必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Singapore

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.128.42.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60199
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;47.128.42.140.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112202 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 05:03:57 CST 2023
;; MSG SIZE  rcvd: 106
HOST信息:
140.42.128.47.in-addr.arpa domain name pointer ec2-47-128-42-140.ap-southeast-1.compute.amazonaws.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.42.128.47.in-addr.arpa	name = ec2-47-128-42-140.ap-southeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
104.236.95.55 attack
Sep 11 22:27:58 vps691689 sshd[3527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.95.55
Sep 11 22:27:59 vps691689 sshd[3527]: Failed password for invalid user teamspeak3 from 104.236.95.55 port 49376 ssh2
...
2019-09-12 04:40:05
114.143.139.38 attackbots
Sep 11 10:05:41 php1 sshd\[21804\]: Invalid user test4 from 114.143.139.38
Sep 11 10:05:41 php1 sshd\[21804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.143.139.38
Sep 11 10:05:43 php1 sshd\[21804\]: Failed password for invalid user test4 from 114.143.139.38 port 44374 ssh2
Sep 11 10:12:42 php1 sshd\[23066\]: Invalid user ftpadmin from 114.143.139.38
Sep 11 10:12:42 php1 sshd\[23066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.143.139.38
2019-09-12 04:30:46
178.128.21.38 attackspam
Sep 11 23:03:18 vps691689 sshd[4187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.21.38
Sep 11 23:03:19 vps691689 sshd[4187]: Failed password for invalid user vboxuser from 178.128.21.38 port 58736 ssh2
...
2019-09-12 05:15:19
110.235.213.102 attackbots
Telnetd brute force attack detected by fail2ban
2019-09-12 04:38:28
104.140.188.2 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2019-09-12 04:52:52
185.18.88.242 attackspam
(mod_security) mod_security (id:230011) triggered by 185.18.88.242 (RU/Russia/-): 5 in the last 3600 secs
2019-09-12 05:11:59
178.156.202.157 attack
2019/09/11 20:57:12 \[error\] 4652\#4652: \*509 open\(\) "/srv/default/cgi-bin/ViewLog.asp" failed \(2: No such file or directory\), client: 178.156.202.157, server: default_server, request: "POST /cgi-bin/ViewLog.asp HTTP/1.1", host: "127.0.0.1"
2019/09/11 20:57:12 \[error\] 4652\#4652: \*510 open\(\) "/srv/default/cgi-bin/ViewLog.asp" failed \(2: No such file or directory\), client: 178.156.202.157, server: default_server, request: "POST /cgi-bin/ViewLog.asp HTTP/1.1", host: "127.0.0.1"
...
2019-09-12 05:13:47
201.174.46.234 attackbots
Sep 11 22:20:47 lnxweb62 sshd[28083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.174.46.234
2019-09-12 05:06:34
49.232.51.237 attackbotsspam
Sep 11 23:09:36 server sshd\[9169\]: Invalid user ts3serv from 49.232.51.237 port 52240
Sep 11 23:09:36 server sshd\[9169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.51.237
Sep 11 23:09:38 server sshd\[9169\]: Failed password for invalid user ts3serv from 49.232.51.237 port 52240 ssh2
Sep 11 23:16:09 server sshd\[21935\]: Invalid user develop from 49.232.51.237 port 49556
Sep 11 23:16:09 server sshd\[21935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.51.237
2019-09-12 04:41:53
85.219.185.50 attack
(sshd) Failed SSH login from 85.219.185.50 (PL/Poland/Silesia/Siemianowice Śląskie/s185pc50.mmj.pl/[AS59958 P.H.U MMJ Marcin Janos]): 1 in the last 3600 secs
2019-09-12 05:01:48
137.74.109.231 attackspambots
137.74.109.231 - - \[11/Sep/2019:20:57:39 +0200\] "POST /wp-login.php HTTP/1.1" 200 2111 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
137.74.109.231 - - \[11/Sep/2019:20:57:39 +0200\] "POST /wp-login.php HTTP/1.1" 200 2092 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-09-12 04:55:43
5.136.243.174 attack
[portscan] Port scan
2019-09-12 05:11:07
177.220.175.9 attack
Sep 11 11:02:17 php1 sshd\[15778\]: Invalid user postgres from 177.220.175.9
Sep 11 11:02:17 php1 sshd\[15778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.220.175.9
Sep 11 11:02:19 php1 sshd\[15778\]: Failed password for invalid user postgres from 177.220.175.9 port 22170 ssh2
Sep 11 11:09:07 php1 sshd\[16498\]: Invalid user minecraft from 177.220.175.9
Sep 11 11:09:07 php1 sshd\[16498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.220.175.9
2019-09-12 05:12:23
82.98.142.9 attackspam
Sep 11 22:40:25 vps01 sshd[7496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.98.142.9
Sep 11 22:40:26 vps01 sshd[7496]: Failed password for invalid user uftp from 82.98.142.9 port 55794 ssh2
2019-09-12 05:02:33
148.70.249.72 attack
Sep 11 10:43:20 php1 sshd\[14072\]: Invalid user 123456 from 148.70.249.72
Sep 11 10:43:20 php1 sshd\[14072\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.249.72
Sep 11 10:43:22 php1 sshd\[14072\]: Failed password for invalid user 123456 from 148.70.249.72 port 42470 ssh2
Sep 11 10:50:26 php1 sshd\[14729\]: Invalid user vncuser123 from 148.70.249.72
Sep 11 10:50:26 php1 sshd\[14729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.249.72
2019-09-12 05:01:22

最近上报的IP列表

141.95.45.223 106.12.31.135 106.12.254.50 106.12.252.226
106.12.243.80 106.12.240.203 106.12.239.147 106.12.235.216
106.12.232.246 54.152.148.170 106.12.194.154 170.150.54.88
106.12.169.133 106.12.170.144 106.12.15.254 106.12.152.172
106.12.148.180 106.119.93.47 106.119.233.152 106.119.210.215