必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.74.80.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58756
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.74.80.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 18:18:46 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
12.80.74.12.in-addr.arpa domain name pointer 12.st.louis-65-68ev.mo.dial-access.att.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.80.74.12.in-addr.arpa	name = 12.st.louis-65-68ev.mo.dial-access.att.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
81.214.130.65 attack
Shenzhen TV vulnerability scan, accessed by IP not domain: 
81.214.130.65 - - [18/Nov/2019:08:21:44 +0000] "POST /editBlackAndWhiteList HTTP/1.1" 404 340 "-" "ApiTool"
2019-11-19 09:07:46
178.33.130.196 attackspambots
Nov 18 15:05:45 wbs sshd\[7538\]: Invalid user pass2222 from 178.33.130.196
Nov 18 15:05:45 wbs sshd\[7538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.130.196
Nov 18 15:05:47 wbs sshd\[7538\]: Failed password for invalid user pass2222 from 178.33.130.196 port 55068 ssh2
Nov 18 15:10:58 wbs sshd\[8106\]: Invalid user guestguest from 178.33.130.196
Nov 18 15:10:58 wbs sshd\[8106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.130.196
2019-11-19 09:12:42
103.75.103.211 attackspambots
(sshd) Failed SSH login from 103.75.103.211 (ID/Indonesia/Jakarta/Jakarta/ip-103-75-103-211.moratelindo.net.id/[AS23947 PT.Mora Telematika Indonesia]): 1 in the last 3600 secs
2019-11-19 09:18:30
193.188.22.216 attackbotsspam
(000003)11/18/2019 17:15:23 PM - (not logged in) (193.188.22.216)> Connected on port 20, sending welcome message...
(000003)11/18/2019 17:15:23 PM - (not logged in) (193.188.22.216)> 220 You're connected. Welcome
(000003)11/18/2019 17:15:23 PM - (not logged in) (193.188.22.216)> 
(000003)11/18/2019 17:15:23 PM - (not logged in) (193.188.22.216)> 500 Syntax error, command unrecognized.
(000003)11/18/2019 17:15:23 PM - (not logged in) (193.188.22.216)> /*à
(000003)11/18/2019 17:15:23 PM - (not logged in) (193.188.22.216)> 500 Syntax error, command unrecognized.
(000003)11/18/2019 17:15:23 PM - (not logged in) (193.188.22.216)> Cookie: mstshash=Administr
(000003)11/18/2019 17:15:23 PM - (not logged in) (193.188.22.216)> 500 Syntax error, command unrecognized.
(000003)11/18/2019 17:15:23 PM - (not logged in) (193.188.22.216)> 
(000003)11/18/2019 17:15:23 PM - (not logged in) (193.188.22.216)> 500 Syntax error, command unrecognized.
(000003)11/18/2019 17:15:23 PM - (not logged in) (193.188.22.216)> 
2019-11-19 08:59:04
1.2.237.156 attack
port 23 attempt blocked
2019-11-19 09:02:07
113.172.168.203 attackspam
IMAP brute force
...
2019-11-19 09:02:32
106.51.2.108 attackspam
Nov 19 03:11:09 server sshd\[16666\]: Invalid user www from 106.51.2.108 port 11393
Nov 19 03:11:09 server sshd\[16666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.2.108
Nov 19 03:11:12 server sshd\[16666\]: Failed password for invalid user www from 106.51.2.108 port 11393 ssh2
Nov 19 03:15:11 server sshd\[28373\]: Invalid user admin from 106.51.2.108 port 26241
Nov 19 03:15:11 server sshd\[28373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.2.108
2019-11-19 09:21:48
163.172.207.104 attackspambots
\[2019-11-18 19:42:05\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-18T19:42:05.290-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="5011972592277524",SessionID="0x7fdf2c19f8b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/60436",ACLName="no_extension_match"
\[2019-11-18 19:45:50\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-18T19:45:50.931-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="6011972592277524",SessionID="0x7fdf2c411158",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/49579",ACLName="no_extension_match"
\[2019-11-18 19:49:53\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-18T19:49:53.637-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="7011972592277524",SessionID="0x7fdf2c19f8b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/49216",ACLNam
2019-11-19 09:05:38
180.252.229.13 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/180.252.229.13/ 
 
 ID - 1H : (40)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : ID 
 NAME ASN : ASN17974 
 
 IP : 180.252.229.13 
 
 CIDR : 180.252.224.0/20 
 
 PREFIX COUNT : 1456 
 
 UNIQUE IP COUNT : 1245952 
 
 
 ATTACKS DETECTED ASN17974 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 3 
 24H - 4 
 
 DateTime : 2019-11-18 23:51:09 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-19 09:23:21
59.29.238.123 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-11-19 08:54:45
104.248.58.71 attackbotsspam
Automatic report - Banned IP Access
2019-11-19 09:20:47
178.124.156.183 attack
Nov 18 23:48:05 xeon cyrus/imap[7876]: badlogin: mm-183-156-124-178.static.mgts.by [178.124.156.183] plain [SASL(-13): authentication failure: Password verification failed]
2019-11-19 08:53:03
91.146.15.147 attack
IMAP brute force
...
2019-11-19 08:47:19
165.227.53.38 attackbots
2019-11-18T17:37:28.3733471495-001 sshd\[39138\]: Invalid user server from 165.227.53.38 port 52670
2019-11-18T17:37:28.3811881495-001 sshd\[39138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.53.38
2019-11-18T17:37:30.6147041495-001 sshd\[39138\]: Failed password for invalid user server from 165.227.53.38 port 52670 ssh2
2019-11-18T17:41:00.6442181495-001 sshd\[39222\]: Invalid user binti from 165.227.53.38 port 60572
2019-11-18T17:41:00.6525371495-001 sshd\[39222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.53.38
2019-11-18T17:41:02.9912081495-001 sshd\[39222\]: Failed password for invalid user binti from 165.227.53.38 port 60572 ssh2
...
2019-11-19 09:01:09
185.175.93.101 attack
11/18/2019-19:51:53.588716 185.175.93.101 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-19 09:14:26

最近上报的IP列表

207.97.110.15 148.140.96.120 117.254.230.214 66.14.123.63
193.245.35.108 184.253.248.36 22.58.102.146 231.174.66.205
99.186.249.107 226.149.103.47 175.141.75.244 48.198.213.190
239.129.87.25 68.177.249.106 168.136.120.22 3.133.44.214
155.150.219.9 184.159.30.153 31.11.146.238 64.172.217.64