必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
147.185.133.204 attack
Malicious IP / Malware
2024-06-04 12:50:25
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       147.185.132.0 - 147.185.139.255
CIDR:           147.185.132.0/22, 147.185.136.0/22
NetName:        PAN-22
NetHandle:      NET-147-185-132-0-1
Parent:         NET147 (NET-147-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Palo Alto Networks, Inc (PAN-22)
RegDate:        2023-09-07
Updated:        2023-09-07
Ref:            https://rdap.arin.net/registry/ip/147.185.132.0


OrgName:        Palo Alto Networks, Inc
OrgId:          PAN-22
Address:        Palo Alto Networks
Address:        3000 Tannery Way
Address:        Santa Clara, CA 95054
City:           Santa Clara
StateProv:      CA
PostalCode:     95054
Country:        US
RegDate:        2017-11-22
Updated:        2024-11-25
Ref:            https://rdap.arin.net/registry/entity/PAN-22


OrgAbuseHandle: IPABU42-ARIN
OrgAbuseName:   IP Abuse
OrgAbusePhone:  +1-408-753-4000 
OrgAbuseEmail:  dl-ipabuse@paloaltonetworks.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/IPABU42-ARIN

OrgTechHandle: GNS20-ARIN
OrgTechName:   Global Network Services 
OrgTechPhone:  +1-408-753-4000 
OrgTechEmail:  gns-prod@paloaltonetworks.com
OrgTechRef:    https://rdap.arin.net/registry/entity/GNS20-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.185.133.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46646
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.185.133.149.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025100501 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 06 09:31:07 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
b'Host 149.133.185.147.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 147.185.133.149.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
150.223.21.177 attackspambots
Feb  3 01:25:24 lukav-desktop sshd\[29658\]: Invalid user vertex25 from 150.223.21.177
Feb  3 01:25:24 lukav-desktop sshd\[29658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.21.177
Feb  3 01:25:26 lukav-desktop sshd\[29658\]: Failed password for invalid user vertex25 from 150.223.21.177 port 42381 ssh2
Feb  3 01:27:36 lukav-desktop sshd\[30832\]: Invalid user pmjsa from 150.223.21.177
Feb  3 01:27:36 lukav-desktop sshd\[30832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.21.177
2020-02-03 10:22:00
61.93.201.198 attackspam
Unauthorized connection attempt detected from IP address 61.93.201.198 to port 2220 [J]
2020-02-03 10:00:02
218.92.0.179 attack
Feb  3 02:30:31 v22018076622670303 sshd\[26485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.179  user=root
Feb  3 02:30:33 v22018076622670303 sshd\[26485\]: Failed password for root from 218.92.0.179 port 7910 ssh2
Feb  3 02:30:36 v22018076622670303 sshd\[26485\]: Failed password for root from 218.92.0.179 port 7910 ssh2
...
2020-02-03 09:36:55
192.169.158.166 attack
192.169.158.166 - - [02/Feb/2020:23:15:10 +0000] "GET /search-vehicles.php?make=Silver+Bullet+%27-6863+union+all+select+1,CONCAT(0x3a6f79753a,0x4244764877697569706b,0x3a70687a3a)1,1,1,1,1,1%23&vehicle_type=sailboats HTTP/1.0" 200 159319 "-" "-" "-" rt=0.600 ua="127.0.0.1:9000" us="200" ut="0.400" ul="159494" cs=-
192.169.158.166 - - [02/Feb/2020:23:15:10 +0000] "GET /search-vehicles.php?make=Silver+Bullet+-6863+union+all+select+1,CONCAT(0x3a6f79753a,0x4244764877697569706b,0x3a70687a3a)1,1,1,1,1,1,1%23&vehicle_type=sailboats HTTP/1.0" 200 159319 "-" "-" "-" rt=0.600 ua="127.0.0.1:9000" us="200" ut="0.300" ul="159494" cs=-
2020-02-03 10:01:21
5.196.75.178 attackspam
Unauthorized connection attempt detected from IP address 5.196.75.178 to port 2220 [J]
2020-02-03 10:06:01
14.215.95.5 attack
CN_APNIC-HM_<177>1580686079 [1:2403320:55043] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 11 [Classification: Misc Attack] [Priority: 2] {TCP} 14.215.95.5:39017
2020-02-03 10:03:20
80.211.232.135 attackbots
Unauthorized connection attempt detected from IP address 80.211.232.135 to port 2220 [J]
2020-02-03 10:01:55
15.236.2.25 attack
Feb  2 08:57:47 server sshd\[2639\]: Invalid user demo from 15.236.2.25
Feb  2 08:57:47 server sshd\[2639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-15-236-2-25.eu-west-3.compute.amazonaws.com 
Feb  2 08:57:49 server sshd\[2639\]: Failed password for invalid user demo from 15.236.2.25 port 60692 ssh2
Feb  3 03:42:26 server sshd\[14348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-15-236-2-25.eu-west-3.compute.amazonaws.com  user=root
Feb  3 03:42:28 server sshd\[14348\]: Failed password for root from 15.236.2.25 port 53658 ssh2
...
2020-02-03 09:55:31
49.234.67.243 attack
Unauthorized connection attempt detected from IP address 49.234.67.243 to port 2220 [J]
2020-02-03 09:37:27
189.205.155.81 attackspam
Automatic report - Port Scan Attack
2020-02-03 09:55:54
71.239.119.124 attackbotsspam
Unauthorized connection attempt detected from IP address 71.239.119.124 to port 2220 [J]
2020-02-03 10:02:28
223.83.171.75 attackbots
Feb  3 01:18:06 mout sshd[32216]: Invalid user saskia from 223.83.171.75 port 39148
2020-02-03 10:15:56
89.46.239.240 attack
Unauthorized connection attempt detected from IP address 89.46.239.240 to port 23 [J]
2020-02-03 09:51:04
67.207.88.180 attackspam
Feb  2 15:57:54 hpm sshd\[8956\]: Invalid user aspasov from 67.207.88.180
Feb  2 15:57:54 hpm sshd\[8956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.88.180
Feb  2 15:57:56 hpm sshd\[8956\]: Failed password for invalid user aspasov from 67.207.88.180 port 47096 ssh2
Feb  2 16:01:05 hpm sshd\[9106\]: Invalid user gsk from 67.207.88.180
Feb  2 16:01:05 hpm sshd\[9106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.88.180
2020-02-03 10:03:00
111.231.94.138 attackspambots
Unauthorized connection attempt detected from IP address 111.231.94.138 to port 2220 [J]
2020-02-03 10:09:46

最近上报的IP列表

139.59.63.48 125.75.110.216 139.59.90.53 125.94.174.203
229.96.156.235 229.96.156.90 104.17.56.1 113.215.188.30
185.247.137.89 64.62.156.52 118.195.153.213 64.62.156.55
34.38.82.158 135.119.89.57 51.159.14.98 116.206.179.230
183.186.227.20 38.110.46.241 121.62.61.224 123.160.223.65