必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tokyo

省份(region): Tokyo

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.103.12.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8481
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;157.103.12.2.			IN	A

;; AUTHORITY SECTION:
.			554	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020060100 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 01 23:52:57 CST 2020
;; MSG SIZE  rcvd: 116
HOST信息:
Host 2.12.103.157.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 2.12.103.157.in-addr.arpa.: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.37.51.21 attackbots
Honeypot attack, port: 445, PTR: 190-37-51-21.dyn.dsl.cantv.net.
2020-09-05 02:01:03
102.41.152.146 attack
Invalid user test1 from 102.41.152.146 port 1843
2020-09-05 01:42:30
157.48.142.238 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-05 01:44:24
69.26.135.176 attack
trying to access non-authorized port
2020-09-05 01:44:04
114.32.210.222 attackbots
Attempted connection to port 23.
2020-09-05 02:10:58
185.236.66.201 attack
Unauthorized connection attempt from IP address 185.236.66.201 on Port 445(SMB)
2020-09-05 02:02:59
165.232.49.181 attackspam
Port scan denied
2020-09-05 02:03:49
112.85.42.87 attack
Sep  4 17:38:26 ip-172-31-42-142 sshd\[22733\]: Failed password for root from 112.85.42.87 port 50027 ssh2\
Sep  4 17:39:31 ip-172-31-42-142 sshd\[22823\]: Failed password for root from 112.85.42.87 port 53003 ssh2\
Sep  4 17:40:34 ip-172-31-42-142 sshd\[22827\]: Failed password for root from 112.85.42.87 port 47815 ssh2\
Sep  4 17:41:39 ip-172-31-42-142 sshd\[22836\]: Failed password for root from 112.85.42.87 port 54003 ssh2\
Sep  4 17:42:44 ip-172-31-42-142 sshd\[22838\]: Failed password for root from 112.85.42.87 port 52131 ssh2\
2020-09-05 01:48:33
128.199.105.58 attackspam
Port scan denied
2020-09-05 02:08:10
52.231.14.90 attackspambots
Sep  4 03:41:16 site2 sshd\[36579\]: Invalid user jader from 52.231.14.90Sep  4 03:41:18 site2 sshd\[36579\]: Failed password for invalid user jader from 52.231.14.90 port 37508 ssh2Sep  4 03:43:08 site2 sshd\[36612\]: Failed password for root from 52.231.14.90 port 48262 ssh2Sep  4 03:43:58 site2 sshd\[36655\]: Invalid user centos from 52.231.14.90Sep  4 03:44:00 site2 sshd\[36655\]: Failed password for invalid user centos from 52.231.14.90 port 34910 ssh2
...
2020-09-05 01:53:29
82.178.43.102 attack
Unauthorized connection attempt from IP address 82.178.43.102 on Port 445(SMB)
2020-09-05 02:09:12
186.18.41.1 attackbots
SSH invalid-user multiple login attempts
2020-09-05 01:40:12
177.70.154.230 attackbotsspam
1599165974 - 09/03/2020 22:46:14 Host: 177.70.154.230/177.70.154.230 Port: 445 TCP Blocked
2020-09-05 02:15:51
112.85.42.227 attackbotsspam
Sep  4 13:27:53 NPSTNNYC01T sshd[31076]: Failed password for root from 112.85.42.227 port 61052 ssh2
Sep  4 13:34:01 NPSTNNYC01T sshd[31571]: Failed password for root from 112.85.42.227 port 19057 ssh2
...
2020-09-05 02:05:57
164.132.107.245 attackspam
$f2bV_matches
2020-09-05 01:38:53

最近上报的IP列表

48.176.6.247 215.234.225.135 96.3.108.170 144.193.196.222
36.177.190.51 197.18.220.200 147.34.140.55 5.142.195.90
46.188.1.35 209.77.140.54 198.90.97.171 194.2.143.255
220.241.120.214 59.155.14.73 141.213.242.132 136.255.48.192
70.37.59.249 205.238.195.67 117.161.193.41 110.219.156.137