必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.12.16.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40807
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.12.16.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 12:02:32 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
20.16.12.116.in-addr.arpa domain name pointer ag116-12-16-20.ccnw.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.16.12.116.in-addr.arpa	name = ag116-12-16-20.ccnw.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
102.165.30.33 attackbotsspam
SSH Scan
2020-08-18 14:36:16
159.89.2.220 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-08-18 14:49:40
210.86.239.186 attackspambots
2020-08-18T06:22:23.486250centos sshd[446]: Invalid user admin from 210.86.239.186 port 50450
2020-08-18T06:22:25.874058centos sshd[446]: Failed password for invalid user admin from 210.86.239.186 port 50450 ssh2
2020-08-18T06:26:57.217740centos sshd[528]: Invalid user ubuntu from 210.86.239.186 port 58416
...
2020-08-18 14:16:19
171.240.242.51 attackspambots
1597722905 - 08/18/2020 05:55:05 Host: 171.240.242.51/171.240.242.51 Port: 445 TCP Blocked
2020-08-18 14:20:15
139.99.201.155 attackspambots
$f2bV_matches
2020-08-18 14:27:58
72.42.170.60 attackspambots
Invalid user test101 from 72.42.170.60 port 53700
2020-08-18 14:30:39
152.136.156.14 attack
$f2bV_matches
2020-08-18 14:33:35
195.54.167.152 attack
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-08-18T05:32:22Z and 2020-08-18T05:56:43Z
2020-08-18 14:08:13
167.71.38.104 attackbotsspam
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-18 14:23:46
34.248.221.97 attackspambots
HTTP DDOS
2020-08-18 14:31:25
112.85.42.185 attackspambots
Aug 18 07:26:57 raspberrypi sshd[6927]: Failed password for root from 112.85.42.185 port 63128 ssh2
Aug 18 07:27:00 raspberrypi sshd[6927]: Failed password for root from 112.85.42.185 port 63128 ssh2
Aug 18 07:27:02 raspberrypi sshd[6927]: Failed password for root from 112.85.42.185 port 63128 ssh2
Aug 18 07:27:49 raspberrypi sshd[6939]: Failed password for root from 112.85.42.185 port 19885 ssh2
Aug 18 07:27:52 raspberrypi sshd[6939]: Failed password for root from 112.85.42.185 port 19885 ssh2
...
2020-08-18 14:39:48
114.67.108.60 attack
Invalid user sampserver from 114.67.108.60 port 42212
2020-08-18 14:42:38
198.199.65.166 attackbots
$f2bV_matches
2020-08-18 14:55:55
3.7.233.194 attackspam
Aug 18 06:41:12 vmd36147 sshd[16855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.7.233.194
Aug 18 06:41:14 vmd36147 sshd[16855]: Failed password for invalid user kelly from 3.7.233.194 port 51344 ssh2
...
2020-08-18 14:14:55
47.180.212.134 attack
Aug 18 08:01:59 server sshd[59884]: Failed password for invalid user aldo from 47.180.212.134 port 34281 ssh2
Aug 18 08:05:59 server sshd[61544]: Failed password for root from 47.180.212.134 port 38994 ssh2
Aug 18 08:10:03 server sshd[63328]: Failed password for root from 47.180.212.134 port 43672 ssh2
2020-08-18 14:29:10

最近上报的IP列表

154.221.177.85 88.162.171.132 226.182.152.120 70.158.132.26
7.107.113.22 144.33.111.141 177.248.149.92 207.4.119.86
153.178.155.165 241.8.30.44 20.24.72.16 78.127.20.44
79.10.109.5 197.245.82.79 85.142.222.118 153.48.247.48
236.55.132.244 133.57.75.203 192.54.72.243 219.216.79.107