必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.252.99.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63368
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.252.99.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 23:01:53 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 20.99.252.13.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.99.252.13.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
54.39.187.138 attackspam
2019-10-05T12:05:30.095967shield sshd\[21157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=srv-test.faceldi.net  user=root
2019-10-05T12:05:31.713018shield sshd\[21157\]: Failed password for root from 54.39.187.138 port 45161 ssh2
2019-10-05T12:09:06.670096shield sshd\[21605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=srv-test.faceldi.net  user=root
2019-10-05T12:09:08.615930shield sshd\[21605\]: Failed password for root from 54.39.187.138 port 36713 ssh2
2019-10-05T12:12:45.114047shield sshd\[22230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=srv-test.faceldi.net  user=root
2019-10-05 20:27:19
51.254.123.127 attackbotsspam
2019-10-05T12:12:15.810600abusebot-3.cloudsearch.cf sshd\[24842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=127.ip-51-254-123.eu  user=root
2019-10-05 20:19:24
109.196.15.142 attack
Email address rejected
2019-10-05 20:13:01
189.148.63.139 attackbots
SMB Server BruteForce Attack
2019-10-05 20:24:46
186.201.49.203 attackspambots
2019-10-05T11:56:20.837549shield sshd\[20081\]: Invalid user Sun2017 from 186.201.49.203 port 55679
2019-10-05T11:56:20.843232shield sshd\[20081\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.201.49.203
2019-10-05T11:56:22.954825shield sshd\[20081\]: Failed password for invalid user Sun2017 from 186.201.49.203 port 55679 ssh2
2019-10-05T12:04:05.401198shield sshd\[21000\]: Invalid user 5TGB6YHN7UJM from 186.201.49.203 port 31516
2019-10-05T12:04:05.406396shield sshd\[21000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.201.49.203
2019-10-05 20:18:14
220.85.104.202 attackspambots
Oct  5 13:16:20 microserver sshd[19821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.85.104.202  user=root
Oct  5 13:16:22 microserver sshd[19821]: Failed password for root from 220.85.104.202 port 21348 ssh2
Oct  5 13:20:46 microserver sshd[20461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.85.104.202  user=root
Oct  5 13:20:48 microserver sshd[20461]: Failed password for root from 220.85.104.202 port 4551 ssh2
Oct  5 13:24:59 microserver sshd[20685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.85.104.202  user=root
Oct  5 13:37:59 microserver sshd[22600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.85.104.202  user=root
Oct  5 13:38:02 microserver sshd[22600]: Failed password for root from 220.85.104.202 port 49807 ssh2
Oct  5 13:42:20 microserver sshd[23217]: pam_unix(sshd:auth): authentication failure; logname= uid=
2019-10-05 20:27:33
193.154.102.197 attackbotsspam
Automatic report - Port Scan Attack
2019-10-05 20:36:05
138.68.136.152 attackbots
WordPress wp-login brute force :: 138.68.136.152 0.060 BYPASS [05/Oct/2019:21:40:21  1000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 4630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-05 20:47:51
119.96.227.19 attackspambots
Oct  5 02:15:17 friendsofhawaii sshd\[12842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.96.227.19  user=root
Oct  5 02:15:19 friendsofhawaii sshd\[12842\]: Failed password for root from 119.96.227.19 port 49348 ssh2
Oct  5 02:19:37 friendsofhawaii sshd\[13196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.96.227.19  user=root
Oct  5 02:19:39 friendsofhawaii sshd\[13196\]: Failed password for root from 119.96.227.19 port 54454 ssh2
Oct  5 02:23:58 friendsofhawaii sshd\[13560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.96.227.19  user=root
2019-10-05 20:26:59
185.36.81.230 attack
Oct  5 12:26:29 mail postfix/smtpd\[9309\]: warning: unknown\[185.36.81.230\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct  5 12:53:56 mail postfix/smtpd\[9830\]: warning: unknown\[185.36.81.230\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct  5 13:49:30 mail postfix/smtpd\[13627\]: warning: unknown\[185.36.81.230\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct  5 14:17:01 mail postfix/smtpd\[14340\]: warning: unknown\[185.36.81.230\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-10-05 20:41:24
157.245.66.20 attack
$f2bV_matches
2019-10-05 20:30:20
134.73.76.106 attackbotsspam
Sent Mail to address hacked/leaked/bought from crystalproductions.cz between 2011 and 2018
2019-10-05 20:51:21
27.254.130.69 attack
Oct  5 13:40:21 bouncer sshd\[3341\]: Invalid user Santos_123 from 27.254.130.69 port 54327
Oct  5 13:40:21 bouncer sshd\[3341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.130.69 
Oct  5 13:40:23 bouncer sshd\[3341\]: Failed password for invalid user Santos_123 from 27.254.130.69 port 54327 ssh2
...
2019-10-05 20:44:31
183.131.82.99 attackbots
Oct  5 17:44:09 areeb-Workstation sshd[23630]: Failed password for root from 183.131.82.99 port 44872 ssh2
Oct  5 17:44:11 areeb-Workstation sshd[23630]: Failed password for root from 183.131.82.99 port 44872 ssh2
...
2019-10-05 20:14:42
45.125.65.82 attackspam
Oct  5 12:22:56 mail postfix/smtpd\[7166\]: warning: unknown\[45.125.65.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct  5 12:49:31 mail postfix/smtpd\[10283\]: warning: unknown\[45.125.65.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct  5 13:42:12 mail postfix/smtpd\[13176\]: warning: unknown\[45.125.65.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct  5 14:09:02 mail postfix/smtpd\[14262\]: warning: unknown\[45.125.65.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-10-05 20:29:24

最近上报的IP列表

241.159.210.27 84.77.235.113 42.173.168.38 47.217.14.174
153.246.202.185 218.239.126.205 233.78.62.77 230.81.9.106
216.136.23.72 72.87.43.145 203.79.86.202 30.89.198.40
108.142.93.179 162.23.193.74 186.197.154.26 139.11.67.154
19.196.202.83 247.218.18.20 247.136.239.57 60.228.141.198