必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.160.8.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58877
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.160.8.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 10:52:09 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 21.8.160.150.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.8.160.150.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
61.218.116.14 attackspambots
Unauthorized connection attempt from IP address 61.218.116.14 on Port 445(SMB)
2020-05-24 04:41:33
164.132.47.139 attackbots
May 23 22:18:02 vmd48417 sshd[3103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.47.139
2020-05-24 04:57:22
220.127.148.8 attackspambots
SSH Brute-Force reported by Fail2Ban
2020-05-24 04:48:50
212.83.183.57 attack
May 23 22:06:41 Invalid user jhk from 212.83.183.57 port 59515
2020-05-24 04:43:30
96.227.253.19 attackspambots
Zyxel Multiple Products Command Injection Vulnerability
2020-05-24 05:01:26
59.127.96.77 attackbots
Port probing on unauthorized port 23
2020-05-24 05:01:50
111.231.94.138 attackbotsspam
May 23 22:27:38 meumeu sshd[337510]: Invalid user dto from 111.231.94.138 port 51504
May 23 22:27:38 meumeu sshd[337510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.94.138 
May 23 22:27:38 meumeu sshd[337510]: Invalid user dto from 111.231.94.138 port 51504
May 23 22:27:40 meumeu sshd[337510]: Failed password for invalid user dto from 111.231.94.138 port 51504 ssh2
May 23 22:32:14 meumeu sshd[340968]: Invalid user ewr from 111.231.94.138 port 47408
May 23 22:32:14 meumeu sshd[340968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.94.138 
May 23 22:32:14 meumeu sshd[340968]: Invalid user ewr from 111.231.94.138 port 47408
May 23 22:32:15 meumeu sshd[340968]: Failed password for invalid user ewr from 111.231.94.138 port 47408 ssh2
May 23 22:36:42 meumeu sshd[341604]: Invalid user cgs from 111.231.94.138 port 43304
...
2020-05-24 04:43:02
35.231.211.161 attackbotsspam
May 23 22:15:25 plex sshd[24715]: Invalid user idw from 35.231.211.161 port 34908
2020-05-24 04:59:28
1.7.145.207 attackbots
Unauthorized connection attempt from IP address 1.7.145.207 on Port 445(SMB)
2020-05-24 05:17:24
75.119.216.13 attackspam
WordPress Login Brute Force Attempt, PTR: ps104909.dreamhostps.com.
2020-05-24 04:48:20
178.128.122.126 attackbots
May 23 22:15:15 santamaria sshd\[2121\]: Invalid user ryr from 178.128.122.126
May 23 22:15:15 santamaria sshd\[2121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.122.126
May 23 22:15:17 santamaria sshd\[2121\]: Failed password for invalid user ryr from 178.128.122.126 port 59470 ssh2
...
2020-05-24 05:10:17
83.217.28.85 attackbotsspam
Unauthorized connection attempt from IP address 83.217.28.85 on Port 445(SMB)
2020-05-24 05:17:39
36.67.248.206 attackbots
May 23 16:45:37 NPSTNNYC01T sshd[12133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.67.248.206
May 23 16:45:40 NPSTNNYC01T sshd[12133]: Failed password for invalid user whc from 36.67.248.206 port 41864 ssh2
May 23 16:49:59 NPSTNNYC01T sshd[12545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.67.248.206
...
2020-05-24 04:53:12
85.111.77.29 attackspambots
Unauthorized connection attempt from IP address 85.111.77.29 on Port 445(SMB)
2020-05-24 04:52:43
146.185.163.81 attackspambots
146.185.163.81 - - [23/May/2020:22:15:30 +0200] "GET /wp-login.php HTTP/1.1" 200 6702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
146.185.163.81 - - [23/May/2020:22:15:30 +0200] "POST /wp-login.php HTTP/1.1" 200 6953 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
146.185.163.81 - - [23/May/2020:22:15:31 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-24 04:49:41

最近上报的IP列表

212.150.144.105 224.40.243.95 121.183.80.29 129.157.66.118
116.215.175.149 37.19.165.48 68.174.185.72 77.68.98.250
216.148.153.249 118.64.194.191 191.163.21.204 71.90.156.61
205.65.208.106 155.7.148.11 178.232.187.230 228.130.23.191
21.120.4.192 2.108.87.49 152.150.22.112 93.143.89.178