必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Switzerland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.102.147.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35431
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.102.147.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012401 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 04:49:11 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 12.147.102.5.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.147.102.5.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
119.29.246.210 attack
2020-06-12T16:45:34.566545abusebot-5.cloudsearch.cf sshd[8070]: Invalid user smack from 119.29.246.210 port 47798
2020-06-12T16:45:34.571780abusebot-5.cloudsearch.cf sshd[8070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.246.210
2020-06-12T16:45:34.566545abusebot-5.cloudsearch.cf sshd[8070]: Invalid user smack from 119.29.246.210 port 47798
2020-06-12T16:45:36.432355abusebot-5.cloudsearch.cf sshd[8070]: Failed password for invalid user smack from 119.29.246.210 port 47798 ssh2
2020-06-12T16:47:36.267017abusebot-5.cloudsearch.cf sshd[8074]: Invalid user python from 119.29.246.210 port 36852
2020-06-12T16:47:36.272342abusebot-5.cloudsearch.cf sshd[8074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.246.210
2020-06-12T16:47:36.267017abusebot-5.cloudsearch.cf sshd[8074]: Invalid user python from 119.29.246.210 port 36852
2020-06-12T16:47:37.881884abusebot-5.cloudsearch.cf sshd[8074]: Faile
...
2020-06-13 02:19:26
182.61.1.130 attackspambots
Failed password for invalid user pascal from 182.61.1.130 port 45544 ssh2
Invalid user ce from 182.61.1.130 port 49312
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.1.130
Invalid user ce from 182.61.1.130 port 49312
Failed password for invalid user ce from 182.61.1.130 port 49312 ssh2
2020-06-13 02:21:10
70.48.144.197 attack
'Fail2Ban'
2020-06-13 02:46:00
187.189.51.117 attackspam
Jun 12 20:34:46 haigwepa sshd[7719]: Failed password for root from 187.189.51.117 port 11989 ssh2
...
2020-06-13 02:58:53
185.212.195.122 attack
Jun 12 20:26:50 vps687878 sshd\[22894\]: Failed password for root from 185.212.195.122 port 50460 ssh2
Jun 12 20:30:08 vps687878 sshd\[23169\]: Invalid user admin from 185.212.195.122 port 43062
Jun 12 20:30:08 vps687878 sshd\[23169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.212.195.122
Jun 12 20:30:09 vps687878 sshd\[23169\]: Failed password for invalid user admin from 185.212.195.122 port 43062 ssh2
Jun 12 20:33:28 vps687878 sshd\[23659\]: Invalid user of from 185.212.195.122 port 35626
Jun 12 20:33:28 vps687878 sshd\[23659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.212.195.122
...
2020-06-13 02:36:33
134.209.176.160 attack
[ssh] SSH attack
2020-06-13 02:48:37
45.40.199.82 attackbots
Jun 12 20:39:36 PorscheCustomer sshd[27229]: Failed password for root from 45.40.199.82 port 40080 ssh2
Jun 12 20:41:53 PorscheCustomer sshd[27320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.199.82
Jun 12 20:41:55 PorscheCustomer sshd[27320]: Failed password for invalid user kiosk from 45.40.199.82 port 37136 ssh2
...
2020-06-13 02:44:43
94.102.51.7 attack
Jun 12 19:20:22 pop3-login: Info: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=94.102.51.7, lip=192.168.100.101, session=\<6kWqSuan8gBeZjMH\>\
Jun 12 19:34:53 pop3-login: Info: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=94.102.51.7, lip=192.168.100.101, session=\\
Jun 12 19:35:00 pop3-login: Info: Aborted login \(auth failed, 1 attempts in 6 secs\): user=\, method=PLAIN, rip=94.102.51.7, lip=192.168.100.101, session=\\
Jun 12 19:56:41 pop3-login: Info: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=94.102.51.7, lip=192.168.100.101, session=\\
Jun 12 20:01:05 pop3-login: Info: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=94.102.51.7, lip=192.168.100.101, session=\\
Jun 12 20:07:58 pop3-login: Info: A
2020-06-13 02:43:44
195.154.188.108 attackbots
SSH Brute-Force attacks
2020-06-13 02:56:12
104.174.61.206 attack
Jun 12 16:44:30 ws26vmsma01 sshd[234725]: Failed password for root from 104.174.61.206 port 60028 ssh2
...
2020-06-13 02:59:18
189.190.27.172 attackbots
Jun 12 18:46:45 haigwepa sshd[1122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.190.27.172 
Jun 12 18:46:47 haigwepa sshd[1122]: Failed password for invalid user its from 189.190.27.172 port 55444 ssh2
...
2020-06-13 02:49:12
159.89.121.79 attackspam
The IP has triggered Cloudflare WAF. CF-Ray: 5a1db7264905ab64 | WAF_Rule_ID: 2e3ead4eb71148f0b1a3556e8da29348 | WAF_Kind: firewall | CF_Action: challenge | Country: CA | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: wevg.org | User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0 | CF_DC: YYZ. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2020-06-13 02:42:41
61.177.172.128 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.128  user=root
Failed password for root from 61.177.172.128 port 45876 ssh2
Failed password for root from 61.177.172.128 port 45876 ssh2
Failed password for root from 61.177.172.128 port 45876 ssh2
Failed password for root from 61.177.172.128 port 45876 ssh2
2020-06-13 02:48:53
132.232.66.227 attackspambots
Jun 12 20:17:30 cosmoit sshd[9146]: Failed password for root from 132.232.66.227 port 52168 ssh2
2020-06-13 02:38:43
219.84.236.108 attack
Fail2Ban Ban Triggered (2)
2020-06-13 02:45:08

最近上报的IP列表

142.56.179.11 58.170.81.192 189.75.142.117 85.98.185.99
63.152.17.17 189.229.30.192 5.97.199.245 252.168.13.73
6.254.26.139 192.73.5.118 91.44.172.203 162.211.204.14
78.238.156.108 153.26.14.125 62.112.44.58 199.237.70.146
136.66.232.128 140.36.117.133 127.193.131.190 15.119.199.130