必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Palo Alto Research Center Incorporated

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.1.70.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36936
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;13.1.70.52.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071500 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jul 16 00:23:10 CST 2019
;; MSG SIZE  rcvd: 114
HOST信息:
Host 52.70.1.13.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 52.70.1.13.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
77.247.110.166 attackbotsspam
\[2020-01-06 23:43:39\] SECURITY\[2093\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-01-06T23:43:39.647+0100",Severity="Error",Service="SIP",EventVersion="2",AccountID="6001",SessionID="0x7f2419284eb8",LocalAddress="IPV4/UDP/204.8.216.89/5060",RemoteAddress="IPV4/UDP/77.247.110.166/6050",Challenge="683c0727",ReceivedChallenge="683c0727",ReceivedHash="eb988eaabe879c6cd9e30c9ce1b79457"
\[2020-01-06 23:43:39\] SECURITY\[2093\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-01-06T23:43:39.829+0100",Severity="Error",Service="SIP",EventVersion="2",AccountID="6001",SessionID="0x7f241944a118",LocalAddress="IPV4/UDP/204.8.216.89/5060",RemoteAddress="IPV4/UDP/77.247.110.166/6050",Challenge="1bdc06b8",ReceivedChallenge="1bdc06b8",ReceivedHash="0ffee36a4728feb51c8cd0798e240479"
\[2020-01-06 23:43:39\] SECURITY\[2093\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-01-06T23:43:39.875+0100",Severity="Error",Service="SIP",EventVersion="2",Ac
...
2020-01-07 06:46:15
112.27.250.251 attack
Unauthorized connection attempt detected from IP address 112.27.250.251 to port 2220 [J]
2020-01-07 06:59:11
106.75.157.9 attack
Jan  6 17:36:05 onepro3 sshd[12189]: Failed password for invalid user juanangel from 106.75.157.9 port 40922 ssh2
Jan  6 17:55:09 onepro3 sshd[12351]: Failed password for invalid user activemq from 106.75.157.9 port 46850 ssh2
Jan  6 17:58:33 onepro3 sshd[12402]: Failed password for invalid user Plainfield from 106.75.157.9 port 40334 ssh2
2020-01-07 07:08:06
123.138.18.11 attack
Unauthorized connection attempt detected from IP address 123.138.18.11 to port 2220 [J]
2020-01-07 07:11:20
42.6.171.122 attackspam
" "
2020-01-07 07:06:16
149.56.101.239 attackbotsspam
149.56.101.239 - - \[06/Jan/2020:21:51:08 +0100\] "POST /wp-login.php HTTP/1.0" 200 6699 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
149.56.101.239 - - \[06/Jan/2020:21:51:10 +0100\] "POST /wp-login.php HTTP/1.0" 200 6499 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
149.56.101.239 - - \[06/Jan/2020:21:51:11 +0100\] "POST /wp-login.php HTTP/1.0" 200 6515 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-01-07 06:50:38
36.65.155.54 attackspam
Unauthorized connection attempt detected from IP address 36.65.155.54 to port 23
2020-01-07 07:00:19
101.96.113.50 attack
Jan  6 20:42:42 powerpi2 sshd[26412]: Invalid user barison from 101.96.113.50 port 39076
Jan  6 20:42:44 powerpi2 sshd[26412]: Failed password for invalid user barison from 101.96.113.50 port 39076 ssh2
Jan  6 20:50:55 powerpi2 sshd[26876]: Invalid user yjs from 101.96.113.50 port 58002
...
2020-01-07 06:59:52
51.158.25.170 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2020-01-07 06:42:51
149.56.141.193 attackbotsspam
Unauthorized connection attempt detected from IP address 149.56.141.193 to port 2220 [J]
2020-01-07 07:03:31
106.12.18.225 attackspambots
Unauthorized connection attempt detected from IP address 106.12.18.225 to port 2220 [J]
2020-01-07 07:11:04
139.59.172.23 attackspam
139.59.172.23 - - \[06/Jan/2020:22:11:22 +0100\] "POST /wp-login.php HTTP/1.0" 200 7556 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
139.59.172.23 - - \[06/Jan/2020:22:11:23 +0100\] "POST /wp-login.php HTTP/1.0" 200 7381 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
139.59.172.23 - - \[06/Jan/2020:22:11:25 +0100\] "POST /wp-login.php HTTP/1.0" 200 7376 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-01-07 07:04:16
220.133.90.226 attack
Automatic report - Port Scan Attack
2020-01-07 06:51:05
103.105.56.39 attack
Jan  6 16:23:34 ingram sshd[28857]: Invalid user aasrum from 103.105.56.39
Jan  6 16:23:34 ingram sshd[28857]: Failed password for invalid user aasrum from 103.105.56.39 port 38286 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.105.56.39
2020-01-07 06:53:49
151.80.46.40 attackspam
Unauthorized connection attempt detected from IP address 151.80.46.40 to port 2220 [J]
2020-01-07 06:44:15

最近上报的IP列表

154.86.213.174 119.81.0.0 2403:6200:8813:7e06:b178:e81e:268c:162d 160.3.95.249
119.0.0.0 136.124.72.172 174.58.21.171 122.73.119.31
2a02:8108:8980:804:85f:f971:ea77:af2f 114.188.34.41 70.28.64.255 90.174.107.129
38.7.163.232 2a02:560:428f:c600:2d66:1128:a41d:c99b 189.64.223.44 50.199.219.200
53.162.55.210 24.53.27.221 96.114.233.105 168.232.128.183