必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.172.161.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29885
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.172.161.50.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 12:28:18 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 50.161.172.147.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.161.172.147.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.18.32.156 attack
Oct 15 10:27:12 dcd-gentoo sshd[26833]: User root from 14.18.32.156 not allowed because none of user's groups are listed in AllowGroups
Oct 15 10:27:15 dcd-gentoo sshd[26833]: error: PAM: Authentication failure for illegal user root from 14.18.32.156
Oct 15 10:27:12 dcd-gentoo sshd[26833]: User root from 14.18.32.156 not allowed because none of user's groups are listed in AllowGroups
Oct 15 10:27:15 dcd-gentoo sshd[26833]: error: PAM: Authentication failure for illegal user root from 14.18.32.156
Oct 15 10:27:12 dcd-gentoo sshd[26833]: User root from 14.18.32.156 not allowed because none of user's groups are listed in AllowGroups
Oct 15 10:27:15 dcd-gentoo sshd[26833]: error: PAM: Authentication failure for illegal user root from 14.18.32.156
Oct 15 10:27:15 dcd-gentoo sshd[26833]: Failed keyboard-interactive/pam for invalid user root from 14.18.32.156 port 45633 ssh2
...
2019-10-15 17:45:34
81.22.45.107 attackbots
Oct 15 11:57:54 mc1 kernel: \[2419848.877290\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.107 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=2057 PROTO=TCP SPT=48649 DPT=7477 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 15 12:00:10 mc1 kernel: \[2419985.481083\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.107 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=62939 PROTO=TCP SPT=48649 DPT=7011 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 15 12:01:25 mc1 kernel: \[2420059.677775\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.107 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=58970 PROTO=TCP SPT=48649 DPT=7387 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-15 18:04:18
34.221.44.101 attack
by Amazon Technologies Inc.
2019-10-15 17:45:14
80.52.199.93 attackspam
Oct 15 06:42:00 site3 sshd\[13509\]: Invalid user 1234 from 80.52.199.93
Oct 15 06:42:00 site3 sshd\[13509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.52.199.93
Oct 15 06:42:02 site3 sshd\[13509\]: Failed password for invalid user 1234 from 80.52.199.93 port 58718 ssh2
Oct 15 06:45:55 site3 sshd\[13594\]: Invalid user thchen!@\# from 80.52.199.93
Oct 15 06:45:55 site3 sshd\[13594\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.52.199.93
...
2019-10-15 17:58:46
46.101.27.6 attack
Oct 15 08:47:10 raspberrypi sshd\[3999\]: Address 46.101.27.6 maps to wetech.digital, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Oct 15 08:47:10 raspberrypi sshd\[3999\]: Invalid user test from 46.101.27.6Oct 15 08:47:12 raspberrypi sshd\[3999\]: Failed password for invalid user test from 46.101.27.6 port 44932 ssh2
...
2019-10-15 17:56:15
2.207.120.238 attackbotsspam
$f2bV_matches
2019-10-15 17:46:16
45.82.153.37 attack
2019-10-15T07:56:09.273693server postfix/smtps/smtpd\[12698\]: warning: unknown\[45.82.153.37\]: SASL PLAIN authentication failed:
2019-10-15T07:56:20.229982server postfix/smtps/smtpd\[12698\]: warning: unknown\[45.82.153.37\]: SASL PLAIN authentication failed:
2019-10-15T09:13:13.039416server postfix/smtps/smtpd\[17930\]: warning: unknown\[45.82.153.37\]: SASL PLAIN authentication failed:
2019-10-15T09:13:22.171580server postfix/smtps/smtpd\[17930\]: warning: unknown\[45.82.153.37\]: SASL PLAIN authentication failed:
2019-10-15T10:47:32.072723server postfix/smtps/smtpd\[24647\]: warning: unknown\[45.82.153.37\]: SASL PLAIN authentication failed:
...
2019-10-15 18:18:22
173.46.149.135 attackbotsspam
Scanning and Vuln Attempts
2019-10-15 18:10:41
51.68.230.54 attackspambots
Oct 15 10:07:33 vps647732 sshd[3318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.230.54
Oct 15 10:07:35 vps647732 sshd[3318]: Failed password for invalid user smtpuser from 51.68.230.54 port 51870 ssh2
...
2019-10-15 17:45:50
77.42.83.39 attackbots
Automatic report - Port Scan Attack
2019-10-15 18:17:57
144.217.214.25 attack
SSH Brute-Forcing (ownc)
2019-10-15 18:20:32
46.188.44.45 attackbots
Oct 14 18:55:29 h1637304 sshd[12624]: reveeclipse mapping checking getaddrinfo for broadband-46-188-44-45.2com.net [46.188.44.45] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 14 18:55:29 h1637304 sshd[12624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.188.44.45  user=r.r
Oct 14 18:55:30 h1637304 sshd[12624]: Failed password for r.r from 46.188.44.45 port 38124 ssh2
Oct 14 18:55:30 h1637304 sshd[12624]: Received disconnect from 46.188.44.45: 11: Bye Bye [preauth]
Oct 14 19:03:34 h1637304 sshd[17222]: reveeclipse mapping checking getaddrinfo for broadband-46-188-44-45.2com.net [46.188.44.45] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 14 19:03:34 h1637304 sshd[17222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.188.44.45  user=www-data
Oct 14 19:03:36 h1637304 sshd[17222]: Failed password for www-data from 46.188.44.45 port 47952 ssh2
Oct 14 19:03:36 h1637304 sshd[17222]: Received discon........
-------------------------------
2019-10-15 18:12:42
162.243.20.243 attackspam
Oct 15 04:05:00 www_kotimaassa_fi sshd[24023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.20.243
Oct 15 04:05:02 www_kotimaassa_fi sshd[24023]: Failed password for invalid user axioma from 162.243.20.243 port 45076 ssh2
...
2019-10-15 17:53:05
51.77.140.48 attackbots
Oct 15 06:14:18 *** sshd[8288]: Failed password for r.r from 51.77.140.48 port 50856 ssh2
Oct 15 06:31:45 *** sshd[10185]: Invalid user sui from 51.77.140.48
Oct 15 06:31:46 *** sshd[10185]: Failed password for invalid user sui from 51.77.140.48 port 51064 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=51.77.140.48
2019-10-15 17:49:55
78.85.39.152 attackspam
19/10/14@23:45:52: FAIL: Alarm-Intrusion address from=78.85.39.152
...
2019-10-15 18:01:53

最近上报的IP列表

36.100.127.189 94.203.153.75 206.155.113.194 66.79.133.207
193.255.209.65 80.159.44.229 116.22.231.95 20.153.87.57
70.252.37.190 215.191.42.227 223.196.33.34 168.32.105.174
246.214.152.144 242.207.109.111 143.248.107.152 165.51.206.80
14.251.48.178 204.75.138.128 132.244.155.131 239.228.23.67