必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Finstadjordet

省份(region): Viken

国家(country): Norway

运营商(isp): Telenor

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.148.28.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23145
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.148.28.103.			IN	A

;; AUTHORITY SECTION:
.			541	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020061801 1800 900 604800 86400

;; Query time: 113 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 19 08:01:55 CST 2020
;; MSG SIZE  rcvd: 116
HOST信息:
103.28.148.2.in-addr.arpa domain name pointer 2.148.28.103.tmi.telenormobil.no.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
103.28.148.2.in-addr.arpa	name = 2.148.28.103.tmi.telenormobil.no.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.13.184.234 attackspambots
Jun 20 23:55:35 Tower sshd[19592]: Connection from 106.13.184.234 port 32898 on 192.168.10.220 port 22 rdomain ""
Jun 20 23:55:38 Tower sshd[19592]: Failed password for root from 106.13.184.234 port 32898 ssh2
Jun 20 23:55:38 Tower sshd[19592]: Received disconnect from 106.13.184.234 port 32898:11: Bye Bye [preauth]
Jun 20 23:55:38 Tower sshd[19592]: Disconnected from authenticating user root 106.13.184.234 port 32898 [preauth]
2020-06-21 14:54:47
222.186.175.23 attackspam
Jun 21 07:05:54 scw-6657dc sshd[5764]: Failed password for root from 222.186.175.23 port 47010 ssh2
Jun 21 07:05:54 scw-6657dc sshd[5764]: Failed password for root from 222.186.175.23 port 47010 ssh2
Jun 21 07:05:56 scw-6657dc sshd[5764]: Failed password for root from 222.186.175.23 port 47010 ssh2
...
2020-06-21 15:06:56
106.13.191.132 attackspam
Invalid user kumar from 106.13.191.132 port 53540
2020-06-21 15:06:20
72.167.224.135 attackspambots
Invalid user printer from 72.167.224.135 port 50284
2020-06-21 14:57:07
171.244.36.124 attack
Invalid user sow from 171.244.36.124 port 56292
2020-06-21 14:58:31
178.32.221.142 attackbots
Invalid user cjp from 178.32.221.142 port 39561
2020-06-21 14:42:29
198.27.82.155 attackspambots
$f2bV_matches
2020-06-21 15:10:53
185.244.0.165 attack
Excessive Port-Scanning
2020-06-21 15:12:07
43.226.45.195 attack
Unauthorised access (Jun 21) SRC=43.226.45.195 LEN=40 TTL=242 ID=1284 TCP DPT=445 WINDOW=1024 SYN
2020-06-21 14:41:31
198.27.81.94 attack
198.27.81.94 - - [21/Jun/2020:07:57:42 +0100] "POST /wp-login.php HTTP/1.1" 200 6175 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
198.27.81.94 - - [21/Jun/2020:07:58:44 +0100] "POST /wp-login.php HTTP/1.1" 200 6175 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
198.27.81.94 - - [21/Jun/2020:08:00:12 +0100] "POST /wp-login.php HTTP/1.1" 200 6175 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-06-21 15:08:36
192.81.208.44 attack
$f2bV_matches
2020-06-21 15:11:39
104.129.5.49 attackspambots
SSH login attempts.
2020-06-21 15:14:41
82.102.173.84 attack
firewall-block, port(s): 280/tcp
2020-06-21 14:39:33
49.232.152.3 attackbotsspam
Invalid user admin from 49.232.152.3 port 38488
2020-06-21 15:02:14
49.88.148.59 attackbots
Port probing on unauthorized port 23
2020-06-21 15:13:31

最近上报的IP列表

199.96.39.234 78.247.46.224 174.193.247.187 32.137.237.95
49.79.146.74 189.46.101.75 177.207.189.183 143.107.176.138
221.217.189.221 2.119.76.130 54.188.171.189 142.11.209.152
165.65.108.16 188.87.185.229 32.90.114.165 121.113.226.10
204.232.120.244 171.242.121.38 40.247.155.85 103.104.119.141