必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.20.195.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53536
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.20.195.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 08:42:50 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 80.195.20.147.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 147.20.195.80.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
88.200.214.101 attackspambots
Port probing on unauthorized port 445
2020-06-01 23:42:36
81.214.137.238 attackspambots
Unauthorized connection attempt detected from IP address 81.214.137.238 to port 23
2020-06-01 23:14:32
122.182.196.240 attack
Jun  1 14:06:51 ovpn sshd[5526]: Invalid user pi from 122.182.196.240
Jun  1 14:06:51 ovpn sshd[5527]: Invalid user pi from 122.182.196.240
Jun  1 14:06:51 ovpn sshd[5526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.182.196.240
Jun  1 14:06:51 ovpn sshd[5527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.182.196.240
Jun  1 14:06:53 ovpn sshd[5526]: Failed password for invalid user pi from 122.182.196.240 port 41768 ssh2
Jun  1 14:06:53 ovpn sshd[5527]: Failed password for invalid user pi from 122.182.196.240 port 41770 ssh2
Jun  1 14:06:54 ovpn sshd[5527]: Connection closed by 122.182.196.240 port 41770 [preauth]
Jun  1 14:06:54 ovpn sshd[5526]: Connection closed by 122.182.196.240 port 41768 [preauth]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=122.182.196.240
2020-06-01 23:33:04
103.124.92.184 attackspam
May 30 20:07:18 serwer sshd\[19214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.124.92.184  user=root
May 30 20:07:19 serwer sshd\[19214\]: Failed password for root from 103.124.92.184 port 39316 ssh2
May 30 20:15:14 serwer sshd\[20418\]: Invalid user barbara from 103.124.92.184 port 55262
May 30 20:15:14 serwer sshd\[20418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.124.92.184
May 30 20:15:16 serwer sshd\[20418\]: Failed password for invalid user barbara from 103.124.92.184 port 55262 ssh2
May 30 20:19:26 serwer sshd\[20783\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.124.92.184  user=root
May 30 20:19:27 serwer sshd\[20783\]: Failed password for root from 103.124.92.184 port 60810 ssh2
May 30 20:23:29 serwer sshd\[21268\]: Invalid user libssh from 103.124.92.184 port 38122
May 30 20:23:29 serwer sshd\[21268\]: pam_unix\(sshd:a
...
2020-06-01 23:54:02
222.186.30.167 attackspam
Jun  1 20:47:45 gw1 sshd[9561]: Failed password for root from 222.186.30.167 port 60967 ssh2
...
2020-06-01 23:49:46
36.81.213.116 attackbotsspam
IP 36.81.213.116 attacked honeypot on port: 81 at 6/1/2020 1:06:59 PM
2020-06-01 23:23:01
134.175.17.32 attack
SSH Honeypot -> SSH Bruteforce / Login
2020-06-01 23:52:20
51.178.78.152 attack
Jun  1 16:30:32 debian-2gb-nbg1-2 kernel: \[13280603.923430\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=51.178.78.152 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=52032 DPT=6008 WINDOW=65535 RES=0x00 SYN URGP=0
2020-06-01 23:24:15
1.232.139.240 attackbots
2020-03-14 13:11:41 1jD5dj-0008LA-LF SMTP connection from \(\[1.232.139.240\]\) \[1.232.139.240\]:19028 I=\[193.107.88.166\]:25 closed by DROP in ACL
2020-03-14 13:12:01 1jD5e4-0008Lb-0l SMTP connection from \(\[1.232.139.240\]\) \[1.232.139.240\]:19147 I=\[193.107.88.166\]:25 closed by DROP in ACL
2020-03-14 13:12:16 1jD5eI-0008Lw-BT SMTP connection from \(\[1.232.139.240\]\) \[1.232.139.240\]:19246 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-06-01 23:34:29
201.219.50.217 attackspambots
Jun  1 16:19:51 server sshd[51583]: Failed password for root from 201.219.50.217 port 46466 ssh2
Jun  1 16:23:28 server sshd[54568]: Failed password for root from 201.219.50.217 port 40640 ssh2
Jun  1 16:27:07 server sshd[57360]: Failed password for root from 201.219.50.217 port 34812 ssh2
2020-06-01 23:13:34
49.88.112.111 attack
Jun  1 08:15:49 dignus sshd[19049]: Failed password for root from 49.88.112.111 port 64173 ssh2
Jun  1 08:15:50 dignus sshd[19049]: Failed password for root from 49.88.112.111 port 64173 ssh2
Jun  1 08:19:00 dignus sshd[19400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.111  user=root
Jun  1 08:19:02 dignus sshd[19400]: Failed password for root from 49.88.112.111 port 36838 ssh2
Jun  1 08:19:05 dignus sshd[19400]: Failed password for root from 49.88.112.111 port 36838 ssh2
...
2020-06-01 23:21:45
70.37.59.249 attackbots
Jun  1 14:19:08 hostnameis sshd[53670]: Did not receive identification string from 70.37.59.249
Jun  1 14:25:46 hostnameis sshd[53707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.37.59.249  user=r.r
Jun  1 14:25:48 hostnameis sshd[53707]: Failed password for r.r from 70.37.59.249 port 36464 ssh2
Jun  1 14:25:48 hostnameis sshd[53707]: Received disconnect from 70.37.59.249: 11: Bye Bye [preauth]
Jun  1 14:32:53 hostnameis sshd[53713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.37.59.249  user=r.r
Jun  1 14:32:55 hostnameis sshd[53713]: Failed password for r.r from 70.37.59.249 port 59880 ssh2
Jun  1 14:32:55 hostnameis sshd[53713]: Received disconnect from 70.37.59.249: 11: Bye Bye [preauth]
Jun  1 14:40:01 hostnameis sshd[53757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.37.59.249  user=r.r
Jun  1 14:40:03 hostnameis sshd[53757]........
------------------------------
2020-06-01 23:55:47
223.240.121.68 attack
Jun  1 13:24:22 ns3033917 sshd[6562]: Failed password for root from 223.240.121.68 port 41788 ssh2
Jun  1 13:29:20 ns3033917 sshd[6630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.240.121.68  user=root
Jun  1 13:29:22 ns3033917 sshd[6630]: Failed password for root from 223.240.121.68 port 60836 ssh2
...
2020-06-01 23:28:38
157.97.80.205 attackbotsspam
Jun  1 15:11:07 server sshd[22776]: Failed password for root from 157.97.80.205 port 37075 ssh2
Jun  1 15:14:49 server sshd[22958]: Failed password for root from 157.97.80.205 port 39514 ssh2
...
2020-06-01 23:12:50
114.119.160.80 attackspam
Automatic report - Banned IP Access
2020-06-01 23:32:07

最近上报的IP列表

205.187.175.187 200.106.157.65 140.89.82.184 143.195.42.190
53.143.211.105 20.197.181.39 198.194.50.148 50.196.145.127
80.2.158.83 70.14.37.199 193.101.206.244 208.15.171.41
18.121.30.189 138.191.187.0 163.100.142.191 53.249.215.126
100.61.242.148 6.44.148.236 169.150.151.57 117.128.245.27