必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Shanghai

省份(region): Shanghai

国家(country): China

运营商(isp): China Unicom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.194.80.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58725
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.194.80.92.			IN	A

;; AUTHORITY SECTION:
.			420	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030102 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 02 08:57:00 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 92.80.194.112.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 92.80.194.112.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
162.243.55.188 attackspambots
*Port Scan* detected from 162.243.55.188 (US/United States/-). 4 hits in the last 85 seconds
2019-12-30 20:13:52
114.7.120.194 attack
Dec 30 09:58:10 lnxweb62 sshd[31449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.7.120.194
2019-12-30 20:20:47
212.64.19.123 attackspambots
failed root login
2019-12-30 20:24:01
66.249.79.129 attackspam
Lines containing failures of 66.249.79.129
/var/log/apache/pucorp.org.log:66.249.79.129 - - [30/Dec/2019:07:10:24 +0100] "GET /hostnameemlist/tag/Beschluss.feed?type=rss&start=0 HTTP/1.1" 200 9031 "-" "Mozilla/5.0 (compatible; Googlebot/2.1; +hxxp://www.google.com/bot.html)"


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=66.249.79.129
2019-12-30 20:18:20
47.107.86.185 attackbotsspam
"GET /TP/public/index.php HTTP/1.1" 404 136 "http://ip.ad.dr.ess/TP/public/index.php"
"GET /TP/index.php HTTP/1.1" 404 136 "http://ip.ad.dr.ess/TP/index.php"
"GET /thinkphp/html/public/index.php HTTP/1.1" 404 136 "http://ip.ad.dr.ess/thinkphp/html/public/index.php"
"GET /html/public/index.php HTTP/1.1" 404 136 "http://ip.ad.dr.ess/html/public/index.php"
"GET /public/index.php HTTP/1.1" 404 136 "http://ip.ad.dr.ess/public/index.php"
"GET /TP/html/public/index.php HTTP/1.1" 404 136 "http://ip.ad.dr.ess/TP/html/public/index.php"
"GET /elrekt.php HTTP/1.1" 404 136 "http://ip.ad.dr.ess/elrekt.php"
"GET /index.php HTTP/1.1" 404 136 "http://ip.ad.dr.ess/index.php"
"GET / HTTP/1.1" 200 337 "http://ip.ad.dr.ess:80"
2019-12-30 20:48:57
185.156.73.42 attack
12/30/2019-07:42:16.214491 185.156.73.42 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-30 20:42:20
115.221.112.3 attack
Dec 30 01:12:49 esmtp postfix/smtpd[6187]: lost connection after AUTH from unknown[115.221.112.3]
Dec 30 01:12:53 esmtp postfix/smtpd[6187]: lost connection after AUTH from unknown[115.221.112.3]
Dec 30 01:12:59 esmtp postfix/smtpd[6187]: lost connection after AUTH from unknown[115.221.112.3]
Dec 30 01:13:01 esmtp postfix/smtpd[6187]: lost connection after AUTH from unknown[115.221.112.3]
Dec 30 01:13:05 esmtp postfix/smtpd[6187]: lost connection after AUTH from unknown[115.221.112.3]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=115.221.112.3
2019-12-30 20:22:34
122.228.19.79 attack
" "
2019-12-30 20:45:13
45.95.35.45 attackspam
Dec 30 07:22:08  exim[29816]: [1\54] 1iloRK-0007ku-Pi H=(swim.qcside.com) [45.95.35.45] F= rejected after DATA: This message scored 100.4 spam points.
2019-12-30 20:14:12
115.216.58.93 attackspam
Dec 30 07:17:41 mxgate1 postfix/postscreen[24645]: CONNECT from [115.216.58.93]:55581 to [176.31.12.44]:25
Dec 30 07:17:41 mxgate1 postfix/dnsblog[24727]: addr 115.216.58.93 listed by domain zen.spamhaus.org as 127.0.0.11
Dec 30 07:17:41 mxgate1 postfix/dnsblog[24727]: addr 115.216.58.93 listed by domain zen.spamhaus.org as 127.0.0.4
Dec 30 07:17:41 mxgate1 postfix/dnsblog[24727]: addr 115.216.58.93 listed by domain zen.spamhaus.org as 127.0.0.2
Dec 30 07:17:41 mxgate1 postfix/dnsblog[24728]: addr 115.216.58.93 listed by domain cbl.abuseat.org as 127.0.0.2
Dec 30 07:17:41 mxgate1 postfix/dnsblog[24729]: addr 115.216.58.93 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Dec 30 07:17:41 mxgate1 postfix/dnsblog[24730]: addr 115.216.58.93 listed by domain b.barracudacentral.org as 127.0.0.2
Dec 30 07:17:47 mxgate1 postfix/postscreen[24645]: DNSBL rank 5 for [115.216.58.93]:55581
Dec x@x
Dec 30 07:17:49 mxgate1 postfix/postscreen[24645]: DISCONNECT [115.216.58.93]:55581


........
-------------------------------
2019-12-30 20:32:25
5.219.0.166 attackspam
1577686983 - 12/30/2019 07:23:03 Host: 5.219.0.166/5.219.0.166 Port: 445 TCP Blocked
2019-12-30 20:16:19
37.150.117.86 attack
1577686937 - 12/30/2019 07:22:17 Host: 37.150.117.86/37.150.117.86 Port: 445 TCP Blocked
2019-12-30 20:41:51
112.85.42.172 attack
2019-12-30T12:02:31.301998hub.schaetter.us sshd\[22254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.172  user=root
2019-12-30T12:02:33.853147hub.schaetter.us sshd\[22254\]: Failed password for root from 112.85.42.172 port 62599 ssh2
2019-12-30T12:02:37.191368hub.schaetter.us sshd\[22254\]: Failed password for root from 112.85.42.172 port 62599 ssh2
2019-12-30T12:02:40.276779hub.schaetter.us sshd\[22254\]: Failed password for root from 112.85.42.172 port 62599 ssh2
2019-12-30T12:02:43.448236hub.schaetter.us sshd\[22254\]: Failed password for root from 112.85.42.172 port 62599 ssh2
...
2019-12-30 20:18:57
159.65.184.79 attack
159.65.184.79 - - [30/Dec/2019:06:22:17 +0000] "POST /wp/wp-login.php HTTP/1.1" 200 6239 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.65.184.79 - - [30/Dec/2019:06:22:18 +0000] "POST /wp/xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-12-30 20:41:35
79.166.53.51 attack
Telnet Server BruteForce Attack
2019-12-30 20:17:07

最近上报的IP列表

112.194.80.69 112.194.80.99 112.194.81.105 112.194.81.107
112.194.81.114 112.194.81.116 112.194.81.131 112.194.81.14
112.194.81.155 112.194.81.165 112.194.81.172 112.194.81.21
112.194.81.210 112.194.81.222 112.194.81.30 112.194.81.50
112.194.81.58 112.194.81.92 112.194.82.114 112.194.82.135