必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Zambia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.213.72.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4818
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.213.72.141.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 21:46:58 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
141.72.213.197.in-addr.arpa domain name pointer 141-72-213-197.r.airtel.co.zm.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
141.72.213.197.in-addr.arpa	name = 141-72-213-197.r.airtel.co.zm.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
201.163.180.183 attackspam
Oct 19 03:45:05 hpm sshd\[14763\]: Invalid user sysbackup from 201.163.180.183
Oct 19 03:45:05 hpm sshd\[14763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.163.180.183
Oct 19 03:45:07 hpm sshd\[14763\]: Failed password for invalid user sysbackup from 201.163.180.183 port 43865 ssh2
Oct 19 03:49:39 hpm sshd\[15122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.163.180.183  user=root
Oct 19 03:49:41 hpm sshd\[15122\]: Failed password for root from 201.163.180.183 port 34796 ssh2
2019-10-19 22:03:35
108.179.224.77 attackbots
fail2ban honeypot
2019-10-19 21:34:18
58.240.52.75 attackbots
2019-10-19T13:04:43.279456abusebot-8.cloudsearch.cf sshd\[9522\]: Invalid user server@2016 from 58.240.52.75 port 51350
2019-10-19T13:04:43.284144abusebot-8.cloudsearch.cf sshd\[9522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.240.52.75
2019-10-19 21:44:46
51.15.249.8 attack
[AUTOMATIC REPORT] - 36 tries in total - SSH BRUTE FORCE - IP banned
2019-10-19 21:57:16
158.69.157.34 attackbotsspam
Oct 18 14:45:58 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 158.69.157.34 port 38733 ssh2 (target: 158.69.100.156:22, password: 654321)
Oct 18 14:45:58 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 158.69.157.34 port 38732 ssh2 (target: 158.69.100.156:22, password: michael)
Oct 18 14:45:58 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 158.69.157.34 port 38731 ssh2 (target: 158.69.100.156:22, password: 1234567890)
Oct 18 14:45:58 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 158.69.157.34 port 38726 ssh2 (target: 158.69.100.156:22, password: master)
Oct 18 14:45:58 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 158.69.157.34 port 38735 ssh2 (target: 158.69.100.156:22, password: superman)
Oct 18 14:45:58 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 158.69.157.34 port 38727 ssh2 (target: 158.69.100.156:22, password: 666666)
Oct 18 14:45:58 wildwolf ssh-honeypotd[26164]: Failed password for........
------------------------------
2019-10-19 21:34:59
95.216.200.106 attackspam
Oct 19 15:02:40 v22019058497090703 sshd[22596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.216.200.106
Oct 19 15:02:42 v22019058497090703 sshd[22596]: Failed password for invalid user nv from 95.216.200.106 port 60586 ssh2
Oct 19 15:06:24 v22019058497090703 sshd[22876]: Failed password for root from 95.216.200.106 port 45390 ssh2
...
2019-10-19 22:07:25
93.163.176.106 attackbotsspam
Automatic report - Banned IP Access
2019-10-19 21:36:07
49.234.24.108 attackspam
Oct 18 19:36:07 pl2server sshd[21512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.24.108  user=r.r
Oct 18 19:36:09 pl2server sshd[21512]: Failed password for r.r from 49.234.24.108 port 56682 ssh2
Oct 18 19:36:10 pl2server sshd[21512]: Received disconnect from 49.234.24.108: 11: Bye Bye [preauth]
Oct 18 19:47:49 pl2server sshd[23313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.24.108  user=r.r
Oct 18 19:47:51 pl2server sshd[23313]: Failed password for r.r from 49.234.24.108 port 48016 ssh2
Oct 18 19:47:51 pl2server sshd[23313]: Received disconnect from 49.234.24.108: 11: Bye Bye [preauth]
Oct 18 19:52:26 pl2server sshd[24096]: Invalid user olivia from 49.234.24.108
Oct 18 19:52:26 pl2server sshd[24096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.24.108


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.23
2019-10-19 21:54:46
222.186.173.180 attackspambots
SSH Brute-Force attacks
2019-10-19 21:50:00
182.72.112.206 attack
Unauthorized connection attempt from IP address 182.72.112.206 on Port 445(SMB)
2019-10-19 22:04:13
119.29.62.104 attack
2019-10-19T15:50:12.541170scmdmz1 sshd\[12333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.62.104  user=root
2019-10-19T15:50:14.914907scmdmz1 sshd\[12333\]: Failed password for root from 119.29.62.104 port 50704 ssh2
2019-10-19T15:55:43.283824scmdmz1 sshd\[12782\]: Invalid user kj from 119.29.62.104 port 58078
...
2019-10-19 22:06:55
104.248.170.45 attack
web-1 [ssh] SSH Attack
2019-10-19 22:16:03
115.74.81.110 attack
Unauthorized connection attempt from IP address 115.74.81.110 on Port 445(SMB)
2019-10-19 22:15:42
177.135.93.227 attackspam
Oct 19 14:24:19 dedicated sshd[18408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.135.93.227  user=root
Oct 19 14:24:20 dedicated sshd[18408]: Failed password for root from 177.135.93.227 port 44808 ssh2
2019-10-19 21:50:33
177.74.239.69 attack
Unauthorized connection attempt from IP address 177.74.239.69 on Port 445(SMB)
2019-10-19 22:06:33

最近上报的IP列表

98.205.102.75 126.30.143.81 81.33.74.102 235.209.50.123
187.170.6.175 29.170.51.148 205.167.204.124 99.181.138.151
210.38.19.35 37.173.144.154 80.131.180.159 86.13.147.203
86.241.30.2 87.68.72.210 239.51.52.16 236.140.56.217
63.195.17.3 250.126.207.106 124.181.198.59 219.189.144.32