必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.20.155.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42900
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.20.155.48.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 124 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 10:11:59 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 48.155.20.147.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 147.20.155.48.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
191.101.12.135 attackspambots
11.08.2019 05:37:41 - Wordpress fail 
Detected by ELinOX-ALM
2019-08-11 13:07:53
218.94.136.90 attackspambots
Aug 10 23:39:31 MK-Soft-VM3 sshd\[31088\]: Invalid user sinus from 218.94.136.90 port 43344
Aug 10 23:39:31 MK-Soft-VM3 sshd\[31088\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.94.136.90
Aug 10 23:39:33 MK-Soft-VM3 sshd\[31088\]: Failed password for invalid user sinus from 218.94.136.90 port 43344 ssh2
...
2019-08-11 13:02:49
80.211.116.102 attack
Aug 11 07:26:19 vps647732 sshd[21834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.116.102
Aug 11 07:26:21 vps647732 sshd[21834]: Failed password for invalid user wm from 80.211.116.102 port 59121 ssh2
...
2019-08-11 13:41:20
222.80.227.105 attackbots
Aug 10 20:43:46 web1 postfix/smtpd[12886]: warning: unknown[222.80.227.105]: SASL LOGIN authentication failed: authentication failure
...
2019-08-11 13:41:46
150.66.1.167 attackspam
Aug 11 05:36:43 *** sshd[24538]: Invalid user dn from 150.66.1.167
2019-08-11 13:52:23
185.56.81.7 attackbots
08/11/2019-00:41:38.412612 185.56.81.7 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-08-11 13:03:53
188.166.30.203 attackspam
Aug 11 06:42:29 icinga sshd[31744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.30.203
Aug 11 06:42:31 icinga sshd[31744]: Failed password for invalid user hassan from 188.166.30.203 port 57134 ssh2
...
2019-08-11 12:58:28
93.145.33.226 attack
Aug 11 06:01:18 debian sshd\[16612\]: Invalid user test from 93.145.33.226 port 46667
Aug 11 06:01:18 debian sshd\[16612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.145.33.226
...
2019-08-11 13:47:31
20.188.103.183 attackspambots
Aug 11 00:04:06 server sshd[38867]: Failed password for invalid user martinez from 20.188.103.183 port 41966 ssh2
Aug 11 00:17:09 server sshd[40851]: Failed password for invalid user transfer from 20.188.103.183 port 52448 ssh2
Aug 11 00:22:56 server sshd[41405]: Failed password for invalid user laptop from 20.188.103.183 port 48858 ssh2
2019-08-11 13:23:37
222.93.252.98 attackspambots
2019-08-11T08:21:13.988423luisaranguren sshd[29865]: Connection from 222.93.252.98 port 45405 on 10.10.10.6 port 22
2019-08-11T08:21:17.264053luisaranguren sshd[29865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.93.252.98  user=root
2019-08-11T08:21:19.677364luisaranguren sshd[29865]: Failed password for root from 222.93.252.98 port 45405 ssh2
2019-08-11T08:21:23.712872luisaranguren sshd[29865]: Failed password for root from 222.93.252.98 port 45405 ssh2
2019-08-11T08:21:13.988423luisaranguren sshd[29865]: Connection from 222.93.252.98 port 45405 on 10.10.10.6 port 22
2019-08-11T08:21:17.264053luisaranguren sshd[29865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.93.252.98  user=root
2019-08-11T08:21:19.677364luisaranguren sshd[29865]: Failed password for root from 222.93.252.98 port 45405 ssh2
2019-08-11T08:21:23.712872luisaranguren sshd[29865]: Failed password for root from 222.93.252.98 port 45405 ssh2
...
2019-08-11 13:57:08
51.254.34.87 attackspambots
Feb 22 16:42:09 motanud sshd\[29765\]: Invalid user user from 51.254.34.87 port 39812
Feb 22 16:42:09 motanud sshd\[29765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.34.87
Feb 22 16:42:11 motanud sshd\[29765\]: Failed password for invalid user user from 51.254.34.87 port 39812 ssh2
2019-08-11 13:20:07
133.130.119.124 attackbotsspam
Aug 11 06:42:03 vibhu-HP-Z238-Microtower-Workstation sshd\[11124\]: Invalid user Minecraft from 133.130.119.124
Aug 11 06:42:03 vibhu-HP-Z238-Microtower-Workstation sshd\[11124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.119.124
Aug 11 06:42:05 vibhu-HP-Z238-Microtower-Workstation sshd\[11124\]: Failed password for invalid user Minecraft from 133.130.119.124 port 42601 ssh2
Aug 11 06:46:53 vibhu-HP-Z238-Microtower-Workstation sshd\[11268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.119.124  user=postgres
Aug 11 06:46:55 vibhu-HP-Z238-Microtower-Workstation sshd\[11268\]: Failed password for postgres from 133.130.119.124 port 39972 ssh2
...
2019-08-11 13:38:57
89.41.173.191 attackspambots
2019-08-11T00:21:42.1482171240 sshd\[20387\]: Invalid user support from 89.41.173.191 port 40847
2019-08-11T00:21:42.1556591240 sshd\[20387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.41.173.191
2019-08-11T00:21:44.3338181240 sshd\[20387\]: Failed password for invalid user support from 89.41.173.191 port 40847 ssh2
...
2019-08-11 13:50:07
220.132.94.233 attack
Feb 24 07:28:46 motanud sshd\[30311\]: Invalid user centos from 220.132.94.233 port 48174
Feb 24 07:28:46 motanud sshd\[30311\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.94.233
Feb 24 07:28:48 motanud sshd\[30311\]: Failed password for invalid user centos from 220.132.94.233 port 48174 ssh2
2019-08-11 13:14:12
194.30.100.154 attackspambots
Aug 11 06:47:14 our-server-hostname postfix/smtpd[28276]: connect from unknown[194.30.100.154]
Aug x@x
Aug 11 06:47:17 our-server-hostname postfix/smtpd[28276]: disconnect from unknown[194.30.100.154]
Aug 11 06:49:08 our-server-hostname postfix/smtpd[330]: connect from unknown[194.30.100.154]
Aug x@x
Aug 11 06:49:11 our-server-hostname postfix/smtpd[330]: disconnect from unknown[194.30.100.154]
Aug 11 06:52:06 our-server-hostname postfix/smtpd[1475]: connect from unknown[194.30.100.154]
Aug x@x
Aug 11 06:52:09 our-server-hostname postfix/smtpd[1475]: disconnect from unknown[194.30.100.154]
Aug 11 06:52:47 our-server-hostname postfix/smtpd[32117]: connect from unknown[194.30.100.154]
Aug x@x
Aug 11 06:52:51 our-server-hostname postfix/smtpd[32117]: disconnect from unknown[194.30.100.154]
Aug 11 06:53:46 our-server-hostname postfix/smtpd[1802]: connect from unknown[194.30.100.154]
Aug x@x
Aug 11 06:53:49 our-server-hostname postfix/smtpd[1802]: disconnect from unknown[194........
-------------------------------
2019-08-11 13:55:56

最近上报的IP列表

123.56.124.171 222.105.128.119 221.71.184.39 140.197.48.221
250.241.151.188 122.18.70.24 59.226.194.5 155.146.227.234
25.144.97.177 178.97.173.27 129.129.145.14 237.66.35.194
170.86.189.187 100.57.255.175 141.15.161.5 238.78.142.80
87.29.81.244 86.13.121.133 231.120.98.75 200.224.150.48