必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Singapore

省份(region): unknown

国家(country): Singapore

运营商(isp): SingTel

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.200.157.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31219
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;118.200.157.213.		IN	A

;; AUTHORITY SECTION:
.			147	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020051502 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 16 07:29:52 CST 2020
;; MSG SIZE  rcvd: 119
HOST信息:
Host 213.157.200.118.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 213.157.200.118.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
119.75.238.24 attackbotsspam
Automatic report - XMLRPC Attack
2020-02-14 00:09:38
203.115.136.43 attackbots
Unauthorized connection attempt detected from IP address 203.115.136.43 to port 445
2020-02-13 23:47:58
115.84.91.131 attack
Brute force attempt
2020-02-13 23:49:05
187.162.51.63 attackbotsspam
Feb 13 13:49:06 l02a sshd[27673]: Invalid user satyanarayan from 187.162.51.63
Feb 13 13:49:07 l02a sshd[27673]: Failed password for invalid user satyanarayan from 187.162.51.63 port 47494 ssh2
Feb 13 13:49:06 l02a sshd[27673]: Invalid user satyanarayan from 187.162.51.63
Feb 13 13:49:07 l02a sshd[27673]: Failed password for invalid user satyanarayan from 187.162.51.63 port 47494 ssh2
2020-02-13 23:42:13
109.227.63.3 attack
Automatic report - Banned IP Access
2020-02-14 00:10:10
222.186.31.135 attackspambots
Feb 13 17:07:32 localhost sshd\[27314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.135  user=root
Feb 13 17:07:34 localhost sshd\[27314\]: Failed password for root from 222.186.31.135 port 45106 ssh2
Feb 13 17:07:36 localhost sshd\[27314\]: Failed password for root from 222.186.31.135 port 45106 ssh2
2020-02-14 00:09:16
185.39.10.10 attackspambots
02/13/2020-10:31:37.520671 185.39.10.10 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-13 23:31:47
46.101.204.20 attackbotsspam
Unauthorized connection attempt detected from IP address 46.101.204.20 to port 22
2020-02-13 23:40:58
85.96.191.161 attackspam
Telnet/23 MH Probe, BF, Hack -
2020-02-13 23:23:46
204.12.102.38 spam
MARRE de ces ORDURES de FILS de PUTES, avec la complicité de SOUS MERDES comme tucows.com et hostmysite.com qui POLLUENT la Planète par DIX POURRIELS par jour pour du SEXE sur des listes VOLÉES on ne sait où mais SANS notre accord, à condamner selon la législation Européenne à 750 € par SPAM émis !
https://www.mywot.com/scorecard/automatedfiling.com
https://www.mywot.com/scorecard/safesecureweb.com
https://www.mywot.com/scorecard/quickdateloversfinder.com
https://www.mywot.com/scorecard/quickdateladiesfinder.com
https://www.mywot.com/scorecard/honeyadultsfinder.com
https://www.mywot.com/scorecard/tucows.com
https://www.mywot.com/scorecard/ntirety.com
https://en.asytech.cn/check-ip/204.12.102.38
info@automatedfiling.com which send as usual to :
https://quickdateloversfinder.com/mwoirzmytgwlwhw%3Ft%3Dsssh&sa=D&sntz=1&usg=AFQjCNGmyUXvyNHS-Zi5EZn1NbKHoi4HWg
2020-02-13 23:44:58
189.211.84.138 attack
Automatic report - Port Scan Attack
2020-02-13 23:37:21
117.213.254.102 attackbots
Lines containing failures of 117.213.254.102
Feb 13 10:22:39 shared04 sshd[28380]: Did not receive identification string from 117.213.254.102 port 52071
Feb 13 10:22:43 shared04 sshd[28387]: Invalid user avanthi from 117.213.254.102 port 54033
Feb 13 10:22:43 shared04 sshd[28387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.213.254.102
Feb 13 10:22:45 shared04 sshd[28387]: Failed password for invalid user avanthi from 117.213.254.102 port 54033 ssh2
Feb 13 10:22:45 shared04 sshd[28387]: Connection closed by invalid user avanthi 117.213.254.102 port 54033 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=117.213.254.102
2020-02-13 23:30:03
106.12.160.220 attackspambots
Feb 13 14:48:58 v22018076622670303 sshd\[32298\]: Invalid user bucks from 106.12.160.220 port 41476
Feb 13 14:48:58 v22018076622670303 sshd\[32298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.160.220
Feb 13 14:49:00 v22018076622670303 sshd\[32298\]: Failed password for invalid user bucks from 106.12.160.220 port 41476 ssh2
...
2020-02-13 23:57:04
49.88.112.75 attack
Feb 13 15:29:20 server sshd[7774]: fatal: Unable to negotiate with 49.88.112.75 port 45531: no matching key exchange method found. 
Feb 13 15:30:19 server sshd[7835]: fatal: Unable to negotiate with 49.88.112.75 port 31842: no matching key exchange method found. 
Feb 13 15:31:21 server sshd[7900]: fatal: Unable to negotiate with 49.88.112.75 port 27717: no matching key exchange method found.
2020-02-14 00:07:11
222.186.30.218 attackspam
13.02.2020 15:30:58 SSH access blocked by firewall
2020-02-13 23:38:23

最近上报的IP列表

207.105.77.159 47.168.52.115 75.200.235.92 118.107.38.66
34.218.56.219 45.179.251.83 207.109.255.186 186.93.80.35
126.102.241.133 188.175.16.220 97.85.57.96 223.110.74.84
192.248.41.87 220.78.152.85 90.10.170.23 86.227.105.185
192.248.41.23 219.188.18.44 157.39.60.183 32.43.112.241