必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.56.140.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18819
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;147.56.140.54.			IN	A

;; AUTHORITY SECTION:
.			128	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020062700 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 27 16:04:07 CST 2020
;; MSG SIZE  rcvd: 117
HOST信息:
Host 54.140.56.147.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.140.56.147.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
168.195.142.152 attackspam
[portscan] tcp/23 [TELNET]
*(RWIN=14600)(08050931)
2019-08-05 16:49:44
167.99.227.112 attackbots
Wordpress Admin Login attack
2019-08-05 16:41:40
220.129.200.170 attackspam
Telnet Server BruteForce Attack
2019-08-05 16:27:09
5.107.155.6 attack
port 23 attempt blocked
2019-08-05 16:25:01
31.196.187.69 attackspambots
port 23 attempt blocked
2019-08-05 16:18:29
51.68.173.108 attack
Aug  5 11:24:48 tuotantolaitos sshd[7986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.173.108
Aug  5 11:24:49 tuotantolaitos sshd[7986]: Failed password for invalid user vnc from 51.68.173.108 port 42468 ssh2
...
2019-08-05 16:41:14
104.248.157.14 attackspam
2019-08-05T06:34:01.423219abusebot-3.cloudsearch.cf sshd\[8559\]: Invalid user st from 104.248.157.14 port 45242
2019-08-05 16:42:33
81.22.45.219 attackspambots
Multiport scan : 106 ports scanned 130 1011 1140 3055 3301 3303 3309 3312 3318 3320 3321 3326 3349 3350 3355 3359 3365 3371 3382 3387 3402 3437 3443 3451 3480 3989 3999 4023 4243 4450 5003 5152 5530 5534 5566 6001 6002 6123 6500 6666 6700 7771 7890 8001 8011 8181 8392 8896 9001 9010 9092 9224 9390 10010 10019 10063 10100 10227 13393 13579 13892 14725 16188 16338 18055 18600 18828 18937 19199 20009 20047 20245 20327 21161 21181 21201 .....
2019-08-05 16:17:29
167.114.192.162 attackspambots
Aug  5 09:03:39 srv03 sshd\[7247\]: Invalid user test from 167.114.192.162 port 55347
Aug  5 09:03:39 srv03 sshd\[7247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.192.162
Aug  5 09:03:41 srv03 sshd\[7247\]: Failed password for invalid user test from 167.114.192.162 port 55347 ssh2
2019-08-05 16:40:44
180.163.220.60 attackbotsspam
Automatic report - Banned IP Access
2019-08-05 16:10:19
70.23.95.220 attackspambots
20 attempts against mh-ssh on pluto.magehost.pro
2019-08-05 16:07:28
36.81.18.241 attackspam
[SMB remote code execution attempt: port tcp/445]
*(RWIN=8192)(08050931)
2019-08-05 16:55:42
85.109.159.35 attackbots
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08050931)
2019-08-05 16:53:18
181.57.133.130 attackbots
Aug  5 10:05:36 localhost sshd\[25469\]: Invalid user doctor from 181.57.133.130 port 56176
Aug  5 10:05:36 localhost sshd\[25469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.57.133.130
Aug  5 10:05:39 localhost sshd\[25469\]: Failed password for invalid user doctor from 181.57.133.130 port 56176 ssh2
2019-08-05 16:11:11
153.3.118.51 attackbots
2019-08-05T06:54:43.270275abusebot-8.cloudsearch.cf sshd\[835\]: Invalid user admin from 153.3.118.51 port 57778
2019-08-05 16:20:59

最近上报的IP列表

91.25.118.159 19.94.173.158 141.162.34.107 112.107.113.120
57.40.157.9 131.196.167.39 87.184.212.10 122.110.6.218
70.194.21.107 3.22.235.101 37.122.166.113 88.135.134.5
59.2.245.180 196.219.142.135 14.250.19.93 41.185.64.205
219.100.30.176 175.117.255.249 130.61.55.108 46.105.98.111