必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Norway

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.151.180.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27390
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.151.180.48.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 07:52:37 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
48.180.151.2.in-addr.arpa domain name pointer 2.151.180.48.tmi.telenormobil.no.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.180.151.2.in-addr.arpa	name = 2.151.180.48.tmi.telenormobil.no.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.203.225.168 attack
Unauthorized connection attempt from IP address 103.203.225.168 on Port 445(SMB)
2020-06-26 20:11:18
185.176.27.210 attackspam
06/26/2020-08:08:15.521946 185.176.27.210 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-06-26 20:08:24
95.85.24.147 attackspam
Brute force attempt
2020-06-26 19:33:01
121.100.18.82 attackspam
Unauthorized connection attempt from IP address 121.100.18.82 on Port 445(SMB)
2020-06-26 20:03:17
185.156.73.38 attackspambots
 TCP (SYN) 185.156.73.38:46884 -> port 3389, len 44
2020-06-26 19:43:11
222.190.145.130 attackbotsspam
Jun 26 12:04:20 onepixel sshd[3612656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.190.145.130 
Jun 26 12:04:20 onepixel sshd[3612656]: Invalid user andy from 222.190.145.130 port 52911
Jun 26 12:04:22 onepixel sshd[3612656]: Failed password for invalid user andy from 222.190.145.130 port 52911 ssh2
Jun 26 12:06:49 onepixel sshd[3614894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.190.145.130  user=root
Jun 26 12:06:51 onepixel sshd[3614894]: Failed password for root from 222.190.145.130 port 39398 ssh2
2020-06-26 20:08:10
196.52.43.62 attackspambots
Metasploit VxWorks WDB Agent Scanner Detection
2020-06-26 19:46:56
124.123.115.115 attackspambots
Unauthorized connection attempt from IP address 124.123.115.115 on Port 445(SMB)
2020-06-26 19:38:44
43.229.75.111 attackspam
Unauthorized connection attempt from IP address 43.229.75.111 on Port 445(SMB)
2020-06-26 20:05:13
202.28.250.66 attack
202.28.250.66 - - [26/Jun/2020:13:29:49 +0200] "POST /xmlrpc.php HTTP/1.1" 403 31 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
202.28.250.66 - - [26/Jun/2020:13:30:26 +0200] "POST /xmlrpc.php HTTP/1.1" 403 12355 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-26 19:40:40
51.77.146.156 attackspam
Jun 26 08:20:23 firewall sshd[3965]: Failed password for invalid user carlos from 51.77.146.156 port 49468 ssh2
Jun 26 08:24:03 firewall sshd[4040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.146.156  user=backup
Jun 26 08:24:05 firewall sshd[4040]: Failed password for backup from 51.77.146.156 port 48124 ssh2
...
2020-06-26 19:32:02
36.7.170.104 attackbots
2020-06-26T11:29:22.342067mail.csmailer.org sshd[3130]: Invalid user mouse from 36.7.170.104 port 37520
2020-06-26T11:29:22.347132mail.csmailer.org sshd[3130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.7.170.104
2020-06-26T11:29:22.342067mail.csmailer.org sshd[3130]: Invalid user mouse from 36.7.170.104 port 37520
2020-06-26T11:29:24.362829mail.csmailer.org sshd[3130]: Failed password for invalid user mouse from 36.7.170.104 port 37520 ssh2
2020-06-26T11:32:51.712352mail.csmailer.org sshd[3900]: Invalid user gisele from 36.7.170.104 port 36840
...
2020-06-26 19:39:40
76.14.234.172 attackspambots
Attempted to connect 3 times to port 22 TCP
2020-06-26 20:04:22
46.38.150.132 attackbotsspam
Jun 26 13:00:06 mail postfix/smtpd\[15034\]: warning: unknown\[46.38.150.132\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun 26 13:30:17 mail postfix/smtpd\[16155\]: warning: unknown\[46.38.150.132\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun 26 13:30:51 mail postfix/smtpd\[16461\]: warning: unknown\[46.38.150.132\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun 26 13:31:28 mail postfix/smtpd\[16461\]: warning: unknown\[46.38.150.132\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-06-26 19:36:02
159.203.35.141 attackbots
2020-06-26T13:24:00.920693vps751288.ovh.net sshd\[13370\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.35.141  user=root
2020-06-26T13:24:02.730913vps751288.ovh.net sshd\[13370\]: Failed password for root from 159.203.35.141 port 37646 ssh2
2020-06-26T13:30:09.879913vps751288.ovh.net sshd\[13444\]: Invalid user lighttpd from 159.203.35.141 port 50598
2020-06-26T13:30:09.889579vps751288.ovh.net sshd\[13444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.35.141
2020-06-26T13:30:11.689641vps751288.ovh.net sshd\[13444\]: Failed password for invalid user lighttpd from 159.203.35.141 port 50598 ssh2
2020-06-26 20:07:36

最近上报的IP列表

5.148.213.112 141.203.232.7 97.70.83.163 142.131.148.158
73.153.140.146 155.252.220.30 213.146.49.23 50.131.212.0
211.195.183.206 37.176.52.109 24.29.127.44 129.120.253.198
160.66.11.184 108.56.233.172 51.43.115.71 100.199.16.73
226.56.7.227 174.181.164.111 152.142.133.131 187.58.177.105