必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.107.53.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1101
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.107.53.97.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 06:07:38 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 97.53.107.12.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 97.53.107.12.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.92.0.223 attack
Jul 19 11:19:40 dignus sshd[7379]: Failed password for root from 218.92.0.223 port 43608 ssh2
Jul 19 11:19:44 dignus sshd[7379]: Failed password for root from 218.92.0.223 port 43608 ssh2
Jul 19 11:19:48 dignus sshd[7379]: Failed password for root from 218.92.0.223 port 43608 ssh2
Jul 19 11:19:52 dignus sshd[7379]: Failed password for root from 218.92.0.223 port 43608 ssh2
Jul 19 11:19:55 dignus sshd[7379]: Failed password for root from 218.92.0.223 port 43608 ssh2
...
2020-07-20 02:26:56
176.122.164.60 attackspam
2020-07-19T20:23:08.824470mail.broermann.family sshd[22838]: Invalid user admin from 176.122.164.60 port 52324
2020-07-19T20:23:08.831160mail.broermann.family sshd[22838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.122.164.60.16clouds.com
2020-07-19T20:23:08.824470mail.broermann.family sshd[22838]: Invalid user admin from 176.122.164.60 port 52324
2020-07-19T20:23:09.973813mail.broermann.family sshd[22838]: Failed password for invalid user admin from 176.122.164.60 port 52324 ssh2
2020-07-19T20:33:48.914881mail.broermann.family sshd[23237]: Invalid user larry from 176.122.164.60 port 38972
...
2020-07-20 02:39:58
193.145.147.50 attackbotsspam
Jul 19 19:19:50 *hidden* sshd[11741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.145.147.50 Jul 19 19:19:53 *hidden* sshd[11741]: Failed password for invalid user evi from 193.145.147.50 port 56165 ssh2 Jul 19 19:39:51 *hidden* sshd[15732]: Invalid user test from 193.145.147.50 port 36864
2020-07-20 02:36:07
134.175.249.204 attackbotsspam
Jul 19 17:33:45 localhost sshd[114540]: Invalid user servers from 134.175.249.204 port 38774
Jul 19 17:33:45 localhost sshd[114540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.249.204
Jul 19 17:33:45 localhost sshd[114540]: Invalid user servers from 134.175.249.204 port 38774
Jul 19 17:33:46 localhost sshd[114540]: Failed password for invalid user servers from 134.175.249.204 port 38774 ssh2
Jul 19 17:39:35 localhost sshd[115087]: Invalid user berni from 134.175.249.204 port 52012
...
2020-07-20 02:50:54
13.127.62.85 attack
Jul 19 18:41:33 buvik sshd[18538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.127.62.85
Jul 19 18:41:35 buvik sshd[18538]: Failed password for invalid user lby from 13.127.62.85 port 49050 ssh2
Jul 19 18:51:28 buvik sshd[19973]: Invalid user rpc from 13.127.62.85
...
2020-07-20 02:20:15
185.250.205.36 attack
Jul   18   08:07:31   185.250.205.36   PROTO=TCP   SPT=59121 DPT=48918
Jul   18   09:43:30   185.250.205.36   PROTO=TCP   SPT=44797 DPT=29458
Jul   18   12:32:07   185.250.205.36   PROTO=TCP   SPT=50473 DPT=27719
Jul   18   13:39:24   185.250.205.36   PROTO=TCP   SPT=56150 DPT=23415
Jul   18   15:37:56   185.250.205.36   PROTO=TCP   SPT=41827 DPT=38391
Jul   18   17:24:03   185.250.205.36   PROTO=TCP   SPT=47504 DPT=53454
2020-07-20 02:55:52
210.100.200.167 attack
2020-07-19 12:06:25,102 fail2ban.actions        [1840]: NOTICE  [sshd] Ban 210.100.200.167
2020-07-20 02:39:07
37.228.116.92 attack
Jul 19 20:23:43 eventyay sshd[21013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.228.116.92
Jul 19 20:23:45 eventyay sshd[21013]: Failed password for invalid user jefferson from 37.228.116.92 port 41876 ssh2
Jul 19 20:28:08 eventyay sshd[21170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.228.116.92
...
2020-07-20 02:40:29
103.145.12.208 attackbotsspam
 UDP 103.145.12.208:5084 -> port 5060, len 439
2020-07-20 02:56:51
61.133.232.252 attackspam
2020-07-18T18:59:05.690572hostname sshd[6095]: Failed password for invalid user tania from 61.133.232.252 port 25860 ssh2
...
2020-07-20 02:34:27
114.67.203.30 attackspambots
Lines containing failures of 114.67.203.30
Jul 19 20:19:54 nemesis sshd[26719]: Invalid user wy from 114.67.203.30 port 40805
Jul 19 20:19:54 nemesis sshd[26719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.203.30 
Jul 19 20:19:56 nemesis sshd[26719]: Failed password for invalid user wy from 114.67.203.30 port 40805 ssh2
Jul 19 20:19:56 nemesis sshd[26719]: Received disconnect from 114.67.203.30 port 40805:11: Bye Bye [preauth]
Jul 19 20:19:56 nemesis sshd[26719]: Disconnected from invalid user wy 114.67.203.30 port 40805 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=114.67.203.30
2020-07-20 02:38:32
192.35.168.152 attack
" "
2020-07-20 02:41:00
106.37.74.142 attack
" "
2020-07-20 02:54:17
94.177.231.4 attack
Invalid user cbt from 94.177.231.4 port 37392
2020-07-20 02:29:09
150.107.176.130 attackspambots
Jul 19 14:10:34 NPSTNNYC01T sshd[13160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.107.176.130
Jul 19 14:10:35 NPSTNNYC01T sshd[13160]: Failed password for invalid user wyy from 150.107.176.130 port 44754 ssh2
Jul 19 14:15:26 NPSTNNYC01T sshd[13583]: Failed password for proxy from 150.107.176.130 port 52580 ssh2
...
2020-07-20 02:30:12

最近上报的IP列表

228.207.22.236 101.41.211.198 239.212.69.85 199.184.47.194
115.207.102.210 229.148.195.215 60.241.144.189 254.119.66.246
24.173.74.122 147.41.157.24 200.190.136.91 125.24.160.2
196.153.138.43 35.248.248.39 175.118.111.254 117.108.161.130
220.57.154.238 118.143.58.228 145.103.62.9 226.96.228.4