必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.20.150.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58292
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.20.150.150.			IN	A

;; AUTHORITY SECTION:
.			350	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022400 1800 900 604800 86400

;; Query time: 128 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 24 19:59:09 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 150.150.20.1.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 150.150.20.1.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
62.75.145.134 attackbotsspam
(sshd) Failed SSH login from 62.75.145.134 (FR/France/studynjoy.at): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  1 05:22:07 server2 sshd[26357]: Invalid user test from 62.75.145.134 port 56240
Oct  1 05:22:09 server2 sshd[26357]: Failed password for invalid user test from 62.75.145.134 port 56240 ssh2
Oct  1 05:31:30 server2 sshd[27079]: Failed password for root from 62.75.145.134 port 33110 ssh2
Oct  1 05:49:54 server2 sshd[28344]: Invalid user test from 62.75.145.134 port 37940
Oct  1 05:49:56 server2 sshd[28344]: Failed password for invalid user test from 62.75.145.134 port 37940 ssh2
2019-10-01 16:56:51
77.247.110.215 attackspam
Connection by 77.247.110.215 on port: 8888 got caught by honeypot at 9/30/2019 9:05:10 PM
2019-10-01 16:45:29
77.42.75.165 attack
firewall-block, port(s): 23/tcp
2019-10-01 16:46:44
80.211.255.113 attackbotsspam
Oct  1 07:07:55 taivassalofi sshd[82168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.255.113
Oct  1 07:07:58 taivassalofi sshd[82168]: Failed password for invalid user choi from 80.211.255.113 port 37198 ssh2
...
2019-10-01 16:47:49
77.235.219.73 attack
" "
2019-10-01 17:21:33
222.186.15.18 attackspam
Oct  1 04:44:57 ny01 sshd[18091]: Failed password for root from 222.186.15.18 port 46006 ssh2
Oct  1 04:44:58 ny01 sshd[18090]: Failed password for root from 222.186.15.18 port 30338 ssh2
Oct  1 04:44:59 ny01 sshd[18091]: Failed password for root from 222.186.15.18 port 46006 ssh2
2019-10-01 16:51:15
149.56.251.168 attackspam
Oct  1 07:06:51 mail sshd[21976]: Invalid user destination from 149.56.251.168
Oct  1 07:06:51 mail sshd[21976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.251.168
Oct  1 07:06:51 mail sshd[21976]: Invalid user destination from 149.56.251.168
Oct  1 07:06:53 mail sshd[21976]: Failed password for invalid user destination from 149.56.251.168 port 39467 ssh2
Oct  1 07:24:49 mail sshd[24125]: Invalid user master from 149.56.251.168
...
2019-10-01 17:06:41
51.77.140.48 attackspam
Sep 30 08:18:56 zn008 sshd[10193]: Invalid user gmi from 51.77.140.48
Sep 30 08:18:58 zn008 sshd[10193]: Failed password for invalid user gmi from 51.77.140.48 port 46164 ssh2
Sep 30 08:18:58 zn008 sshd[10193]: Received disconnect from 51.77.140.48: 11: Bye Bye [preauth]
Sep 30 08:29:58 zn008 sshd[11259]: Failed password for r.r from 51.77.140.48 port 41640 ssh2
Sep 30 08:29:58 zn008 sshd[11259]: Received disconnect from 51.77.140.48: 11: Bye Bye [preauth]
Sep 30 08:33:43 zn008 sshd[11683]: Invalid user evelina from 51.77.140.48
Sep 30 08:33:44 zn008 sshd[11683]: Failed password for invalid user evelina from 51.77.140.48 port 55138 ssh2
Sep 30 08:33:44 zn008 sshd[11683]: Received disconnect from 51.77.140.48: 11: Bye Bye [preauth]
Sep 30 08:37:41 zn008 sshd[12151]: Failed password for r.r from 51.77.140.48 port 40408 ssh2
Sep 30 08:37:41 zn008 sshd[12151]: Received disconnect from 51.77.140.48: 11: Bye Bye [preauth]
Sep 30 08:41:34 zn008 sshd[12673]: Invalid user marry ........
-------------------------------
2019-10-01 17:03:36
126.4.113.186 attack
Unauthorised access (Oct  1) SRC=126.4.113.186 LEN=40 TTL=52 ID=40309 TCP DPT=8080 WINDOW=53349 SYN 
Unauthorised access (Oct  1) SRC=126.4.113.186 LEN=40 TTL=52 ID=61450 TCP DPT=8080 WINDOW=53349 SYN 
Unauthorised access (Sep 30) SRC=126.4.113.186 LEN=40 TTL=52 ID=28827 TCP DPT=8080 WINDOW=53349 SYN
2019-10-01 16:55:20
77.40.36.75 attackbots
10/01/2019-09:19:29.867558 77.40.36.75 Protocol: 6 SURICATA SMTP tls rejected
2019-10-01 17:25:31
45.136.109.199 attack
firewall-block, port(s): 6859/tcp, 7216/tcp
2019-10-01 16:47:22
138.197.179.111 attackspam
Oct  1 09:59:18 master sshd[13432]: Failed password for invalid user NetLinx from 138.197.179.111 port 55836 ssh2
Oct  1 10:16:46 master sshd[13815]: Failed password for invalid user signe from 138.197.179.111 port 58500 ssh2
Oct  1 10:20:19 master sshd[13834]: Failed password for invalid user admin from 138.197.179.111 port 42480 ssh2
Oct  1 10:23:51 master sshd[13850]: Failed password for invalid user ftp from 138.197.179.111 port 54698 ssh2
Oct  1 10:27:30 master sshd[13864]: Failed password for invalid user test from 138.197.179.111 port 38678 ssh2
2019-10-01 16:53:46
51.15.87.74 attackbots
Automatic report - Banned IP Access
2019-10-01 16:48:51
93.115.57.194 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/93.115.57.194/ 
 RO - 1H : (58)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RO 
 NAME ASN : ASN39737 
 
 IP : 93.115.57.194 
 
 CIDR : 93.115.57.0/24 
 
 PREFIX COUNT : 104 
 
 UNIQUE IP COUNT : 50176 
 
 
 WYKRYTE ATAKI Z ASN39737 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-01 05:49:30 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-01 17:15:10
121.67.246.141 attackspam
2019-10-01T09:34:45.772282centos sshd\[21176\]: Invalid user tesa from 121.67.246.141 port 58534
2019-10-01T09:34:45.776555centos sshd\[21176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.67.246.141
2019-10-01T09:34:47.375903centos sshd\[21176\]: Failed password for invalid user tesa from 121.67.246.141 port 58534 ssh2
2019-10-01 17:07:42

最近上报的IP列表

1.20.150.138 1.20.150.158 1.20.150.38 1.20.150.41
1.20.150.46 1.20.150.49 1.20.150.5 1.20.150.85
1.20.150.95 1.20.151.12 1.20.151.63 1.20.152.175
1.20.152.193 1.20.152.20 1.20.152.239 1.20.152.63
176.18.25.139 1.20.152.97 1.20.153.124 1.20.153.132