必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.57.2.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17198
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.57.2.41.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011101 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 12 11:39:32 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 41.2.57.147.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 41.2.57.147.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
82.209.205.57 attackspambots
2019-07-16T03:30:53.967617centos sshd\[29956\]: Invalid user linux from 82.209.205.57 port 59714
2019-07-16T03:30:53.972129centos sshd\[29956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.209.205.57
2019-07-16T03:30:55.847501centos sshd\[29956\]: Failed password for invalid user linux from 82.209.205.57 port 59714 ssh2
2019-07-16 17:20:51
111.67.43.104 attackbotsspam
Jul 15 20:13:49 box kernel: [1329054.377955] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=111.67.43.104 DST=[munged] LEN=52 TOS=0x00 PREC=0x00 TTL=118 ID=26903 DF PROTO=TCP SPT=51414 DPT=65353 WINDOW=8192 RES=0x00 SYN URGP=0 
Jul 15 20:13:52 box kernel: [1329057.452242] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=111.67.43.104 DST=[munged] LEN=52 TOS=0x00 PREC=0x00 TTL=118 ID=5006 DF PROTO=TCP SPT=51414 DPT=65353 WINDOW=8192 RES=0x00 SYN URGP=0 
Jul 15 20:13:58 box kernel: [1329063.458481] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=111.67.43.104 DST=[munged] LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=11930 DF PROTO=TCP SPT=51414 DPT=65353 WINDOW=8192 RES=0x00 SYN URGP=0 
Jul 16 03:31:06 box kernel: [1355290.761223] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=111.67.43.104 DST=[munged] LEN=52 TOS=0x00 PREC=0x00 TTL=118 ID=31517 DF PROTO=TCP SPT=59078 DPT=65353 WINDOW=8192 RES=0x00 SYN URGP=0 
Jul 16 03:31:09 box kernel: [1355293.791141] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=111.67.43.104 DST=[munged] LEN=52 TOS=0x00 PR
2019-07-16 17:05:03
85.40.208.178 attack
Automatic report - Banned IP Access
2019-07-16 17:13:11
46.101.202.232 attackbots
Scanning unused Default website or suspicious access to valid sites from IP marked as abusive
2019-07-16 17:27:16
148.72.208.74 attackbots
2019-07-16T09:15:38.339488abusebot-6.cloudsearch.cf sshd\[1955\]: Invalid user mysql from 148.72.208.74 port 58188
2019-07-16 17:23:21
118.25.48.248 attackbots
Jul 16 03:57:10 vps691689 sshd[20267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.48.248
Jul 16 03:57:11 vps691689 sshd[20267]: Failed password for invalid user developer from 118.25.48.248 port 41730 ssh2
Jul 16 04:00:40 vps691689 sshd[20351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.48.248
...
2019-07-16 18:04:24
213.98.181.220 attackspam
Jul 16 10:56:28 ubuntu-2gb-nbg1-dc3-1 sshd[15871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.98.181.220
Jul 16 10:56:30 ubuntu-2gb-nbg1-dc3-1 sshd[15871]: Failed password for invalid user nagios from 213.98.181.220 port 49569 ssh2
...
2019-07-16 17:07:06
193.9.114.139 attack
Jul 16 10:23:02 MK-Soft-Root2 sshd\[4928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.9.114.139  user=root
Jul 16 10:23:04 MK-Soft-Root2 sshd\[4928\]: Failed password for root from 193.9.114.139 port 35120 ssh2
Jul 16 10:23:06 MK-Soft-Root2 sshd\[4928\]: Failed password for root from 193.9.114.139 port 35120 ssh2
...
2019-07-16 17:12:02
153.36.236.151 attackspam
Jul 16 05:32:46 plusreed sshd[20555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.151  user=root
Jul 16 05:32:48 plusreed sshd[20555]: Failed password for root from 153.36.236.151 port 34664 ssh2
...
2019-07-16 17:55:08
185.222.211.2 attack
Jul 16 10:03:11 relay postfix/smtpd\[16494\]: NOQUEUE: reject: RCPT from unknown\[185.222.211.2\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[185.222.211.2\]\>
Jul 16 10:03:11 relay postfix/smtpd\[16494\]: NOQUEUE: reject: RCPT from unknown\[185.222.211.2\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[185.222.211.2\]\>
Jul 16 10:03:11 relay postfix/smtpd\[16494\]: NOQUEUE: reject: RCPT from unknown\[185.222.211.2\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[185.222.211.2\]\>
Jul 16 10:03:11 relay postfix/smtpd\[16494\]: NOQUEUE: reject: RCPT from unknown\[185.222.211.2\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ p
...
2019-07-16 17:12:22
176.65.2.5 attackbotsspam
This IP address was blacklisted for the following reason:  /de/jobs/fahrer-mit-fuehrerschein-ce-m-w-d/&%27%20and%20%27x%27%3D%27y @ 2018-10-15T00:45:56+02:00.
2019-07-16 17:11:25
113.229.61.117 attackspambots
Automatic report - Port Scan Attack
2019-07-16 17:38:59
84.39.33.198 attackbotsspam
Jul 16 11:12:19 pornomens sshd\[13113\]: Invalid user ts5 from 84.39.33.198 port 43684
Jul 16 11:12:19 pornomens sshd\[13113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.39.33.198
Jul 16 11:12:21 pornomens sshd\[13113\]: Failed password for invalid user ts5 from 84.39.33.198 port 43684 ssh2
...
2019-07-16 17:13:42
192.241.209.207 attackspambots
264/tcp 9001/tcp 22020/tcp...
[2019-05-15/07-14]32pkt,28pt.(tcp),2pt.(udp)
2019-07-16 17:16:22
222.186.174.123 attackbotsspam
[mysql-auth] MySQL auth attack
2019-07-16 17:15:07

最近上报的IP列表

98.202.62.95 226.58.112.110 4.109.238.37 80.60.91.41
211.51.138.25 73.233.1.215 101.71.3.142 213.168.204.202
169.37.230.237 55.114.103.4 238.60.244.180 180.237.41.33
230.208.7.251 234.157.145.247 36.29.10.118 173.22.33.198
206.76.138.56 3.74.30.132 175.136.69.154 43.27.242.68