必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.80.52.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30073
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.80.52.239.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012801 1800 900 604800 86400

;; Query time: 119 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 05:16:50 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 239.52.80.147.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 239.52.80.147.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.116.86.54 attack
3389BruteforceFW23
2019-07-07 23:25:09
138.229.101.180 attackbotsspam
Looking for resource vulnerabilities
2019-07-08 00:09:43
45.13.39.115 attack
Jul  7 17:46:04 mail postfix/smtps/smtpd\[15432\]: warning: unknown\[45.13.39.115\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  7 17:48:10 mail postfix/smtps/smtpd\[15432\]: warning: unknown\[45.13.39.115\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  7 17:50:15 mail postfix/smtps/smtpd\[16202\]: warning: unknown\[45.13.39.115\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-07 23:57:18
45.55.254.13 attackbotsspam
Jul  7 17:38:54 legacy sshd[31951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.254.13
Jul  7 17:38:56 legacy sshd[31951]: Failed password for invalid user tomcat from 45.55.254.13 port 53734 ssh2
Jul  7 17:40:58 legacy sshd[31985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.254.13
...
2019-07-08 00:06:15
45.70.196.180 attackspambots
Jul  7 15:44:28 vmd17057 sshd\[16566\]: Invalid user sinus from 45.70.196.180 port 40342
Jul  7 15:44:28 vmd17057 sshd\[16566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.70.196.180
Jul  7 15:44:29 vmd17057 sshd\[16566\]: Failed password for invalid user sinus from 45.70.196.180 port 40342 ssh2
...
2019-07-07 23:27:49
70.120.180.176 attackbotsspam
Jul  7 16:19:11 ns341937 sshd[20462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.120.180.176
Jul  7 16:19:11 ns341937 sshd[20460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.120.180.176
Jul  7 16:19:13 ns341937 sshd[20460]: Failed password for invalid user pi from 70.120.180.176 port 50964 ssh2
Jul  7 16:19:13 ns341937 sshd[20462]: Failed password for invalid user pi from 70.120.180.176 port 50966 ssh2
...
2019-07-08 00:20:27
154.73.75.99 attack
Jul  7 16:27:31 dev sshd\[7362\]: Invalid user odoo from 154.73.75.99 port 59175
Jul  7 16:27:31 dev sshd\[7362\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.73.75.99
...
2019-07-07 23:40:01
179.199.204.79 attackspambots
Jul  7 15:42:41 [host] sshd[6105]: Invalid user jdavila from 179.199.204.79
Jul  7 15:42:41 [host] sshd[6105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.199.204.79
Jul  7 15:42:44 [host] sshd[6105]: Failed password for invalid user jdavila from 179.199.204.79 port 27649 ssh2
2019-07-08 00:03:53
108.45.41.125 attack
Jul  7 14:06:26 xb3 sshd[20546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=pool-108-45-41-125.washdc.fios.verizon.net
Jul  7 14:06:28 xb3 sshd[20546]: Failed password for invalid user stage from 108.45.41.125 port 42681 ssh2
Jul  7 14:06:28 xb3 sshd[20546]: Received disconnect from 108.45.41.125: 11: Bye Bye [preauth]
Jul  7 14:12:44 xb3 sshd[20966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=pool-108-45-41-125.washdc.fios.verizon.net  user=r.r
Jul  7 14:12:46 xb3 sshd[20966]: Failed password for r.r from 108.45.41.125 port 15598 ssh2
Jul  7 14:12:46 xb3 sshd[20966]: Received disconnect from 108.45.41.125: 11: Bye Bye [preauth]
Jul  7 14:16:22 xb3 sshd[17004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=pool-108-45-41-125.washdc.fios.verizon.net
Jul  7 14:16:25 xb3 sshd[17004]: Failed password for invalid user postgres from 108.45.41.125........
-------------------------------
2019-07-07 23:52:39
27.211.108.48 attackspambots
Jul  7 15:37:56 majoron sshd[4336]: Invalid user admin from 27.211.108.48 port 22212
Jul  7 15:37:56 majoron sshd[4336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.211.108.48
Jul  7 15:37:59 majoron sshd[4336]: Failed password for invalid user admin from 27.211.108.48 port 22212 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=27.211.108.48
2019-07-08 00:13:25
188.68.35.67 attackbots
Jul  7 15:44:00 localhost sshd\[3847\]: Invalid user rob from 188.68.35.67 port 39686
Jul  7 15:44:00 localhost sshd\[3847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.68.35.67
Jul  7 15:44:02 localhost sshd\[3847\]: Failed password for invalid user rob from 188.68.35.67 port 39686 ssh2
2019-07-07 23:36:49
94.139.241.58 attackspam
0,45-06/06 concatform PostRequest-Spammer scoring: Durban01
2019-07-08 00:18:19
132.232.116.82 attackbotsspam
Jul  7 09:05:50 aat-srv002 sshd[8963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.116.82
Jul  7 09:05:52 aat-srv002 sshd[8963]: Failed password for invalid user hang from 132.232.116.82 port 52372 ssh2
Jul  7 09:08:58 aat-srv002 sshd[9000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.116.82
Jul  7 09:09:00 aat-srv002 sshd[9000]: Failed password for invalid user waldemar from 132.232.116.82 port 48756 ssh2
...
2019-07-07 23:42:01
45.122.222.253 attack
Jul  7 17:43:18 server sshd[17875]: Failed password for root from 45.122.222.253 port 52308 ssh2
...
2019-07-08 00:08:40
207.46.13.75 attack
Automatic report - Web App Attack
2019-07-07 23:58:57

最近上报的IP列表

19.52.169.18 135.94.169.35 218.43.110.95 230.221.199.104
71.243.253.114 2.194.76.125 219.146.135.139 47.232.116.217
5.45.246.174 127.146.150.223 26.73.117.198 196.249.155.193
85.60.128.180 47.31.229.73 175.93.200.202 199.98.188.212
252.198.250.46 70.40.224.160 22.9.71.23 132.82.103.178