必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Valdosta

省份(region): Georgia

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.117.214.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42730
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.117.214.48.			IN	A

;; AUTHORITY SECTION:
.			58	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010300 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 03 18:24:04 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 48.214.117.159.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.214.117.159.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.12.50.53 attackspam
Time:     Sun Aug 23 19:34:54 2020 -0300
IP:       106.12.50.53 (CN/China/-)
Failures: 5 (mod_security)
Interval: 3600 seconds
Blocked:  Permanent Block
2020-08-24 07:15:14
201.110.227.145 attack
445/tcp
[2020-08-23]1pkt
2020-08-24 07:27:40
51.77.215.227 attackspam
k+ssh-bruteforce
2020-08-24 07:07:17
119.29.173.247 attackbotsspam
SSH Brute-Forcing (server1)
2020-08-24 07:32:47
89.248.168.217 attackbots
firewall-block, port(s): 6481/udp
2020-08-24 07:15:45
189.173.85.218 attackbots
445/tcp
[2020-08-23]1pkt
2020-08-24 07:04:23
37.45.151.171 attackbots
445/tcp
[2020-08-23]1pkt
2020-08-24 07:11:02
61.177.172.61 attackspam
Aug 24 01:24:54 ip106 sshd[14418]: Failed password for root from 61.177.172.61 port 33541 ssh2
Aug 24 01:24:58 ip106 sshd[14418]: Failed password for root from 61.177.172.61 port 33541 ssh2
...
2020-08-24 07:26:07
200.120.211.128 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-24 07:23:22
91.190.161.60 attackspam
WordPress wp-login brute force :: 91.190.161.60 0.104 - [23/Aug/2020:20:32:53  0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 2411 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2020-08-24 07:34:29
34.75.125.212 attackbotsspam
Aug 23 22:02:49 ip-172-31-16-56 sshd\[20392\]: Invalid user photo from 34.75.125.212\
Aug 23 22:02:51 ip-172-31-16-56 sshd\[20392\]: Failed password for invalid user photo from 34.75.125.212 port 53048 ssh2\
Aug 23 22:06:43 ip-172-31-16-56 sshd\[20416\]: Invalid user openerp from 34.75.125.212\
Aug 23 22:06:45 ip-172-31-16-56 sshd\[20416\]: Failed password for invalid user openerp from 34.75.125.212 port 34352 ssh2\
Aug 23 22:10:23 ip-172-31-16-56 sshd\[20537\]: Invalid user qma from 34.75.125.212\
2020-08-24 07:28:44
118.8.81.220 attack
23/tcp
[2020-08-23]1pkt
2020-08-24 07:01:04
118.89.105.232 attackspambots
6379/tcp
[2020-08-23]1pkt
2020-08-24 07:12:14
106.13.86.54 attack
Invalid user nagios1 from 106.13.86.54 port 46146
2020-08-24 07:34:11
41.62.91.97 attackbotsspam
2020-08-23 15:31:32.485883-0500  localhost smtpd[19970]: NOQUEUE: reject: RCPT from unknown[41.62.91.97]: 554 5.7.1 Service unavailable; Client host [41.62.91.97] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/41.62.91.97; from= to= proto=ESMTP helo=<[41.62.91.97]>
2020-08-24 07:14:59

最近上报的IP列表

220.156.122.117 214.71.194.250 221.76.191.240 31.204.224.204
230.29.118.107 213.22.137.177 95.79.165.150 17.158.215.61
6.79.143.163 42.60.107.236 109.205.227.167 3.120.204.211
160.132.20.193 63.32.148.76 162.206.134.124 125.159.53.144
78.72.218.205 181.155.237.35 56.52.21.74 233.54.91.35