必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): Guangdong

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): CERNET2 IX at South China University of Technology

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.56.12.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13949
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;116.56.12.9.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051400 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue May 14 20:04:20 CST 2019
;; MSG SIZE  rcvd: 115

HOST信息:
Host 9.12.56.116.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 9.12.56.116.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
27.194.144.72 attackspambots
1596750884 - 08/06/2020 23:54:44 Host: 27.194.144.72/27.194.144.72 Port: 23 TCP Blocked
...
2020-08-07 06:42:35
222.186.30.57 attackspambots
Aug  7 00:47:45 * sshd[1744]: Failed password for root from 222.186.30.57 port 41388 ssh2
2020-08-07 06:50:42
84.92.92.196 attackbots
Too many connections or unauthorized access detected from Arctic banned ip
2020-08-07 06:35:57
210.245.34.243 attackspam
Too many connections or unauthorized access detected from Arctic banned ip
2020-08-07 07:03:10
222.186.30.167 attackbots
Aug  7 00:29:05 amit sshd\[30973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.167  user=root
Aug  7 00:29:08 amit sshd\[30973\]: Failed password for root from 222.186.30.167 port 35046 ssh2
Aug  7 00:29:14 amit sshd\[30975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.167  user=root
...
2020-08-07 06:34:30
167.179.13.185 attack
1596750863 - 08/06/2020 23:54:23 Host: 167.179.13.185/167.179.13.185 Port: 23 TCP Blocked
2020-08-07 06:55:53
209.85.220.65 attack
watch out Fraud
2020-08-07 06:47:45
212.129.59.36 attackbots
212.129.59.36 - - [07/Aug/2020:00:35:33 +0200] "GET /wp-login.php HTTP/1.1" 200 6310 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.129.59.36 - - [07/Aug/2020:00:35:34 +0200] "POST /wp-login.php HTTP/1.1" 200 6561 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.129.59.36 - - [07/Aug/2020:00:35:34 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-07 06:41:31
162.243.129.245 attackspambots
Fail2Ban Ban Triggered
2020-08-07 06:53:38
62.210.215.34 attack
Aug  6 23:50:57 vpn01 sshd[16249]: Failed password for root from 62.210.215.34 port 47660 ssh2
...
2020-08-07 06:52:04
106.13.42.140 attackbotsspam
Too many connections or unauthorized access detected from Arctic banned ip
2020-08-07 06:41:45
147.75.34.138 attackspam
*Port Scan* detected from 147.75.34.138 (NL/Netherlands/North Holland/Amsterdam/-). 4 hits in the last 206 seconds
2020-08-07 06:25:53
218.232.100.48 attackbotsspam
Unauthorized connection attempt from IP address 218.232.100.48 on port 3389
2020-08-07 06:51:33
134.209.148.107 attackspambots
Port scan: Attack repeated for 24 hours
2020-08-07 06:30:47
106.111.72.40 attack
20 attempts against mh-ssh on sun
2020-08-07 06:59:14

最近上报的IP列表

3.89.163.236 211.164.245.205 23.252.117.163 122.203.252.6
124.35.91.41 62.78.80.45 153.242.230.124 185.156.173.189
220.56.247.210 92.7.89.6 216.129.2.66 46.154.114.215
96.245.111.30 85.131.5.237 78.201.162.245 71.234.228.136
172.54.6.225 71.117.124.41 212.241.18.17 202.243.104.70