必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Madrid

省份(region): Madrid

国家(country): Spain

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.96.40.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29027
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.96.40.7.			IN	A

;; AUTHORITY SECTION:
.			186	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010101 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 02 10:03:36 CST 2022
;; MSG SIZE  rcvd: 104
HOST信息:
7.40.96.147.in-addr.arpa domain name pointer reservado-040007.red.ucm.es.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
7.40.96.147.in-addr.arpa	name = reservado-040007.red.ucm.es.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
107.184.25.174 attack
trying to access non-authorized port
2020-09-06 01:25:19
103.210.237.14 attack
Port Scan
...
2020-09-06 01:12:11
59.47.229.130 attackspambots
Invalid user lgl from 59.47.229.130 port 51719
2020-09-06 01:42:44
107.170.227.141 attackspam
Sep  5 16:20:14 vmd26974 sshd[3983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.227.141
Sep  5 16:20:17 vmd26974 sshd[3983]: Failed password for invalid user amartinez from 107.170.227.141 port 52622 ssh2
...
2020-09-06 01:44:05
71.6.232.5 attack
 TCP (SYN) 71.6.232.5:41440 -> port 3306, len 44
2020-09-06 01:15:52
87.101.83.131 attackbots
Unauthorized access detected from black listed ip!
2020-09-06 01:24:06
168.194.235.251 attackbotsspam
Sep  4 18:47:58 mellenthin postfix/smtpd[29029]: NOQUEUE: reject: RCPT from unknown[168.194.235.251]: 554 5.7.1 Service unavailable; Client host [168.194.235.251] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/168.194.235.251; from= to= proto=ESMTP helo=
2020-09-06 01:28:33
194.26.27.14 attackbots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-06 01:25:32
190.102.144.224 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-06 01:18:12
148.72.158.151 attackbots
Automatic report - Port Scan
2020-09-06 01:30:53
116.241.175.237 attack
Unauthorised access (Sep  4) SRC=116.241.175.237 LEN=40 TTL=46 ID=60910 TCP DPT=23 WINDOW=59723 SYN
2020-09-06 01:45:39
113.110.142.192 attack
 TCP (SYN) 113.110.142.192:19074 -> port 445, len 44
2020-09-06 01:05:38
91.149.213.154 attackbots
Hi,
Hi,

The IP 91.149.213.154 has just been banned by  after
5 attempts against postfix.


Here is more information about 91.149.213.154 :

% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Condhostnameions.
% See hxxp://www.ripe.net/db/support/db-terms-condhostnameions.pdf

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '91.149.213.0 - 91.149.213.255'

% x@x

inetnum:        91.149.213.0 - 91.149.213.255
org:            ORG-IB111-RIPE
netname:        IPV4-BUYERS-NET
country:        PL
admin-c:        ACRO23711-RIPE
tech-c:         ACRO23711-RIPE
mnt-domains:    MARTON-MNT
mnt-domains:    IPV4BUYERS
mnt-routes:     MARTON-MNT
mnt-routes:     IPV4MNT
status:         ASSIGNED PA
mnt-by:         MARTON-MNT
created:        2007-05-29T09:22:33Z
last-modified:  2020-07-02T08:54:59Z
source:         RIPE

organisation:   ........
------------------------------
2020-09-06 01:20:55
138.197.195.215 attackspambots
Sep  5 15:58:14 XXX sshd[17105]: Invalid user mn from 138.197.195.215 port 45816
2020-09-06 01:38:48
42.118.22.14 attackspambots
1599238064 - 09/04/2020 18:47:44 Host: 42.118.22.14/42.118.22.14 Port: 445 TCP Blocked
2020-09-06 01:39:02

最近上报的IP列表

133.109.28.176 81.243.242.59 167.34.55.110 164.7.109.7
190.49.217.46 9.107.165.154 117.219.121.102 247.61.61.114
185.27.254.196 254.189.241.230 147.242.70.12 101.67.151.96
121.140.106.246 213.43.92.215 29.6.160.176 10.228.227.161
7.72.9.201 211.149.127.16 131.51.193.152 205.205.94.14