必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.134.180.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61407
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.134.180.147.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 17:57:25 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 147.180.134.150.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 147.180.134.150.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.101.199.212 attack
2020-04-06T18:14:05.992128abusebot-6.cloudsearch.cf sshd[1412]: Invalid user administrateur from 46.101.199.212 port 44934
2020-04-06T18:14:05.999111abusebot-6.cloudsearch.cf sshd[1412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.199.212
2020-04-06T18:14:05.992128abusebot-6.cloudsearch.cf sshd[1412]: Invalid user administrateur from 46.101.199.212 port 44934
2020-04-06T18:14:07.549750abusebot-6.cloudsearch.cf sshd[1412]: Failed password for invalid user administrateur from 46.101.199.212 port 44934 ssh2
2020-04-06T18:15:53.187178abusebot-6.cloudsearch.cf sshd[1516]: Invalid user ftp_test from 46.101.199.212 port 36698
2020-04-06T18:15:53.192991abusebot-6.cloudsearch.cf sshd[1516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.199.212
2020-04-06T18:15:53.187178abusebot-6.cloudsearch.cf sshd[1516]: Invalid user ftp_test from 46.101.199.212 port 36698
2020-04-06T18:15:54.904085abusebot-6.c
...
2020-04-07 02:44:45
103.202.115.79 attack
2020-04-06T11:49:00.380700linuxbox-skyline sshd[101166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.202.115.79  user=root
2020-04-06T11:49:02.654807linuxbox-skyline sshd[101166]: Failed password for root from 103.202.115.79 port 57176 ssh2
...
2020-04-07 02:43:29
222.186.190.17 attack
Apr  6 21:00:35 pve sshd[8479]: Failed password for root from 222.186.190.17 port 31368 ssh2
Apr  6 21:00:39 pve sshd[8479]: Failed password for root from 222.186.190.17 port 31368 ssh2
Apr  6 21:00:41 pve sshd[8479]: Failed password for root from 222.186.190.17 port 31368 ssh2
2020-04-07 03:05:04
185.33.54.7 attackspambots
185.33.54.7 - - [06/Apr/2020:19:31:32 +0200] "POST /wp-login.php HTTP/1.0" 200 2195 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
185.33.54.7 - - [06/Apr/2020:19:31:32 +0200] "POST /wp-login.php HTTP/1.0" 200 2173 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-04-07 02:41:42
106.53.19.186 attackspam
Fail2Ban Ban Triggered (2)
2020-04-07 03:08:19
50.247.80.214 attackspam
Apr  6 20:11:34 * sshd[31597]: Failed password for root from 50.247.80.214 port 55804 ssh2
2020-04-07 02:46:57
102.37.12.59 attackspam
$f2bV_matches
2020-04-07 02:58:36
200.13.195.70 attack
(sshd) Failed SSH login from 200.13.195.70 (CO/Colombia/-): 5 in the last 3600 secs
2020-04-07 02:31:56
222.186.169.194 attackbotsspam
Apr  6 20:36:54 plex sshd[24456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194  user=root
Apr  6 20:36:56 plex sshd[24456]: Failed password for root from 222.186.169.194 port 53818 ssh2
2020-04-07 02:41:10
159.89.191.116 attack
159.89.191.116 - - [06/Apr/2020:17:34:54 +0200] "POST /wp-login.php HTTP/1.1" 200 3405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.89.191.116 - - [06/Apr/2020:17:34:56 +0200] "POST /wp-login.php HTTP/1.1" 200 3383 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-04-07 02:30:11
218.253.69.134 attackbots
Apr  6 18:58:37 work-partkepr sshd\[20637\]: Invalid user test from 218.253.69.134 port 56728
Apr  6 18:58:37 work-partkepr sshd\[20637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.253.69.134
...
2020-04-07 02:58:51
66.115.173.146 attack
Port 5570 scan denied
2020-04-07 02:53:43
185.6.172.152 attackbotsspam
$f2bV_matches
2020-04-07 02:51:29
105.235.131.183 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-07 02:39:34
122.155.204.68 attackspambots
Apr  6 23:07:49 gw1 sshd[5953]: Failed password for root from 122.155.204.68 port 46178 ssh2
...
2020-04-07 02:59:57

最近上报的IP列表

157.118.100.131 41.192.114.80 244.129.68.174 6.94.101.153
30.162.56.104 203.68.105.192 166.186.68.204 86.228.113.84
205.132.91.54 216.161.191.31 69.218.189.157 64.173.35.18
69.211.64.59 210.107.239.98 169.178.59.84 193.29.14.171
76.124.123.76 178.255.199.110 53.255.152.194 79.79.105.123