必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Beijing

省份(region): Beijing

国家(country): China

运营商(isp): China Unicom

主机名(hostname): unknown

机构(organization): CHINA UNICOM China169 Backbone

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.11.194.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58122
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;117.11.194.194.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050701 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed May 08 02:36:41 +08 2019
;; MSG SIZE  rcvd: 118

HOST信息:
194.194.11.117.in-addr.arpa domain name pointer dns194.online.tj.cn.
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
194.194.11.117.in-addr.arpa	name = dns194.online.tj.cn.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
188.166.34.129 attackbotsspam
Invalid user user from 188.166.34.129 port 53646
2020-05-15 06:13:22
49.247.208.185 attack
Invalid user test from 49.247.208.185 port 43552
2020-05-15 06:19:50
182.186.55.54 attackbots
(mod_security) mod_security (id:20000005) triggered by 182.186.55.54 (PK/Pakistan/-): 5 in the last 300 secs
2020-05-15 06:16:19
49.232.144.7 attack
[ssh] SSH attack
2020-05-15 06:35:59
37.187.7.95 attackspam
Invalid user norbert from 37.187.7.95 port 49066
2020-05-15 06:40:31
103.12.161.196 attackspam
(smtpauth) Failed SMTP AUTH login from 103.12.161.196 (KH/Cambodia/-): 5 in the last 3600 secs
2020-05-15 06:37:24
195.3.146.111 attackspam
firewall-block, port(s): 1122/tcp, 4200/tcp, 5151/tcp, 5432/tcp, 9995/tcp
2020-05-15 06:16:47
138.68.105.194 attackbots
Invalid user fop2 from 138.68.105.194 port 38666
2020-05-15 06:17:44
89.248.168.244 attack
May 15 00:36:30 debian-2gb-nbg1-2 kernel: \[11754642.162125\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=89.248.168.244 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=14844 PROTO=TCP SPT=40762 DPT=260 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-15 06:37:43
2a02:c207:2029:3674::1 attackspam
xmlrpc attack
2020-05-15 06:24:44
107.191.55.167 attackspam
*Port Scan* detected from 107.191.55.167 (US/United States/Texas/Dallas (Downtown)/107.191.55.167.vultr.com). 4 hits in the last 270 seconds
2020-05-15 06:32:41
185.173.35.1 attack
Port scan: Attack repeated for 24 hours
2020-05-15 06:24:21
197.234.193.46 attack
Invalid user hal from 197.234.193.46 port 55490
2020-05-15 06:21:54
118.25.182.177 attackspambots
May 14 23:57:21 sso sshd[18908]: Failed password for root from 118.25.182.177 port 53152 ssh2
...
2020-05-15 06:43:31
167.99.155.36 attack
May 15 00:21:28 debian-2gb-nbg1-2 kernel: \[11753739.741912\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=167.99.155.36 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=8824 PROTO=TCP SPT=53668 DPT=31721 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-15 06:27:46

最近上报的IP列表

42.248.163.119 206.189.149.115 165.22.6.48 160.87.235.20
40.122.181.12 123.143.45.170 32.56.118.112 106.12.204.118
52.221.211.172 52.52.164.211 213.211.56.13 52.200.50.204
75.170.45.4 64.93.86.184 179.42.253.227 167.114.95.218
71.148.88.22 104.219.41.61 87.118.116.12 39.133.207.212