必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): Virginia

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.253.139.165
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21162
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;47.253.139.165.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 10:46:11 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 165.139.253.47.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 165.139.253.47.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
60.50.29.149 attackbots
Jun  9 16:19:57 localhost sshd[3626211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.50.29.149  user=r.r
Jun  9 16:19:59 localhost sshd[3626211]: Failed password for r.r from 60.50.29.149 port 58914 ssh2
Jun  9 16:27:52 localhost sshd[3629092]: Invalid user wolfman from 60.50.29.149 port 50818
Jun  9 16:27:52 localhost sshd[3629092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.50.29.149 
Jun  9 16:27:52 localhost sshd[3629092]: Invalid user wolfman from 60.50.29.149 port 50818
Jun  9 16:27:54 localhost sshd[3629092]: Failed password for invalid user wolfman from 60.50.29.149 port 50818 ssh2
Jun  9 16:31:38 localhost sshd[3630811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.50.29.149  user=r.r
Jun  9 16:31:40 localhost sshd[3630811]: Failed password for r.r from 60.50.29.149 port 59430 ssh2
Jun  9 16:35:25 localhost sshd[3632733]: I........
------------------------------
2020-06-12 08:33:26
62.210.80.34 attackspambots
0,13-01/01 [bc01/m261] PostRequest-Spammer scoring: berlin
2020-06-12 08:17:47
202.168.205.181 attackspambots
Fail2Ban Ban Triggered (2)
2020-06-12 08:15:58
122.51.255.33 attackspam
Jun 12 00:17:50 serwer sshd\[32709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.255.33  user=admin
Jun 12 00:17:52 serwer sshd\[32709\]: Failed password for admin from 122.51.255.33 port 30065 ssh2
Jun 12 00:26:19 serwer sshd\[1208\]: Invalid user vrouwerff from 122.51.255.33 port 56408
Jun 12 00:26:19 serwer sshd\[1208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.255.33
...
2020-06-12 08:36:55
46.38.145.6 attack
Jun 12 02:07:23 srv01 postfix/smtpd\[6826\]: warning: unknown\[46.38.145.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 12 02:07:41 srv01 postfix/smtpd\[1864\]: warning: unknown\[46.38.145.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 12 02:07:54 srv01 postfix/smtpd\[6826\]: warning: unknown\[46.38.145.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 12 02:08:20 srv01 postfix/smtpd\[11268\]: warning: unknown\[46.38.145.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 12 02:08:55 srv01 postfix/smtpd\[11268\]: warning: unknown\[46.38.145.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-12 08:15:40
103.17.39.26 attackspam
Jun  9 18:16:29 lamijardin sshd[9292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.17.39.26  user=r.r
Jun  9 18:16:32 lamijardin sshd[9292]: Failed password for r.r from 103.17.39.26 port 42854 ssh2
Jun  9 18:16:32 lamijardin sshd[9292]: Received disconnect from 103.17.39.26 port 42854:11: Bye Bye [preauth]
Jun  9 18:16:32 lamijardin sshd[9292]: Disconnected from 103.17.39.26 port 42854 [preauth]
Jun  9 18:17:43 lamijardin sshd[9297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.17.39.26  user=r.r
Jun  9 18:17:45 lamijardin sshd[9297]: Failed password for r.r from 103.17.39.26 port 58420 ssh2
Jun  9 18:17:46 lamijardin sshd[9297]: Received disconnect from 103.17.39.26 port 58420:11: Bye Bye [preauth]
Jun  9 18:17:46 lamijardin sshd[9297]: Disconnected from 103.17.39.26 port 58420 [preauth]
Jun  9 18:18:46 lamijardin sshd[9318]: Invalid user girl from 103.17.39.26
Jun  9 18:18:........
-------------------------------
2020-06-12 08:27:02
222.186.31.166 attackspam
Jun 12 01:07:21 rocket sshd[9401]: Failed password for root from 222.186.31.166 port 60660 ssh2
Jun 12 01:07:30 rocket sshd[9403]: Failed password for root from 222.186.31.166 port 37904 ssh2
...
2020-06-12 08:08:44
117.7.223.22 attack
Automatic report - Port Scan Attack
2020-06-12 08:26:24
46.7.233.216 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-06-12 08:03:32
124.239.218.188 attackbots
web-1 [ssh] SSH Attack
2020-06-12 07:59:46
2.90.148.252 attack
Unauthorized connection attempt from IP address 2.90.148.252 on Port 445(SMB)
2020-06-12 08:16:39
82.149.13.45 attack
Jun 12 00:19:55 ovpn sshd\[29478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.149.13.45  user=root
Jun 12 00:19:56 ovpn sshd\[29478\]: Failed password for root from 82.149.13.45 port 34422 ssh2
Jun 12 00:26:42 ovpn sshd\[19278\]: Invalid user teamspeak3 from 82.149.13.45
Jun 12 00:26:42 ovpn sshd\[19278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.149.13.45
Jun 12 00:26:44 ovpn sshd\[19278\]: Failed password for invalid user teamspeak3 from 82.149.13.45 port 43338 ssh2
2020-06-12 08:17:26
212.145.192.205 attackspam
Jun 12 00:22:54 MainVPS sshd[13976]: Invalid user pass from 212.145.192.205 port 57404
Jun 12 00:22:54 MainVPS sshd[13976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.192.205
Jun 12 00:22:54 MainVPS sshd[13976]: Invalid user pass from 212.145.192.205 port 57404
Jun 12 00:22:56 MainVPS sshd[13976]: Failed password for invalid user pass from 212.145.192.205 port 57404 ssh2
Jun 12 00:27:07 MainVPS sshd[17452]: Invalid user admin from 212.145.192.205 port 47476
...
2020-06-12 07:59:02
51.38.186.244 attackspambots
Jun 11 23:50:44 ip-172-31-61-156 sshd[20881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.244
Jun 11 23:50:44 ip-172-31-61-156 sshd[20881]: Invalid user admin from 51.38.186.244
Jun 11 23:50:46 ip-172-31-61-156 sshd[20881]: Failed password for invalid user admin from 51.38.186.244 port 53664 ssh2
Jun 11 23:53:54 ip-172-31-61-156 sshd[21012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.244  user=root
Jun 11 23:53:57 ip-172-31-61-156 sshd[21012]: Failed password for root from 51.38.186.244 port 54104 ssh2
...
2020-06-12 08:36:10
184.71.9.2 attackspam
Jun 12 01:42:27 electroncash sshd[53511]: Failed password for invalid user postgres from 184.71.9.2 port 34434 ssh2
Jun 12 01:45:43 electroncash sshd[54381]: Invalid user aye from 184.71.9.2 port 35291
Jun 12 01:45:43 electroncash sshd[54381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.71.9.2 
Jun 12 01:45:43 electroncash sshd[54381]: Invalid user aye from 184.71.9.2 port 35291
Jun 12 01:45:45 electroncash sshd[54381]: Failed password for invalid user aye from 184.71.9.2 port 35291 ssh2
...
2020-06-12 08:32:23

最近上报的IP列表

161.149.242.37 64.202.217.234 7.193.175.63 173.161.234.156
84.5.21.90 228.90.84.150 54.183.206.44 107.156.161.219
187.126.240.32 197.216.182.166 211.19.61.205 58.212.222.237
2.222.249.147 42.199.24.127 233.54.141.178 150.77.74.51
109.48.101.168 245.42.236.182 128.68.117.223 137.247.143.56