必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.63.55.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31584
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.63.55.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 00:15:48 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 139.55.63.147.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.55.63.147.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
209.11.168.73 attack
Feb  7 04:16:23 auw2 sshd\[31111\]: Invalid user qsa from 209.11.168.73
Feb  7 04:16:23 auw2 sshd\[31111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.11.168.73
Feb  7 04:16:25 auw2 sshd\[31111\]: Failed password for invalid user qsa from 209.11.168.73 port 57049 ssh2
Feb  7 04:19:31 auw2 sshd\[31464\]: Invalid user shc from 209.11.168.73
Feb  7 04:19:31 auw2 sshd\[31464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.11.168.73
2020-02-08 03:03:00
87.97.134.143 attack
Feb  7 17:03:53 server sshd\[21632\]: Invalid user pi from 87.97.134.143
Feb  7 17:03:53 server sshd\[21632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.97.134.143 
Feb  7 17:03:53 server sshd\[21633\]: Invalid user pi from 87.97.134.143
Feb  7 17:03:53 server sshd\[21633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.97.134.143 
Feb  7 17:03:54 server sshd\[21632\]: Failed password for invalid user pi from 87.97.134.143 port 45458 ssh2
...
2020-02-08 03:36:25
37.139.1.197 attackbots
Feb  7 14:58:36 Ubuntu-1404-trusty-64-minimal sshd\[19060\]: Invalid user emq from 37.139.1.197
Feb  7 14:58:36 Ubuntu-1404-trusty-64-minimal sshd\[19060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.1.197
Feb  7 14:58:38 Ubuntu-1404-trusty-64-minimal sshd\[19060\]: Failed password for invalid user emq from 37.139.1.197 port 57054 ssh2
Feb  7 15:04:04 Ubuntu-1404-trusty-64-minimal sshd\[31379\]: Invalid user sek from 37.139.1.197
Feb  7 15:04:04 Ubuntu-1404-trusty-64-minimal sshd\[31379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.1.197
2020-02-08 03:23:48
69.94.158.109 attackspambots
Feb  7 15:04:32 grey postfix/smtpd\[21917\]: NOQUEUE: reject: RCPT from queue.swingthelamp.com\[69.94.158.109\]: 554 5.7.1 Service unavailable\; Client host \[69.94.158.109\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[69.94.158.109\]\; from=\ to=\ proto=ESMTP helo=\Feb  7 15:04:32 grey postfix/smtpd\[22902\]: NOQUEUE: reject: RCPT from queue.swingthelamp.com\[69.94.158.109\]: 554 5.7.1 Service unavailable\; Client host \[69.94.158.109\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[69.94.158.109\]\; from=\ to=\ proto=ESMTP helo=\
...
2020-02-08 02:59:57
176.113.115.186 attack
Feb  7 19:51:56 debian-2gb-nbg1-2 kernel: \[3360758.159632\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=176.113.115.186 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=33190 PROTO=TCP SPT=54536 DPT=12345 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-08 03:08:30
113.189.226.11 attackspam
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-02-08 02:56:54
162.14.2.91 attackbotsspam
ICMP MH Probe, Scan /Distributed -
2020-02-08 03:09:04
113.22.185.32 attack
1581084278 - 02/07/2020 15:04:38 Host: 113.22.185.32/113.22.185.32 Port: 445 TCP Blocked
2020-02-08 02:53:29
201.211.151.168 attackbots
Automatic report - Banned IP Access
2020-02-08 02:57:42
217.112.128.51 attackspambots
Email spam message
2020-02-08 03:24:07
222.186.175.150 attackbots
Feb  7 20:06:33 mail sshd[9127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150  user=root
Feb  7 20:06:35 mail sshd[9127]: Failed password for root from 222.186.175.150 port 5520 ssh2
...
2020-02-08 03:25:07
103.113.213.246 attackspam
Lines containing failures of 103.113.213.246
Feb  7 09:38:02 ariston sshd[31877]: Did not receive identification string from 103.113.213.246 port 64476
Feb  7 09:38:04 ariston sshd[31878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.113.213.246  user=r.r
Feb  7 09:38:05 ariston sshd[31878]: Failed password for r.r from 103.113.213.246 port 64549 ssh2
Feb  7 09:38:06 ariston sshd[31878]: Connection closed by authenticating user r.r 103.113.213.246 port 64549 [preauth]
Feb  7 09:38:08 ariston sshd[31888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.113.213.246  user=r.r
Feb  7 09:38:10 ariston sshd[31888]: Failed password for r.r from 103.113.213.246 port 65190 ssh2
Feb  7 09:38:13 ariston sshd[31888]: Connection closed by authenticating user r.r 103.113.213.246 port 65190 [preauth]
Feb  7 09:38:14 ariston sshd[31903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ........
------------------------------
2020-02-08 02:56:36
158.69.204.215 attack
Feb  7 18:04:56 server sshd\[301\]: Invalid user ycl from 158.69.204.215
Feb  7 18:04:56 server sshd\[301\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=215.ip-158-69-204.net 
Feb  7 18:04:58 server sshd\[301\]: Failed password for invalid user ycl from 158.69.204.215 port 35938 ssh2
Feb  7 18:12:48 server sshd\[1896\]: Invalid user zgs from 158.69.204.215
Feb  7 18:12:48 server sshd\[1896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=215.ip-158-69-204.net 
...
2020-02-08 02:54:31
222.186.175.140 attackspambots
Feb  7 20:12:54 eventyay sshd[21236]: Failed password for root from 222.186.175.140 port 42518 ssh2
Feb  7 20:13:08 eventyay sshd[21236]: error: maximum authentication attempts exceeded for root from 222.186.175.140 port 42518 ssh2 [preauth]
Feb  7 20:13:14 eventyay sshd[21239]: Failed password for root from 222.186.175.140 port 3428 ssh2
...
2020-02-08 03:14:59
213.32.67.160 attack
...
2020-02-08 03:27:21

最近上报的IP列表

71.215.160.219 59.224.38.97 254.60.254.170 216.8.183.138
236.58.55.78 248.31.106.124 94.181.103.49 168.96.234.224
193.76.170.44 205.137.20.175 220.250.94.58 240.135.64.109
109.62.37.82 199.172.180.71 185.4.105.153 2.108.217.204
173.22.44.215 116.95.91.252 5.207.239.188 143.97.10.157