必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.20.214.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18866
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.20.214.28.			IN	A

;; AUTHORITY SECTION:
.			272	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 180 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 09:52:49 CST 2022
;; MSG SIZE  rcvd: 104
HOST信息:
Host 28.214.20.1.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 28.214.20.1.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.243.195.85 attackbotsspam
Unauthorized connection attempt from IP address 14.243.195.85 on Port 445(SMB)
2020-03-09 19:05:07
45.127.206.220 attackbotsspam
Attempted connection to port 23.
2020-03-09 18:48:36
117.6.129.90 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-09 19:20:19
106.12.14.183 attack
Mar  9 10:26:10 ns382633 sshd\[10547\]: Invalid user ubuntu5 from 106.12.14.183 port 47980
Mar  9 10:26:10 ns382633 sshd\[10547\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.14.183
Mar  9 10:26:12 ns382633 sshd\[10547\]: Failed password for invalid user ubuntu5 from 106.12.14.183 port 47980 ssh2
Mar  9 10:39:08 ns382633 sshd\[12568\]: Invalid user tester from 106.12.14.183 port 48432
Mar  9 10:39:08 ns382633 sshd\[12568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.14.183
2020-03-09 19:19:13
79.73.244.13 attackbots
Automatic report - Port Scan Attack
2020-03-09 19:06:14
45.228.213.177 attackbotsspam
D-Link DSL-2750B Remote Command Execution Vulnerability
2020-03-09 18:53:21
82.215.100.131 attack
Attempted connection to port 21.
2020-03-09 18:46:25
187.72.57.185 attackbots
Port scan on 1 port(s): 4899
2020-03-09 18:53:51
123.26.48.13 attackbots
Unauthorized connection attempt from IP address 123.26.48.13 on Port 3389(RDP)
2020-03-09 18:44:40
200.129.102.16 attackbots
Mar  8 23:39:22 cumulus sshd[6394]: Invalid user confluence from 200.129.102.16 port 43928
Mar  8 23:39:22 cumulus sshd[6394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.129.102.16
Mar  8 23:39:25 cumulus sshd[6394]: Failed password for invalid user confluence from 200.129.102.16 port 43928 ssh2
Mar  8 23:39:25 cumulus sshd[6394]: Received disconnect from 200.129.102.16 port 43928:11: Bye Bye [preauth]
Mar  8 23:39:25 cumulus sshd[6394]: Disconnected from 200.129.102.16 port 43928 [preauth]
Mar  8 23:45:35 cumulus sshd[6592]: Invalid user magda from 200.129.102.16 port 34496
Mar  8 23:45:35 cumulus sshd[6592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.129.102.16
Mar  8 23:45:37 cumulus sshd[6592]: Failed password for invalid user magda from 200.129.102.16 port 34496 ssh2
Mar  8 23:45:37 cumulus sshd[6592]: Received disconnect from 200.129.102.16 port 34496:11: Bye Bye [pre........
-------------------------------
2020-03-09 18:43:20
122.160.52.9 attack
SIPVicious Scanner Detection
2020-03-09 18:55:28
181.175.50.46 attack
Attempted connection to port 5555.
2020-03-09 18:52:35
51.255.67.124 attackbotsspam
SMB Server BruteForce Attack
2020-03-09 18:50:25
39.109.117.233 attackspam
Web Server Attack
2020-03-09 18:59:11
222.252.173.196 attackbotsspam
Unauthorized connection attempt from IP address 222.252.173.196 on Port 445(SMB)
2020-03-09 19:13:11

最近上报的IP列表

1.20.214.205 1.20.214.74 1.20.214.90 1.20.215.111
1.20.215.115 1.20.215.117 1.20.215.13 1.20.215.130
1.20.215.133 1.20.215.147 1.20.215.150 1.20.215.157
1.20.215.170 1.20.215.176 1.20.215.182 66.181.161.108
1.20.215.192 1.20.215.197 1.20.215.21 1.20.215.22