必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): New Zealand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.149.80.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42127
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.149.80.221.			IN	A

;; AUTHORITY SECTION:
.			449	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020401 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 05 11:49:08 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
221.80.149.118.in-addr.arpa domain name pointer 221-80-149-118.nzcomms.co.nz.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
221.80.149.118.in-addr.arpa	name = 221-80-149-118.nzcomms.co.nz.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
134.119.179.255 attack
245 packets to ports 80 443 1443 2443 3089 3443 4430 4431 4432 4433 4434 4435 4436 4437 4438 4439 4443 5060 5443 6443 7443 8089 8443 9443 10443 11443 12443 13443 14430 14431 14432 14433 14434 14435 14436 14437 14438 14439 14443 15443 16443 17443 18443 19443, etc.
2019-11-28 18:14:14
41.41.53.139 attackspam
SMB Server BruteForce Attack
2019-11-28 18:18:19
102.165.68.137 attackspambots
Automatic report - Port Scan Attack
2019-11-28 17:58:44
106.13.7.186 attack
2019-11-28T06:25:23.397960abusebot-5.cloudsearch.cf sshd\[21542\]: Invalid user pozsonyi from 106.13.7.186 port 44710
2019-11-28 18:16:51
122.155.169.223 attackbotsspam
SSH authentication failure x 6 reported by Fail2Ban
...
2019-11-28 18:21:08
157.92.24.135 attackbotsspam
2019-11-28T09:27:52.910894abusebot-8.cloudsearch.cf sshd\[11143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=peppi.ic.fcen.uba.ar  user=root
2019-11-28 18:05:27
51.77.231.213 attack
Invalid user admin from 51.77.231.213 port 45950
2019-11-28 18:16:23
139.219.143.176 attackspam
Nov 28 11:50:11 server sshd\[18425\]: Invalid user test from 139.219.143.176
Nov 28 11:50:11 server sshd\[18425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.143.176 
Nov 28 11:50:13 server sshd\[18425\]: Failed password for invalid user test from 139.219.143.176 port 49903 ssh2
Nov 28 12:02:05 server sshd\[21409\]: Invalid user backup from 139.219.143.176
Nov 28 12:02:05 server sshd\[21409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.143.176 
...
2019-11-28 18:07:22
81.198.161.120 attackspambots
Unauthorised access (Nov 28) SRC=81.198.161.120 LEN=40 TTL=246 ID=8838 TCP DPT=8080 WINDOW=1300 SYN
2019-11-28 18:26:28
109.72.192.226 attack
3389BruteforceFW21
2019-11-28 18:18:53
202.39.70.5 attackspam
Nov 28 10:47:41 SilenceServices sshd[8003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.39.70.5
Nov 28 10:47:43 SilenceServices sshd[8003]: Failed password for invalid user noshir from 202.39.70.5 port 33742 ssh2
Nov 28 10:54:44 SilenceServices sshd[10138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.39.70.5
2019-11-28 18:08:31
103.138.10.6 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-28 18:32:08
185.53.88.18 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-28 18:27:51
61.219.11.153 attackspambots
Scanning random ports - tries to find possible vulnerable services
2019-11-28 18:00:20
23.24.251.39 attack
Nov 28 07:25:48 dev sshd\[10766\]: Invalid user pi from 23.24.251.39 port 49878
Nov 28 07:25:48 dev sshd\[10767\]: Invalid user pi from 23.24.251.39 port 49880
Nov 28 07:25:49 dev sshd\[10767\]: Failed password for invalid user pi from 23.24.251.39 port 49880 ssh2
2019-11-28 18:02:12

最近上报的IP列表

29.8.91.85 176.81.98.165 0.152.113.16 54.99.34.64
235.55.59.122 251.231.126.157 241.191.68.1 87.197.228.103
157.177.187.158 167.110.109.131 48.130.21.39 171.172.201.123
111.117.43.205 127.2.205.9 59.136.174.93 55.214.60.82
119.82.252.106 126.179.11.244 175.190.236.37 166.92.10.99