必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 252.147.203.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37860
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;252.147.203.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 09:13:29 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 21.203.147.252.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.203.147.252.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
91.143.171.138 attackbotsspam
port scan and connect, tcp 23 (telnet)
2019-10-14 19:22:37
49.235.107.14 attackspam
Oct 14 10:03:50 MK-Soft-VM6 sshd[1050]: Failed password for root from 49.235.107.14 port 46325 ssh2
...
2019-10-14 19:29:11
51.255.42.250 attack
$f2bV_matches
2019-10-14 19:18:50
49.234.42.79 attack
Lines containing failures of 49.234.42.79
Oct 14 02:33:57 nextcloud sshd[4395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.42.79  user=r.r
Oct 14 02:33:59 nextcloud sshd[4395]: Failed password for r.r from 49.234.42.79 port 43005 ssh2
Oct 14 02:33:59 nextcloud sshd[4395]: Received disconnect from 49.234.42.79 port 43005:11: Bye Bye [preauth]
Oct 14 02:33:59 nextcloud sshd[4395]: Disconnected from authenticating user r.r 49.234.42.79 port 43005 [preauth]
Oct 14 02:46:39 nextcloud sshd[6042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.42.79  user=r.r
Oct 14 02:46:40 nextcloud sshd[6042]: Failed password for r.r from 49.234.42.79 port 49343 ssh2
Oct 14 02:46:40 nextcloud sshd[6042]: Received disconnect from 49.234.42.79 port 49343:11: Bye Bye [preauth]
Oct 14 02:46:40 nextcloud sshd[6042]: Disconnected from authenticating user r.r 49.234.42.79 port 49343 [preauth]
Oct 14 ........
------------------------------
2019-10-14 19:11:04
117.135.131.123 attackbots
$f2bV_matches
2019-10-14 19:10:04
222.186.175.148 attack
Oct 14 13:00:50 herz-der-gamer sshd[4591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
Oct 14 13:00:52 herz-der-gamer sshd[4591]: Failed password for root from 222.186.175.148 port 1278 ssh2
...
2019-10-14 19:09:45
78.188.224.4 attackbots
Honeypot attack, port: 445, PTR: 78.188.224.4.static.ttnet.com.tr.
2019-10-14 19:30:59
36.90.7.65 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 14-10-2019 04:45:19.
2019-10-14 19:38:56
35.184.159.30 attackspambots
2019-10-14T04:31:26.363871abusebot-8.cloudsearch.cf sshd\[20441\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=30.159.184.35.bc.googleusercontent.com  user=root
2019-10-14 19:31:29
84.254.28.47 attack
Oct 13 23:57:01 lvps87-230-18-106 sshd[16147]: reveeclipse mapping checking getaddrinfo for ipa47.28.tellas.gr [84.254.28.47] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 13 23:57:01 lvps87-230-18-106 sshd[16147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.254.28.47  user=r.r
Oct 13 23:57:03 lvps87-230-18-106 sshd[16147]: Failed password for r.r from 84.254.28.47 port 51581 ssh2
Oct 13 23:57:03 lvps87-230-18-106 sshd[16147]: Received disconnect from 84.254.28.47: 11: Bye Bye [preauth]
Oct 14 00:07:05 lvps87-230-18-106 sshd[16248]: reveeclipse mapping checking getaddrinfo for ipa47.28.tellas.gr [84.254.28.47] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 14 00:07:05 lvps87-230-18-106 sshd[16248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.254.28.47  user=r.r
Oct 14 00:07:07 lvps87-230-18-106 sshd[16248]: Failed password for r.r from 84.254.28.47 port 56090 ssh2
Oct 14 00:07:07 lvps87-230........
-------------------------------
2019-10-14 19:30:41
51.140.202.20 attackspambots
RDP Bruteforce
2019-10-14 19:28:39
134.73.76.16 attack
Oct 14 05:31:53 tux postfix/smtpd[8764]: connect from chop.juntosms.com[134.73.76.16]
Oct x@x
Oct 14 05:31:53 tux postfix/smtpd[8764]: disconnect from chop.juntosms.com[134.73.76.16]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=134.73.76.16
2019-10-14 19:25:25
51.254.37.192 attackspambots
Oct 14 05:40:07 xtremcommunity sshd\[506077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.37.192  user=root
Oct 14 05:40:09 xtremcommunity sshd\[506077\]: Failed password for root from 51.254.37.192 port 59238 ssh2
Oct 14 05:43:56 xtremcommunity sshd\[506163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.37.192  user=root
Oct 14 05:43:58 xtremcommunity sshd\[506163\]: Failed password for root from 51.254.37.192 port 42018 ssh2
Oct 14 05:47:47 xtremcommunity sshd\[506250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.37.192  user=root
...
2019-10-14 19:02:36
81.182.246.50 attackbots
Automatic report - Port Scan Attack
2019-10-14 19:24:17
109.129.78.127 attack
2019-10-14T10:15:10.305579homeassistant sshd[16555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.129.78.127  user=root
2019-10-14T10:15:12.047670homeassistant sshd[16555]: Failed password for root from 109.129.78.127 port 51790 ssh2
...
2019-10-14 19:12:07

最近上报的IP列表

23.104.6.42 119.56.193.14 117.79.63.16 54.34.8.186
190.244.109.67 7.171.96.218 163.105.101.205 201.89.176.16
228.147.123.191 203.38.162.190 62.189.69.14 51.68.196.117
100.5.32.133 241.196.172.181 213.223.129.181 96.222.156.211
244.44.127.121 226.242.156.47 125.171.62.178 70.184.18.157