必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Sweden

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.180.219.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24942
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.180.219.30.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 22:23:09 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 30.219.180.147.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 30.219.180.147.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
202.109.202.60 attackspam
suspicious action Thu, 12 Mar 2020 09:29:43 -0300
2020-03-13 01:42:39
193.70.88.213 attackbots
Mar 12 18:03:29 Ubuntu-1404-trusty-64-minimal sshd\[13439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.88.213  user=root
Mar 12 18:03:31 Ubuntu-1404-trusty-64-minimal sshd\[13439\]: Failed password for root from 193.70.88.213 port 54790 ssh2
Mar 12 18:14:37 Ubuntu-1404-trusty-64-minimal sshd\[21389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.88.213  user=root
Mar 12 18:14:38 Ubuntu-1404-trusty-64-minimal sshd\[21389\]: Failed password for root from 193.70.88.213 port 33944 ssh2
Mar 12 18:18:43 Ubuntu-1404-trusty-64-minimal sshd\[24854\]: Invalid user test from 193.70.88.213
Mar 12 18:18:43 Ubuntu-1404-trusty-64-minimal sshd\[24854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.88.213
2020-03-13 01:47:58
82.252.129.36 attackspambots
2019-12-07T17:30:48.085Z CLOSE host=82.252.129.36 port=53288 fd=4 time=20.003 bytes=27
...
2020-03-13 01:06:46
78.237.216.72 attack
suspicious action Thu, 12 Mar 2020 12:18:12 -0300
2020-03-13 01:34:06
222.186.180.142 attack
Mar 12 18:30:03 dcd-gentoo sshd[7156]: User root from 222.186.180.142 not allowed because none of user's groups are listed in AllowGroups
Mar 12 18:30:07 dcd-gentoo sshd[7156]: error: PAM: Authentication failure for illegal user root from 222.186.180.142
Mar 12 18:30:03 dcd-gentoo sshd[7156]: User root from 222.186.180.142 not allowed because none of user's groups are listed in AllowGroups
Mar 12 18:30:07 dcd-gentoo sshd[7156]: error: PAM: Authentication failure for illegal user root from 222.186.180.142
Mar 12 18:30:03 dcd-gentoo sshd[7156]: User root from 222.186.180.142 not allowed because none of user's groups are listed in AllowGroups
Mar 12 18:30:07 dcd-gentoo sshd[7156]: error: PAM: Authentication failure for illegal user root from 222.186.180.142
Mar 12 18:30:07 dcd-gentoo sshd[7156]: Failed keyboard-interactive/pam for invalid user root from 222.186.180.142 port 29979 ssh2
...
2020-03-13 01:32:30
49.88.112.115 attackspam
Mar 12 04:01:16 php1 sshd\[9796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115  user=root
Mar 12 04:01:18 php1 sshd\[9796\]: Failed password for root from 49.88.112.115 port 44923 ssh2
Mar 12 04:02:18 php1 sshd\[9863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115  user=root
Mar 12 04:02:20 php1 sshd\[9863\]: Failed password for root from 49.88.112.115 port 16915 ssh2
Mar 12 04:03:21 php1 sshd\[9962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115  user=root
2020-03-13 01:51:46
80.241.248.146 attack
2020-02-09T14:18:39.559Z CLOSE host=80.241.248.146 port=36500 fd=4 time=20.000 bytes=31
...
2020-03-13 01:16:12
36.226.111.21 attack
Mar 11 20:30:07 hgb10502 sshd[14317]: User r.r from 36.226.111.21 not allowed because not listed in AllowUsers
Mar 11 20:30:07 hgb10502 sshd[14317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.226.111.21  user=r.r
Mar 11 20:30:09 hgb10502 sshd[14317]: Failed password for invalid user r.r from 36.226.111.21 port 50610 ssh2
Mar 11 20:30:09 hgb10502 sshd[14317]: Received disconnect from 36.226.111.21 port 50610:11: Bye Bye [preauth]
Mar 11 20:30:09 hgb10502 sshd[14317]: Disconnected from 36.226.111.21 port 50610 [preauth]
Mar 11 20:38:15 hgb10502 sshd[15037]: Invalid user 2 from 36.226.111.21 port 59296
Mar 11 20:38:16 hgb10502 sshd[15037]: Failed password for invalid user 2 from 36.226.111.21 port 59296 ssh2
Mar 11 20:38:17 hgb10502 sshd[15037]: Received disconnect from 36.226.111.21 port 59296:11: Bye Bye [preauth]
Mar 11 20:38:17 hgb10502 sshd[15037]: Disconnected from 36.226.111.21 port 59296 [preauth]
Mar x@x
Mar x@x
Mar ........
-------------------------------
2020-03-13 01:42:16
5.135.164.168 attack
Mar 12 17:23:17 mail sshd[9054]: Invalid user jira from 5.135.164.168
Mar 12 17:23:17 mail sshd[9054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.164.168
Mar 12 17:23:17 mail sshd[9054]: Invalid user jira from 5.135.164.168
Mar 12 17:23:19 mail sshd[9054]: Failed password for invalid user jira from 5.135.164.168 port 37354 ssh2
Mar 12 17:41:37 mail sshd[6465]: Invalid user xbmc from 5.135.164.168
...
2020-03-13 01:22:30
122.162.255.119 attack
1584016184 - 03/12/2020 13:29:44 Host: 122.162.255.119/122.162.255.119 Port: 445 TCP Blocked
2020-03-13 01:37:13
77.244.211.174 attackspambots
2020-01-11T21:53:29.164Z CLOSE host=77.244.211.174 port=47056 fd=4 time=20.020 bytes=5
...
2020-03-13 01:45:52
103.130.197.129 attackspam
suspicious action Thu, 12 Mar 2020 09:29:47 -0300
2020-03-13 01:30:29
79.124.60.178 attackspam
2020-02-12T21:28:34.940Z CLOSE host=79.124.60.178 port=58580 fd=4 time=20.014 bytes=13
...
2020-03-13 01:27:37
118.97.77.118 attackspam
Mar 12 13:21:27 firewall sshd[30743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.97.77.118
Mar 12 13:21:27 firewall sshd[30743]: Invalid user wftuser from 118.97.77.118
Mar 12 13:21:29 firewall sshd[30743]: Failed password for invalid user wftuser from 118.97.77.118 port 45144 ssh2
...
2020-03-13 01:18:08
120.38.60.106 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-13 01:14:08

最近上报的IP列表

219.181.69.175 150.175.102.12 16.135.236.210 255.2.129.30
224.180.173.232 183.72.128.160 34.229.253.113 182.223.0.216
150.38.179.119 231.86.179.110 242.11.219.68 151.236.62.172
114.185.152.108 225.150.74.218 165.217.188.170 208.221.233.134
40.220.80.45 127.93.64.181 131.61.71.192 31.45.190.79