必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Africa

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.147.121.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55433
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.147.121.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 09:14:19 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
54.121.147.41.in-addr.arpa domain name pointer 8ta-147-121-54.telkomadsl.co.za.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.121.147.41.in-addr.arpa	name = 8ta-147-121-54.telkomadsl.co.za.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
163.172.207.104 attackbots
\[2019-09-25 02:51:47\] SECURITY\[1978\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-25T02:51:47.482-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="",SessionID="0x7f9b34358e08",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/49902",ACLName="no_extension_match"
\[2019-09-25 02:55:22\] SECURITY\[1978\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-25T02:55:22.569-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="",SessionID="0x7f9b34358e08",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/51893",ACLName="no_extension_match"
\[2019-09-25 02:59:25\] SECURITY\[1978\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-25T02:59:25.016-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="333011972592277524",SessionID="0x7f9b34358e08",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/61928",ACLName="no_extension_match"
...
2019-09-25 15:18:55
195.170.168.40 attack
Scanning and Vuln Attempts
2019-09-25 15:28:21
125.227.164.62 attackspambots
Sep 25 07:04:30 site3 sshd\[45736\]: Invalid user acira from 125.227.164.62
Sep 25 07:04:30 site3 sshd\[45736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.227.164.62
Sep 25 07:04:32 site3 sshd\[45736\]: Failed password for invalid user acira from 125.227.164.62 port 57272 ssh2
Sep 25 07:08:47 site3 sshd\[45809\]: Invalid user appserver from 125.227.164.62
Sep 25 07:08:47 site3 sshd\[45809\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.227.164.62
...
2019-09-25 15:29:34
95.167.225.81 attack
Sep 25 06:47:07 dedicated sshd[14845]: Invalid user admin from 95.167.225.81 port 55498
2019-09-25 15:44:30
193.32.160.139 attack
SASL Brute Force
2019-09-25 15:51:10
185.254.29.197 attackbots
Sep 25 12:59:12 our-server-hostname postfix/smtpd[12266]: connect from unknown[185.254.29.197]
Sep x@x
Sep x@x
Sep 25 12:59:40 our-server-hostname postfix/smtpd[12266]: 98BAFA400A3: client=unknown[185.254.29.197]
Sep 25 12:59:41 our-server-hostname postfix/smtpd[31253]: D4881A4008D: client=unknown[127.0.0.1], orig_client=unknown[185.254.29.197]
Sep 25 12:59:41 our-server-hostname amavis[32358]: (32358-01) Passed CLEAN, [185.254.29.197] [185.254.29.197] , mail_id: cJhBjbdNn63R, Hhostnames: -, size: 7787, queued_as: D4881A4008D, 141 ms
Sep x@x
Sep x@x
Sep 25 12:59:42 our-server-hostname postfix/smtpd[12266]: 245A6A400A3: client=unknown[185.254.29.197]
Sep 25 12:59:42 our-server-hostname postfix/smtpd[21350]: 965BCA400AA: client=unknown[127.0.0.1], orig_client=unknown[185.254.29.197]
Sep 25 12:59:42 our-server-hostname amavis[24235]: (24235-10) Passed CLEAN, [185.254.29.197] [185.254.29.197] , mail_id: VJCD+OXfvbLs, Hhostnames: -, size: 7730, queued_as: 965BCA400........
-------------------------------
2019-09-25 15:21:14
94.154.18.59 attackbots
Sent mail to target address hacked/leaked from abandonia in 2016
2019-09-25 15:35:52
207.154.209.159 attackbotsspam
Invalid user login from 207.154.209.159 port 36846
2019-09-25 15:40:28
94.231.120.189 attackspambots
Sep 24 18:04:14 hiderm sshd\[18150\]: Invalid user johnathan from 94.231.120.189
Sep 24 18:04:14 hiderm sshd\[18150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.231.120.189
Sep 24 18:04:16 hiderm sshd\[18150\]: Failed password for invalid user johnathan from 94.231.120.189 port 58930 ssh2
Sep 24 18:08:34 hiderm sshd\[18513\]: Invalid user bk from 94.231.120.189
Sep 24 18:08:34 hiderm sshd\[18513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.231.120.189
2019-09-25 15:50:15
138.68.93.14 attackspam
Sep 25 06:52:08 www5 sshd\[47405\]: Invalid user mprint from 138.68.93.14
Sep 25 06:52:08 www5 sshd\[47405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.93.14
Sep 25 06:52:10 www5 sshd\[47405\]: Failed password for invalid user mprint from 138.68.93.14 port 55172 ssh2
...
2019-09-25 15:27:00
62.210.79.53 attackspambots
\[2019-09-25 02:56:46\] SECURITY\[1978\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-25T02:56:46.592-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0530018283827220",SessionID="0x7f9b34358e08",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.79.53/49600",ACLName="no_extension_match"
\[2019-09-25 02:57:56\] SECURITY\[1978\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-25T02:57:56.745-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0540018283827220",SessionID="0x7f9b34044128",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.79.53/60058",ACLName="no_extension_match"
\[2019-09-25 02:59:01\] SECURITY\[1978\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-25T02:59:01.023-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0560018283827220",SessionID="0x7f9b3403d098",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.79.53/49534",ACLName="no_ext
2019-09-25 15:22:41
200.211.250.195 attack
Sep 25 08:14:10 ks10 sshd[19818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.211.250.195 
Sep 25 08:14:12 ks10 sshd[19818]: Failed password for invalid user ubuntu from 200.211.250.195 port 51150 ssh2
...
2019-09-25 15:55:19
222.186.31.144 attackbots
2019-09-25T07:29:14.086205abusebot-8.cloudsearch.cf sshd\[26469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.144  user=root
2019-09-25 15:33:22
220.165.149.147 attack
Unauthorised access (Sep 25) SRC=220.165.149.147 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=16766 TCP DPT=8080 WINDOW=43263 SYN 
Unauthorised access (Sep 23) SRC=220.165.149.147 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=33189 TCP DPT=8080 WINDOW=29755 SYN
2019-09-25 15:30:03
192.254.143.9 attackspam
Scanning and Vuln Attempts
2019-09-25 15:49:25

最近上报的IP列表

179.60.224.59 151.175.249.111 69.161.11.126 149.88.163.33
84.200.0.40 56.53.204.149 68.33.194.53 57.69.192.173
196.200.217.210 93.64.154.178 206.45.110.66 21.161.225.248
213.31.80.126 66.60.174.56 231.186.13.12 222.194.96.227
77.13.51.249 65.99.227.153 24.7.74.62 250.166.174.254