必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.18.65.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36072
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;133.18.65.100.			IN	A

;; AUTHORITY SECTION:
.			474	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 06:38:00 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
100.65.18.133.in-addr.arpa domain name pointer o4043-304.kagoya.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
100.65.18.133.in-addr.arpa	name = o4043-304.kagoya.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
89.248.172.16 attackspambots
Unauthorized connection attempt detected from IP address 89.248.172.16 to port 8334 [T]
2020-04-25 22:42:50
206.189.28.69 attackspambots
firewall-block, port(s): 16249/tcp
2020-04-25 23:10:06
192.241.239.62 attackspam
Port scan: Attack repeated for 24 hours
2020-04-25 23:11:23
61.243.161.163 attack
probes 3 times on the port 21872
2020-04-25 22:52:55
192.241.239.202 attackspambots
scans once in preceeding hours on the ports (in chronological order) 3050 resulting in total of 25 scans from 192.241.128.0/17 block.
2020-04-25 23:10:23
206.189.77.214 attack
firewall-block, port(s): 7512/tcp
2020-04-25 23:09:31
192.241.237.127 attackbots
" "
2020-04-25 23:16:12
80.82.77.189 attackspam
Apr 25 16:44:24 debian-2gb-nbg1-2 kernel: \[10084803.824981\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.77.189 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=35566 PROTO=TCP SPT=47007 DPT=29088 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-25 22:48:20
80.82.64.110 attack
probes 8 times on the port 34567 9527 resulting in total of 85 scans from 80.82.64.0/20 block.
2020-04-25 22:51:02
192.241.238.106 attackspambots
Unauthorized connection attempt detected from IP address 192.241.238.106 to port 7777 [T]
2020-04-25 23:13:03
51.91.247.125 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 36 - port: 9998 proto: TCP cat: Misc Attack
2020-04-25 22:54:55
192.241.237.216 attackspam
scans once in preceeding hours on the ports (in chronological order) 7574 resulting in total of 25 scans from 192.241.128.0/17 block.
2020-04-25 23:15:25
94.102.49.137 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 90 - port: 5959 proto: TCP cat: Misc Attack
2020-04-25 22:39:27
80.82.78.100 attackbotsspam
80.82.78.100 was recorded 21 times by 12 hosts attempting to connect to the following ports: 41022,6884,40831. Incident counter (4h, 24h, all-time): 21, 122, 25498
2020-04-25 22:46:45
45.141.85.106 attack
firewall-block, port(s): 3633/tcp, 3649/tcp
2020-04-25 22:59:45

最近上报的IP列表

133.18.65.105 133.18.65.181 133.18.65.83 133.18.65.26
133.18.65.81 133.18.65.76 133.18.66.164 133.18.66.232
133.18.66.51 133.18.67.133 133.18.67.17 133.18.66.87
133.18.67.35 133.18.68.28 133.18.68.43 133.18.66.16
133.18.68.51 133.18.68.50 133.18.68.56 133.18.67.48