必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.20.213.232
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13022
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.20.213.232.			IN	A

;; AUTHORITY SECTION:
.			179	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023052400 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 24 15:18:26 CST 2023
;; MSG SIZE  rcvd: 107
HOST信息:
Host 232.213.20.147.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 147.20.213.232.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
177.69.130.85 attackspambots
Aug 22 19:41:53 hb sshd\[5570\]: Invalid user rabbitmq from 177.69.130.85
Aug 22 19:41:53 hb sshd\[5570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.130.85
Aug 22 19:41:55 hb sshd\[5570\]: Failed password for invalid user rabbitmq from 177.69.130.85 port 48020 ssh2
Aug 22 19:47:29 hb sshd\[6148\]: Invalid user apple1 from 177.69.130.85
Aug 22 19:47:29 hb sshd\[6148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.130.85
2019-08-23 09:36:36
46.101.235.214 attack
Invalid user user from 46.101.235.214 port 35022
2019-08-23 09:37:40
178.32.10.94 attackbots
Aug 23 03:33:12 [HOSTNAME] sshd[7696]: Invalid user servers from 178.32.10.94 port 21005
Aug 23 03:38:00 [HOSTNAME] sshd[7731]: Invalid user skim from 178.32.10.94 port 21916
Aug 23 03:43:41 [HOSTNAME] sshd[7810]: Invalid user mysql from 178.32.10.94 port 22844
...
2019-08-23 09:59:05
27.209.2.47 attackbotsspam
Aug 22 15:09:56 eola postfix/smtpd[10152]: connect from unknown[27.209.2.47]
Aug 22 15:09:57 eola postfix/smtpd[10152]: lost connection after AUTH from unknown[27.209.2.47]
Aug 22 15:09:57 eola postfix/smtpd[10152]: disconnect from unknown[27.209.2.47] ehlo=1 auth=0/1 commands=1/2
Aug 22 15:10:17 eola postfix/smtpd[10152]: connect from unknown[27.209.2.47]
Aug 22 15:10:18 eola postfix/smtpd[10152]: lost connection after AUTH from unknown[27.209.2.47]
Aug 22 15:10:18 eola postfix/smtpd[10152]: disconnect from unknown[27.209.2.47] ehlo=1 auth=0/1 commands=1/2
Aug 22 15:10:22 eola postfix/smtpd[10152]: connect from unknown[27.209.2.47]
Aug 22 15:10:22 eola postfix/smtpd[10152]: lost connection after AUTH from unknown[27.209.2.47]
Aug 22 15:10:22 eola postfix/smtpd[10152]: disconnect from unknown[27.209.2.47] ehlo=1 auth=0/1 commands=1/2
Aug 22 15:10:25 eola postfix/smtpd[10152]: connect from unknown[27.209.2.47]
Aug 22 15:10:26 eola postfix/smtpd[10152]: lost connection af........
-------------------------------
2019-08-23 09:50:47
129.211.157.225 attackbotsspam
" "
2019-08-23 09:19:47
45.227.253.114 attackbotsspam
Aug 23 03:05:04 relay postfix/smtpd\[24352\]: warning: unknown\[45.227.253.114\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 23 03:05:11 relay postfix/smtpd\[27081\]: warning: unknown\[45.227.253.114\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 23 03:13:35 relay postfix/smtpd\[18920\]: warning: unknown\[45.227.253.114\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 23 03:13:42 relay postfix/smtpd\[18920\]: warning: unknown\[45.227.253.114\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 23 03:24:41 relay postfix/smtpd\[24352\]: warning: unknown\[45.227.253.114\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-08-23 09:29:24
104.131.189.116 attackbotsspam
Aug 23 03:21:39 SilenceServices sshd[17540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.189.116
Aug 23 03:21:41 SilenceServices sshd[17540]: Failed password for invalid user evelyn from 104.131.189.116 port 39828 ssh2
Aug 23 03:25:48 SilenceServices sshd[21210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.189.116
2019-08-23 09:45:07
46.188.125.165 attack
2019-08-22 20:56:07 unexpected disconnection while reading SMTP command from (broadband-46-188-125-165.2com.net) [46.188.125.165]:58759 I=[10.100.18.25]:25 (error: Connection reset by peer)
2019-08-22 20:57:04 unexpected disconnection while reading SMTP command from (broadband-46-188-125-165.2com.net) [46.188.125.165]:16683 I=[10.100.18.25]:25 (error: Connection reset by peer)
2019-08-22 20:57:46 unexpected disconnection while reading SMTP command from (broadband-46-188-125-165.2com.net) [46.188.125.165]:9170 I=[10.100.18.25]:25 (error: Connection reset by peer)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=46.188.125.165
2019-08-23 10:00:11
158.69.224.11 attackbotsspam
jannisjulius.de 158.69.224.11 \[22/Aug/2019:21:28:43 +0200\] "POST /wp-login.php HTTP/1.1" 200 6118 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
jannisjulius.de 158.69.224.11 \[22/Aug/2019:21:28:44 +0200\] "POST /wp-login.php HTTP/1.1" 200 6120 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-08-23 09:28:38
179.185.246.116 attackspam
Automatic report - Port Scan Attack
2019-08-23 09:18:28
84.219.205.241 attackspambots
$f2bV_matches
2019-08-23 09:33:36
51.75.247.13 attack
Automatic report - Banned IP Access
2019-08-23 09:42:29
202.138.242.121 attackbots
Aug 22 22:27:14 dedicated sshd[10267]: Invalid user rso from 202.138.242.121 port 44700
2019-08-23 09:45:45
92.188.124.228 attack
Aug 23 00:12:30 localhost sshd\[4651\]: Invalid user bs from 92.188.124.228 port 52824
Aug 23 00:12:30 localhost sshd\[4651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.188.124.228
Aug 23 00:12:32 localhost sshd\[4651\]: Failed password for invalid user bs from 92.188.124.228 port 52824 ssh2
...
2019-08-23 09:39:30
88.219.126.219 attackspambots
Invalid user pi from 88.219.126.219 port 49976
2019-08-23 09:35:29

最近上报的IP列表

101.139.27.71 247.200.250.45 49.184.98.5 252.92.53.219
120.215.60.160 37.132.29.250 225.226.86.50 224.134.39.64
133.97.124.163 2.121.87.84 104.254.212.133 10.35.105.255
250.252.171.18 178.44.143.74 125.47.245.210 235.132.87.56
220.59.62.30 229.142.86.195 219.150.228.123 128.200.64.117