必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Oslo

省份(region): Oslo

国家(country): Norway

运营商(isp): Telenor

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.150.131.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20594
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.150.131.85.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031502 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 16 12:12:07 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
85.131.150.2.in-addr.arpa domain name pointer 2.150.131.85.tmi.telenormobil.no.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
85.131.150.2.in-addr.arpa	name = 2.150.131.85.tmi.telenormobil.no.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
61.219.11.153 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-20 11:54:23
45.76.175.4 attack
Aug 19 11:14:59 lcprod sshd\[13469\]: Invalid user mihai from 45.76.175.4
Aug 19 11:14:59 lcprod sshd\[13469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.76.175.4
Aug 19 11:15:01 lcprod sshd\[13469\]: Failed password for invalid user mihai from 45.76.175.4 port 59892 ssh2
Aug 19 11:19:05 lcprod sshd\[13870\]: Invalid user bow from 45.76.175.4
Aug 19 11:19:05 lcprod sshd\[13870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.76.175.4
2019-08-20 11:14:54
58.213.198.77 attackbots
$f2bV_matches
2019-08-20 11:15:28
51.77.52.216 attackspambots
Automated report - ssh fail2ban:
Aug 20 05:01:15 wrong password, user=root, port=35185, ssh2
Aug 20 05:01:18 wrong password, user=root, port=35185, ssh2
Aug 20 05:01:21 wrong password, user=root, port=35185, ssh2
2019-08-20 11:20:14
182.61.166.179 attackspam
2019-08-19T22:08:19.496751abusebot-3.cloudsearch.cf sshd\[2808\]: Invalid user 123456 from 182.61.166.179 port 49400
2019-08-20 11:34:04
167.99.15.245 attackspam
Automatic report - Banned IP Access
2019-08-20 11:18:59
89.104.76.42 attackspam
Aug 19 20:52:30 MK-Soft-VM6 sshd\[16881\]: Invalid user jboss from 89.104.76.42 port 55828
Aug 19 20:52:30 MK-Soft-VM6 sshd\[16881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.104.76.42
Aug 19 20:52:32 MK-Soft-VM6 sshd\[16881\]: Failed password for invalid user jboss from 89.104.76.42 port 55828 ssh2
...
2019-08-20 12:01:29
46.251.239.17 attack
SSH-BruteForce
2019-08-20 11:43:54
88.244.204.5 attack
Automatic report - Port Scan Attack
2019-08-20 11:59:46
152.136.87.219 attackspam
2019-08-20T05:38:20.986197  sshd[10988]: Invalid user rock from 152.136.87.219 port 54836
2019-08-20T05:38:21.001279  sshd[10988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.87.219
2019-08-20T05:38:20.986197  sshd[10988]: Invalid user rock from 152.136.87.219 port 54836
2019-08-20T05:38:22.876483  sshd[10988]: Failed password for invalid user rock from 152.136.87.219 port 54836 ssh2
2019-08-20T05:43:24.151236  sshd[11055]: Invalid user ubuntu from 152.136.87.219 port 43692
...
2019-08-20 12:03:11
91.121.211.59 attackbots
Aug 19 11:48:47 hiderm sshd\[32344\]: Invalid user dkauffman from 91.121.211.59
Aug 19 11:48:47 hiderm sshd\[32344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns364518.ip-91-121-211.eu
Aug 19 11:48:49 hiderm sshd\[32344\]: Failed password for invalid user dkauffman from 91.121.211.59 port 33710 ssh2
Aug 19 11:52:42 hiderm sshd\[32632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns364518.ip-91-121-211.eu  user=root
Aug 19 11:52:44 hiderm sshd\[32632\]: Failed password for root from 91.121.211.59 port 50452 ssh2
2019-08-20 12:06:03
119.235.24.244 attack
Aug 19 23:19:29 plusreed sshd[21358]: Invalid user kriszti from 119.235.24.244
...
2019-08-20 11:24:46
206.81.29.86 attackspambots
Spam trapped
2019-08-20 11:50:38
195.24.205.214 attackbots
Aug 19 17:55:39 lcprod sshd\[22048\]: Invalid user altibase from 195.24.205.214
Aug 19 17:55:39 lcprod sshd\[22048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.24.205.214
Aug 19 17:55:40 lcprod sshd\[22048\]: Failed password for invalid user altibase from 195.24.205.214 port 36076 ssh2
Aug 19 18:00:49 lcprod sshd\[22575\]: Invalid user user from 195.24.205.214
Aug 19 18:00:49 lcprod sshd\[22575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.24.205.214
2019-08-20 12:07:32
191.81.249.161 attackspambots
Unauthorised access (Aug 19) SRC=191.81.249.161 LEN=40 TOS=0x10 PREC=0x40 TTL=53 ID=31212 TCP DPT=8080 WINDOW=49401 SYN
2019-08-20 11:40:01

最近上报的IP列表

202.248.86.63 15.165.251.133 58.12.20.23 194.13.209.210
222.158.4.160 120.59.91.8 145.89.243.255 88.106.173.108
214.237.55.32 195.197.72.183 234.13.215.63 74.142.60.56
51.202.143.57 153.16.98.233 39.255.41.88 129.12.151.18
43.59.218.74 65.216.229.220 134.51.246.161 70.88.154.24