep 24 20:12:35 thevastnessof sshd[26467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.221.168.167
...
2019-09-25 04:50:30
165.22.246.63 attack
Sep 24 22:14:25 h2177944 sshd\[27550\]: Invalid user family from 165.22.246.63 port 41846
Sep 24 22:14:25 h2177944 sshd\[27550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.246.63
Sep 24 22:14:27 h2177944 sshd\[27550\]: Failed password for invalid user family from 165.22.246.63 port 41846 ssh2
Sep 24 22:19:09 h2177944 sshd\[27707\]: Invalid user demo from 165.22.246.63 port 55040
...
2019-09-25 04:27:21
178.62.64.107 attackspam
Sep 24 12:33:43 ny01 sshd[14991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.64.107
Sep 24 12:33:45 ny01 sshd[14991]: Failed password for invalid user alenda from 178.62.64.107 port 53884 ssh2
Sep 24 12:37:59 ny01 sshd[15668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.64.107
2019-09-25 04:36:41

最近上报的IP列表

42.165.217.18 229.42.113.10 14.93.123.151 237.43.181.232
79.57.223.37 151.14.221.65 255.102.124.22 127.153.246.249
252.176.19.144 195.221.35.38 200.199.113.27 46.108.7.243
188.201.48.162 50.81.254.252 171.175.41.173 229.78.127.17
27.54.228.150 119.117.212.12 99.22.151.12 57.114.171.236