必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Glendale

省份(region): California

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Charter Communications

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.232.139.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38000
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;47.232.139.66.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052500 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat May 25 22:13:27 CST 2019
;; MSG SIZE  rcvd: 117

HOST信息:
66.139.232.47.in-addr.arpa domain name pointer 047-232-139-066.res.spectrum.com.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
66.139.232.47.in-addr.arpa	name = 047-232-139-066.res.spectrum.com.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
150.223.0.8 attackbotsspam
Jul 22 19:38:01 nandi sshd[30783]: Invalid user ze from 150.223.0.8
Jul 22 19:38:01 nandi sshd[30783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.0.8 
Jul 22 19:38:03 nandi sshd[30783]: Failed password for invalid user ze from 150.223.0.8 port 34457 ssh2
Jul 22 19:38:03 nandi sshd[30783]: Received disconnect from 150.223.0.8: 11: Bye Bye [preauth]
Jul 22 19:41:37 nandi sshd[32760]: Connection closed by 150.223.0.8 [preauth]
Jul 22 19:47:23 nandi sshd[3455]: Connection closed by 150.223.0.8 [preauth]
Jul 22 19:49:03 nandi sshd[4215]: Invalid user photos from 150.223.0.8
Jul 22 19:49:03 nandi sshd[4215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.0.8 
Jul 22 19:49:05 nandi sshd[4215]: Failed password for invalid user photos from 150.223.0.8 port 48395 ssh2
Jul 22 19:49:06 nandi sshd[4215]: Received disconnect from 150.223.0.8: 11: Bye Bye [preauth]
Jul 22 19:51:14 nan........
-------------------------------
2019-07-23 17:17:50
212.7.222.198 attackbots
Spam mails sent to address hacked/leaked from Nexus Mods in July 2013
2019-07-23 18:13:32
51.38.80.173 attack
Invalid user apache from 51.38.80.173 port 59572
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.80.173
Failed password for invalid user apache from 51.38.80.173 port 59572 ssh2
Invalid user radik from 51.38.80.173 port 56260
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.80.173
2019-07-23 17:45:13
205.144.208.246 attackspambots
scan z
2019-07-23 17:27:40
115.84.121.80 attackbotsspam
Jul 23 12:12:55 meumeu sshd[27763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.84.121.80 
Jul 23 12:12:57 meumeu sshd[27763]: Failed password for invalid user dbms from 115.84.121.80 port 35184 ssh2
Jul 23 12:17:37 meumeu sshd[10097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.84.121.80 
...
2019-07-23 18:17:52
129.204.67.235 attack
SSH/22 MH Probe, BF, Hack -
2019-07-23 17:23:53
123.26.166.22 attackspam
Automatic report - Port Scan Attack
2019-07-23 18:25:24
200.60.91.42 attack
23.07.2019 09:52:44 SSH access blocked by firewall
2019-07-23 17:56:41
182.254.145.29 attackspambots
Jul 23 05:08:29 aat-srv002 sshd[8050]: Failed password for root from 182.254.145.29 port 60376 ssh2
Jul 23 05:12:51 aat-srv002 sshd[8144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.145.29
Jul 23 05:12:52 aat-srv002 sshd[8144]: Failed password for invalid user git from 182.254.145.29 port 49383 ssh2
...
2019-07-23 18:23:59
2.61.131.225 attack
2019-07-22 18:06:36 H=([2.61.176.88]) [2.61.131.225]:59829 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.11) (https://www.spamhaus.org/query/ip/2.61.131.225)
2019-07-22 18:11:41 H=([2.61.176.88]) [2.61.131.225]:8483 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.11) (https://www.spamhaus.org/query/ip/2.61.131.225)
2019-07-22 18:11:41 H=([2.61.176.88]) [2.61.131.225]:56018 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.11) (https://www.spamhaus.org/query/ip/2.61.131.225)
...
2019-07-23 17:24:31
221.162.255.78 attackbots
2019-07-23T06:23:35.806599mizuno.rwx.ovh sshd[1975]: Connection from 221.162.255.78 port 44342 on 78.46.61.178 port 22
2019-07-23T06:23:50.669604mizuno.rwx.ovh sshd[1975]: Invalid user farah from 221.162.255.78 port 44342
2019-07-23T06:23:50.679195mizuno.rwx.ovh sshd[1975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.162.255.78
2019-07-23T06:23:35.806599mizuno.rwx.ovh sshd[1975]: Connection from 221.162.255.78 port 44342 on 78.46.61.178 port 22
2019-07-23T06:23:50.669604mizuno.rwx.ovh sshd[1975]: Invalid user farah from 221.162.255.78 port 44342
2019-07-23T06:23:53.063570mizuno.rwx.ovh sshd[1975]: Failed password for invalid user farah from 221.162.255.78 port 44342 ssh2
...
2019-07-23 17:34:36
128.199.69.86 attack
Jul 23 11:23:47 MK-Soft-Root1 sshd\[15611\]: Invalid user www from 128.199.69.86 port 52936
Jul 23 11:23:47 MK-Soft-Root1 sshd\[15611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.69.86
Jul 23 11:23:49 MK-Soft-Root1 sshd\[15611\]: Failed password for invalid user www from 128.199.69.86 port 52936 ssh2
...
2019-07-23 17:36:20
54.38.18.211 attack
Jul 23 11:22:27 * sshd[30390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.18.211
Jul 23 11:22:30 * sshd[30390]: Failed password for invalid user user1 from 54.38.18.211 port 39938 ssh2
2019-07-23 18:09:18
175.198.81.71 attack
Jul 23 11:23:09 vps647732 sshd[14442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.198.81.71
Jul 23 11:23:11 vps647732 sshd[14442]: Failed password for invalid user search from 175.198.81.71 port 34786 ssh2
...
2019-07-23 17:55:19
189.114.35.126 attack
Jul 22 22:01:42 amida sshd[227047]: reveeclipse mapping checking getaddrinfo for 189.114.35.126.static.host.gvt.net.br [189.114.35.126] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 22 22:01:42 amida sshd[227047]: Invalid user server from 189.114.35.126
Jul 22 22:01:42 amida sshd[227047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.114.35.126 
Jul 22 22:01:44 amida sshd[227047]: Failed password for invalid user server from 189.114.35.126 port 52486 ssh2
Jul 22 22:01:44 amida sshd[227047]: Received disconnect from 189.114.35.126: 11: Bye Bye [preauth]
Jul 22 22:10:10 amida sshd[229648]: reveeclipse mapping checking getaddrinfo for 189.114.35.126.static.host.gvt.net.br [189.114.35.126] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 22 22:10:10 amida sshd[229648]: Invalid user vnc from 189.114.35.126
Jul 22 22:10:10 amida sshd[229648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.114.35.126 
........
-------------------------------
2019-07-23 17:23:16

最近上报的IP列表

141.83.67.162 183.143.63.158 79.252.88.33 143.30.201.218
143.191.133.150 209.151.202.174 223.167.202.180 201.20.86.229
63.188.124.118 41.40.228.145 31.131.244.81 35.222.128.82
182.170.203.218 107.174.9.87 66.98.55.72 177.170.99.64
148.81.73.251 185.141.121.166 208.133.189.227 74.234.63.175