必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.3.20.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61983
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.3.20.85.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091401 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 15 01:29:45 CST 2022
;; MSG SIZE  rcvd: 104
HOST信息:
85.20.3.118.in-addr.arpa domain name pointer p1464085-ipngn200913kobeminato.hyogo.ocn.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
85.20.3.118.in-addr.arpa	name = p1464085-ipngn200913kobeminato.hyogo.ocn.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
116.108.114.170 attack
Port probing on unauthorized port 23
2020-08-13 03:21:30
103.78.167.20 attackspambots
 TCP (SYN) 103.78.167.20:59803 -> port 445, len 52
2020-08-13 03:24:29
138.186.156.238 attack
 TCP (SYN) 138.186.156.238:53439 -> port 445, len 52
2020-08-13 03:19:44
141.237.141.200 attackspam
 TCP (SYN) 141.237.141.200:661 -> port 81, len 44
2020-08-13 03:18:41
192.35.169.20 attackbotsspam
 TCP (SYN) 192.35.169.20:23333 -> port 1433, len 44
2020-08-13 03:13:22
220.135.134.98 attackbotsspam
 TCP (SYN) 220.135.134.98:5959 -> port 23, len 40
2020-08-13 03:12:13
185.166.223.138 attack
 TCP (SYN) 185.166.223.138:7558 -> port 80, len 44
2020-08-13 02:53:47
95.57.88.1 attack
 TCP (SYN) 95.57.88.1:55790 -> port 1433, len 40
2020-08-13 03:25:23
72.167.220.140 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-13 03:04:17
185.132.53.200 attack
 TCP (SYN) 185.132.53.200:19392 -> port 2323, len 44
2020-08-13 02:54:09
27.201.69.5 attackbots
IPS Sensor Hit - Port Scan detected
2020-08-13 03:10:38
103.89.254.86 attack
 TCP (SYN) 103.89.254.86:54306 -> port 445, len 52
2020-08-13 03:00:02
204.42.253.130 attack
 UDP 204.42.253.130:14235 -> port 161, len 66
2020-08-13 03:12:38
59.124.2.155 attackspam
 TCP (SYN) 59.124.2.155:57616 -> port 1433, len 40
2020-08-13 03:05:19
212.95.175.226 attackbots
 TCP (SYN) 212.95.175.226:49785 -> port 1433, len 40
2020-08-13 02:51:56

最近上报的IP列表

180.251.144.201 177.62.137.38 193.19.207.87 5.9.137.170
45.138.100.64 91.127.191.124 200.105.71.74 98.146.197.7
1.15.131.94 195.178.120.246 202.44.44.229 106.105.211.172
116.202.157.229 125.41.184.158 147.182.138.5 79.110.62.194
154.202.103.233 162.244.26.128 121.126.13.83 179.148.148.239