必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Africa

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.132.247.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4321
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.132.247.2.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 11:04:19 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 2.247.132.41.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.247.132.41.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
77.21.167.105 attackbots
Lines containing failures of 77.21.167.105 (max 1000)
Oct  6 21:10:32 localhost sshd[2076]: User r.r from 77.21.167.105 not allowed because listed in DenyUsers
Oct  6 21:10:32 localhost sshd[2076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.21.167.105  user=r.r
Oct  6 21:10:34 localhost sshd[2076]: Failed password for invalid user r.r from 77.21.167.105 port 56071 ssh2
Oct  6 21:10:36 localhost sshd[2076]: Received disconnect from 77.21.167.105 port 56071:11: Bye Bye [preauth]
Oct  6 21:10:36 localhost sshd[2076]: Disconnected from invalid user r.r 77.21.167.105 port 56071 [preauth]
Oct  6 21:23:08 localhost sshd[4583]: User r.r from 77.21.167.105 not allowed because listed in DenyUsers
Oct  6 21:23:08 localhost sshd[4583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.21.167.105  user=r.r
Oct  6 21:23:10 localhost sshd[4583]: Failed password for invalid user r.r from 77.21.167.1........
------------------------------
2020-10-08 00:28:05
36.103.222.28 attack
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-08 01:01:58
194.61.27.245 attack
TCP port : 3389
2020-10-08 00:39:40
2.229.94.237 attackbotsspam
(smtpauth) Failed SMTP AUTH login from 2.229.94.237 (IT/Italy/2-229-94-237.ip196.fastwebnet.it): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-10-07 00:10:33 login authenticator failed for 2-229-94-237.ip196.fastwebnet.it ([127.0.0.1]) [2.229.94.237]: 535 Incorrect authentication data (set_id=a.m.bekhradi@srooyesh.com)
2020-10-08 00:45:55
87.98.182.93 attack
$f2bV_matches
2020-10-08 00:33:41
117.83.83.235 attack
Oct  7 18:20:38 vm1 sshd[29351]: Failed password for root from 117.83.83.235 port 53266 ssh2
...
2020-10-08 00:38:46
106.13.147.89 attackspambots
sshd: Failed password for .... from 106.13.147.89 port 33094 ssh2
2020-10-08 00:24:45
222.221.248.242 attackspam
Repeated brute force against a port
2020-10-08 00:25:14
123.206.26.133 attackbots
[ssh] SSH attack
2020-10-08 00:51:05
94.74.160.77 attackbots
Attempted Brute Force (dovecot)
2020-10-08 00:44:40
192.241.214.142 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-10-08 01:02:48
152.32.175.24 attackbots
Oct  7 13:15:53 vm1 sshd[23622]: Failed password for root from 152.32.175.24 port 36752 ssh2
...
2020-10-08 00:33:21
201.234.53.178 attackspam
Port scan on 1 port(s): 445
2020-10-08 00:46:32
185.55.242.31 attackbotsspam
Lines containing failures of 185.55.242.31
Oct  6 18:15:18 srv02 postfix/smtpd[23160]: connect from unknown[185.55.242.31]
Oct x@x
Oct  6 18:15:18 srv02 postfix/smtpd[23160]: disconnect from unknown[185.55.242.31] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5
Oct  6 22:36:52 srv02 postfix/smtpd[7817]: connect from unknown[185.55.242.31]
Oct x@x
Oct  6 22:36:52 srv02 postfix/smtpd[7817]: disconnect from unknown[185.55.242.31] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5
Oct  6 22:36:56 srv02 postfix/smtpd[7817]: connect from unknown[185.55.242.31]
Oct x@x
Oct  6 22:36:56 srv02 postfix/smtpd[7817]: disconnect from unknown[185.55.242.31] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5
Oct  6 22:36:58 srv02 postfix/smtpd[7817]: connect from unknown[185.55.242.31]
Oct x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=185.55.242.31
2020-10-08 00:38:32
45.129.33.24 attackspambots
[MK-Root1] Blocked by UFW
2020-10-08 00:28:56

最近上报的IP列表

9.88.52.27 14.169.13.232 41.159.205.249 135.179.237.218
4.29.171.113 57.127.56.73 44.163.131.124 12.100.244.230
22.197.31.8 154.186.250.128 115.92.31.115 95.175.151.168
20.190.217.5 236.179.206.122 231.119.97.231 41.157.5.55
65.41.142.133 78.6.122.205 78.184.189.96 219.97.45.1