必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 156.11.131.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42418
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;156.11.131.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 18:20:51 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 21.131.11.156.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.131.11.156.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
54.38.54.248 attackbots
belitungshipwreck.org 54.38.54.248 [29/Aug/2020:08:11:29 +0200] "POST /wp-login.php HTTP/1.1" 200 6459 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
belitungshipwreck.org 54.38.54.248 [29/Aug/2020:08:11:30 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4096 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-29 16:03:06
192.35.168.150 attackbotsspam
 TCP (SYN) 192.35.168.150:57383 -> port 587, len 44
2020-08-29 16:25:51
200.10.96.188 attackbotsspam
200.10.96.188 - - \[29/Aug/2020:09:13:33 +0200\] "POST /wp-login.php HTTP/1.0" 200 2797 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
200.10.96.188 - - \[29/Aug/2020:09:13:36 +0200\] "POST /wp-login.php HTTP/1.0" 200 2796 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
200.10.96.188 - - \[29/Aug/2020:09:13:39 +0200\] "POST /wp-login.php HTTP/1.0" 200 2770 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-08-29 16:07:10
192.34.108.130 attackbotsspam
445/tcp 445/tcp 1433/tcp
[2020-08-08/29]3pkt
2020-08-29 16:22:12
50.67.178.164 attackbots
<6 unauthorized SSH connections
2020-08-29 16:27:11
51.68.196.163 attack
Aug 29 11:11:45 hosting sshd[14177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.ip-51-68-196.eu  user=root
Aug 29 11:11:48 hosting sshd[14177]: Failed password for root from 51.68.196.163 port 42464 ssh2
...
2020-08-29 16:35:18
188.162.229.136 attack
Unauthorized connection attempt from IP address 188.162.229.136 on Port 445(SMB)
2020-08-29 16:08:52
111.125.82.91 attack
Unauthorized connection attempt from IP address 111.125.82.91 on Port 445(SMB)
2020-08-29 16:23:14
114.41.227.19 attack
Brute forcing RDP port 3389
2020-08-29 16:21:05
41.111.133.103 attackbotsspam
Aug 28 22:20:20 dignus sshd[6465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.111.133.103
Aug 28 22:20:22 dignus sshd[6465]: Failed password for invalid user xmeta from 41.111.133.103 port 9967 ssh2
Aug 28 22:24:12 dignus sshd[6997]: Invalid user test from 41.111.133.103 port 23740
Aug 28 22:24:12 dignus sshd[6997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.111.133.103
Aug 28 22:24:14 dignus sshd[6997]: Failed password for invalid user test from 41.111.133.103 port 23740 ssh2
...
2020-08-29 15:59:58
27.72.126.19 attack
445/tcp 445/tcp 445/tcp...
[2020-07-05/08-29]4pkt,1pt.(tcp)
2020-08-29 16:04:30
58.59.101.110 attackbotsspam
1598678110 - 08/29/2020 07:15:10 Host: 58.59.101.110/58.59.101.110 Port: 445 TCP Blocked
2020-08-29 16:01:00
202.176.129.142 attackspam
Unauthorized connection attempt from IP address 202.176.129.142 on Port 445(SMB)
2020-08-29 15:55:18
218.57.129.37 attackbotsspam
5801/tcp 5903/tcp 5901/tcp...
[2020-07-18/08-29]11pkt,4pt.(tcp)
2020-08-29 16:23:29
51.178.40.97 attackspam
Aug 29 05:52:35 electroncash sshd[12505]: Invalid user uts from 51.178.40.97 port 50440
Aug 29 05:52:35 electroncash sshd[12505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.40.97 
Aug 29 05:52:35 electroncash sshd[12505]: Invalid user uts from 51.178.40.97 port 50440
Aug 29 05:52:37 electroncash sshd[12505]: Failed password for invalid user uts from 51.178.40.97 port 50440 ssh2
Aug 29 05:56:06 electroncash sshd[13462]: Invalid user alec from 51.178.40.97 port 56832
...
2020-08-29 15:57:26

最近上报的IP列表

191.226.151.55 163.214.131.177 84.96.146.52 139.147.112.119
117.242.194.86 184.228.15.53 47.228.53.37 184.148.43.128
168.180.182.218 171.30.91.174 22.95.249.72 149.188.111.17
231.203.122.92 40.179.26.218 74.99.239.121 130.64.82.157
192.175.115.63 8.203.67.188 48.173.163.231 206.245.38.207