必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
113.206.133.80 attackspambots
The IP has triggered Cloudflare WAF. CF-Ray: 54170808cc4898c3 | WAF_Rule_ID: 1112824 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: img.skk.moe | User-Agent: Mozilla/5.0 (Linux; U; Android 4.3; en-us; SM-N900T Build/JSS15J) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 00:23:11
113.206.133.22 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-14 02:10:01
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.206.133.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62680
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.206.133.196.		IN	A

;; AUTHORITY SECTION:
.			305	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030600 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 16:31:42 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 196.133.206.113.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 196.133.206.113.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.51.140.242 attack
Unauthorized connection attempt from IP address 106.51.140.242 on Port 445(SMB)
2020-02-14 20:28:02
46.101.43.224 attackbotsspam
Feb 14 07:26:39 sd-53420 sshd\[15441\]: Invalid user bukkit from 46.101.43.224
Feb 14 07:26:39 sd-53420 sshd\[15441\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.43.224
Feb 14 07:26:41 sd-53420 sshd\[15441\]: Failed password for invalid user bukkit from 46.101.43.224 port 47770 ssh2
Feb 14 07:30:05 sd-53420 sshd\[15802\]: Invalid user admissions from 46.101.43.224
Feb 14 07:30:05 sd-53420 sshd\[15802\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.43.224
...
2020-02-14 20:24:07
118.70.170.66 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-14 20:18:07
162.243.130.120 attack
Fail2Ban Ban Triggered
2020-02-14 19:51:23
146.88.240.4 attackbots
146.88.240.4 was recorded 16 times by 13 hosts attempting to connect to the following ports: 3702,123. Incident counter (4h, 24h, all-time): 16, 378, 55237
2020-02-14 20:29:07
119.203.172.73 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 20:10:42
165.227.188.19 attackspam
Probing for vulnerabilities, ignoring robots.txt
2020-02-14 20:15:16
37.23.178.28 attack
60001/tcp
[2020-02-14]1pkt
2020-02-14 20:03:15
62.219.227.31 attackspam
Honeypot attack, port: 81, PTR: bzq-219-227-31.pop.bezeqint.net.
2020-02-14 20:03:51
119.202.208.148 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-14 19:50:32
114.32.236.198 attack
Feb 14 05:51:27 debian-2gb-nbg1-2 kernel: \[3915113.216509\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=114.32.236.198 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=52 ID=40827 PROTO=TCP SPT=6908 DPT=23 WINDOW=16092 RES=0x00 SYN URGP=0
2020-02-14 20:08:34
196.52.43.127 attackspam
Automatic report - Banned IP Access
2020-02-14 20:24:31
171.242.121.215 attackspam
trying to access non-authorized port
2020-02-14 20:06:27
147.50.7.196 attackspambots
Unauthorized connection attempt from IP address 147.50.7.196 on Port 445(SMB)
2020-02-14 19:51:48
119.202.72.61 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 20:19:40

最近上报的IP列表

113.206.133.4 117.252.29.128 113.22.19.187 113.22.194.45
113.219.239.71 113.22.199.166 113.221.46.81 113.22.199.43
113.221.46.83 113.206.133.227 113.221.47.122 113.221.47.106
113.221.47.125 117.252.29.136 113.221.47.13 113.221.47.136
113.221.47.138 113.221.47.141 117.252.29.145 117.252.29.152