必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Australia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.195.27.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15711
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.195.27.158.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121502 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 16 13:17:19 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 158.27.195.148.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 158.27.195.148.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
213.181.210.245 attackspam
fail2ban -- 213.181.210.245
...
2020-07-15 18:35:54
203.202.249.83 attackbotsspam
Honeypot attack, port: 445, PTR: sanmar83.rad1.aamranetworks.com.
2020-07-15 18:18:47
90.150.204.191 attack
Jul 15 11:24:07 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=90.150.204.191 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=56 ID=37306 PROTO=TCP SPT=37888 DPT=23 WINDOW=1152 RES=0x00 SYN URGP=0 Jul 15 11:24:07 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=90.150.204.191 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=56 ID=37306 PROTO=TCP SPT=37888 DPT=23 WINDOW=1152 RES=0x00 SYN URGP=0 Jul 15 11:24:07 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=90.150.204.191 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=56 ID=37306 PROTO=TCP SPT=37888 DPT=23 WINDOW=1152 RES=0x00 SYN URGP=0 Jul 15 11:24:07 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=90.150.204.191 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=56 ID=37306 PROTO=TCP SPT=37888 DPT=23 WINDOW=1152 RES=0x00 SYN URGP=0 Jul 15 12:16:27 *hidden* kernel: [UF
...
2020-07-15 18:53:08
178.142.187.237 attack
Jul 15 17:16:35 webhost01 sshd[5059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.142.187.237
...
2020-07-15 18:39:23
88.254.172.93 attackspam
Port probing on unauthorized port 445
2020-07-15 18:22:54
222.252.17.56 attackbotsspam
Honeypot attack, port: 445, PTR: static.vnpt-hanoi.com.vn.
2020-07-15 18:45:48
13.77.74.25 attack
Jul 15 06:58:02 takio sshd[1258]: Invalid user admin from 13.77.74.25 port 13875
Jul 15 06:58:02 takio sshd[1258]: Failed password for invalid user admin from 13.77.74.25 port 13875 ssh2
Jul 15 13:19:31 takio sshd[14797]: Invalid user admin from 13.77.74.25 port 17317
Jul 15 13:19:31 takio sshd[14797]: Failed password for invalid user admin from 13.77.74.25 port 17317 ssh2
2020-07-15 18:20:29
36.107.231.56 attackspambots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-15 18:20:03
47.9.232.186 attackspam
[Wed Jul 15 11:42:32 2020] - Syn Flood From IP: 47.9.232.186 Port: 51613
2020-07-15 18:34:36
94.103.80.132 attackspam
Unauthorized IMAP connection attempt
2020-07-15 18:44:15
138.68.148.177 attackspambots
Jul 15 03:13:45 dignus sshd[19223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.148.177
Jul 15 03:13:47 dignus sshd[19223]: Failed password for invalid user lcd from 138.68.148.177 port 37400 ssh2
Jul 15 03:16:40 dignus sshd[19685]: Invalid user nam from 138.68.148.177 port 58592
Jul 15 03:16:40 dignus sshd[19685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.148.177
Jul 15 03:16:42 dignus sshd[19685]: Failed password for invalid user nam from 138.68.148.177 port 58592 ssh2
...
2020-07-15 18:28:46
222.186.42.137 attackbotsspam
Jul 15 10:16:41 ip-172-31-61-156 sshd[11180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137  user=root
Jul 15 10:16:43 ip-172-31-61-156 sshd[11180]: Failed password for root from 222.186.42.137 port 21505 ssh2
...
2020-07-15 18:26:25
137.116.63.84 attackbotsspam
Jul 15 12:16:46 prox sshd[7462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.116.63.84 
Jul 15 12:16:48 prox sshd[7462]: Failed password for invalid user admin from 137.116.63.84 port 15269 ssh2
2020-07-15 18:20:48
14.215.128.100 attackspam
Unauthorized connection attempt from IP address 14.215.128.100 on Port 445(SMB)
2020-07-15 18:56:43
52.242.125.203 attackspam
2020-07-15T12:43:15.007233ks3355764 sshd[21533]: Invalid user admin from 52.242.125.203 port 19868
2020-07-15T12:43:16.933447ks3355764 sshd[21533]: Failed password for invalid user admin from 52.242.125.203 port 19868 ssh2
...
2020-07-15 18:58:07

最近上报的IP列表

3.90.185.249 89.32.242.191 1.161.182.156 205.127.218.155
162.233.103.249 165.174.243.30 66.93.245.204 67.82.74.120
185.154.245.218 16.69.66.156 42.124.77.182 76.40.240.25
225.226.1.204 44.235.20.121 208.223.191.80 71.21.98.74
107.178.66.47 201.66.71.120 181.83.133.47 159.187.126.151