必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Norway

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.82.41.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38785
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.82.41.5.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021101 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 02:54:14 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 5.41.82.148.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 5.41.82.148.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.38.128.30 attackspam
Brute-force attempt banned
2020-03-03 16:54:16
121.121.93.107 attackbots
Honeypot attack, port: 81, PTR: PTR record not found
2020-03-03 16:43:01
114.232.105.91 spamattack
[2020/03/03 11:10:26] [114.232.105.91:2102-0] User test@luxnetcorp.com.tw AUTH fails.
[2020/03/03 11:10:26] [114.232.105.91:2099-0] User test@luxnetcorp.com.tw AUTH fails.
[2020/03/03 11:10:26] [114.232.105.91:2100-0] User test@luxnetcorp.com.tw AUTH fails.
[2020/03/03 11:10:27] [114.232.105.91:2101-0] User test@luxnetcorp.com.tw AUTH fails.
[2020/03/03 11:10:47] [114.232.105.91:2095-0] User test@luxnetcorp.com.tw AUTH fails.
[2020/03/03 11:10:48] [114.232.105.91:2102-0] User test@luxnetcorp.com.tw AUTH fails.
[2020/03/03 11:11:08] [114.232.105.91:2101-0] User test@luxnetcorp.com.tw AUTH fails.
[2020/03/03 11:11:09] [114.232.105.91:2099-0] User test@luxnetcorp.com.tw AUTH fails.
2020-03-03 16:27:16
128.199.242.84 attackbots
2020-03-03T05:28:56.692474host3.slimhost.com.ua sshd[964671]: Invalid user midfloridapathology from 128.199.242.84 port 49234
2020-03-03T05:28:56.698051host3.slimhost.com.ua sshd[964671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.242.84
2020-03-03T05:28:56.692474host3.slimhost.com.ua sshd[964671]: Invalid user midfloridapathology from 128.199.242.84 port 49234
2020-03-03T05:28:58.875880host3.slimhost.com.ua sshd[964671]: Failed password for invalid user midfloridapathology from 128.199.242.84 port 49234 ssh2
2020-03-03T05:54:36.540647host3.slimhost.com.ua sshd[987516]: Invalid user midfloridapathology from 128.199.242.84 port 34737
...
2020-03-03 16:52:40
185.13.114.31 attackspam
Automatic report - Port Scan Attack
2020-03-03 16:25:34
52.172.206.77 attackspam
Mar  2 16:53:00 kmh-wmh-001-nbg01 sshd[18633]: Invalid user gerk-info123 from 52.172.206.77 port 37534
Mar  2 16:53:00 kmh-wmh-001-nbg01 sshd[18633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.206.77
Mar  2 16:53:02 kmh-wmh-001-nbg01 sshd[18633]: Failed password for invalid user gerk-info123 from 52.172.206.77 port 37534 ssh2
Mar  2 16:53:02 kmh-wmh-001-nbg01 sshd[18633]: Received disconnect from 52.172.206.77 port 37534:11: Normal Shutdown [preauth]
Mar  2 16:53:02 kmh-wmh-001-nbg01 sshd[18633]: Disconnected from 52.172.206.77 port 37534 [preauth]
Mar  2 16:56:33 kmh-wmh-001-nbg01 sshd[18949]: Invalid user oracle from 52.172.206.77 port 36454
Mar  2 16:56:33 kmh-wmh-001-nbg01 sshd[18949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.206.77
Mar  2 16:56:35 kmh-wmh-001-nbg01 sshd[18949]: Failed password for invalid user oracle from 52.172.206.77 port 36454 ssh2
Mar  2 16........
-------------------------------
2020-03-03 16:59:36
217.128.68.44 attackbots
Honeypot attack, port: 445, PTR: lputeaux-657-1-63-44.w217-128.abo.wanadoo.fr.
2020-03-03 16:35:22
182.53.202.202 attack
1583211292 - 03/03/2020 05:54:52 Host: 182.53.202.202/182.53.202.202 Port: 445 TCP Blocked
2020-03-03 16:41:07
62.94.206.57 attack
Mar  3 09:08:09 vps sshd[11196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.94.206.57 
Mar  3 09:08:11 vps sshd[11196]: Failed password for invalid user user from 62.94.206.57 port 33265 ssh2
Mar  3 09:12:00 vps sshd[11398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.94.206.57 
...
2020-03-03 16:27:39
187.178.87.159 attackbotsspam
*Port Scan* detected from 187.178.87.159 (MX/Mexico/187-178-87-159.dynamic.axtel.net). 4 hits in the last 285 seconds
2020-03-03 16:30:50
42.159.89.85 attackbots
(sshd) Failed SSH login from 42.159.89.85 (CN/China/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar  3 05:54:09 ubnt-55d23 sshd[25315]: Invalid user gmodserver from 42.159.89.85 port 54236
Mar  3 05:54:11 ubnt-55d23 sshd[25315]: Failed password for invalid user gmodserver from 42.159.89.85 port 54236 ssh2
2020-03-03 17:03:31
89.100.106.42 attack
Mar  3 05:55:01 163-172-32-151 sshd[15561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.100.106.42  user=root
Mar  3 05:55:04 163-172-32-151 sshd[15561]: Failed password for root from 89.100.106.42 port 43912 ssh2
...
2020-03-03 16:29:14
36.81.31.136 attackspam
1583211302 - 03/03/2020 05:55:02 Host: 36.81.31.136/36.81.31.136 Port: 445 TCP Blocked
2020-03-03 16:33:04
196.52.43.58 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2020-03-03 17:01:28
103.207.169.24 attack
20/3/2@23:54:38: FAIL: Alarm-Telnet address from=103.207.169.24
...
2020-03-03 16:51:10

最近上报的IP列表

50.115.57.247 247.226.149.140 167.213.190.83 230.14.116.253
94.171.11.10 63.49.230.110 181.172.41.111 149.120.33.44
129.57.199.9 67.19.198.158 24.114.199.76 33.135.73.93
25.12.34.235 19.83.218.206 65.207.103.124 50.8.151.89
220.211.196.2 206.210.0.48 37.156.157.163 17.54.13.214