必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 16.164.58.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30414
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;16.164.58.82.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 15:28:56 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 82.58.164.16.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 82.58.164.16.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
195.231.6.156 attack
Sep 15 16:23:57 diego postfix/smtpd\[1906\]: warning: unknown\[195.231.6.156\]: SASL LOGIN authentication failed: authentication failure
...
2019-09-15 21:27:42
82.202.161.165 attackspam
3389BruteforceFW22
2019-09-15 22:13:45
42.51.194.35 attackspam
Unauthorized connection attempt from IP address 42.51.194.35 on Port 3306(MYSQL)
2019-09-15 22:07:14
132.255.16.58 attack
Chat Spam
2019-09-15 21:30:04
39.96.64.1 attack
CN - 1H : (335)  Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN37963 
 
 IP : 39.96.64.1 
 
 CIDR : 39.96.0.0/14 
 
 PREFIX COUNT : 303 
 
 UNIQUE IP COUNT : 6062848 
 
 
 WYKRYTE ATAKI Z ASN37963 :  
  1H - 1 
  3H - 3 
  6H - 5 
 12H - 8 
 24H - 17 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery 
  https://help-dysk.pl
2019-09-15 21:20:07
51.38.185.121 attackbots
Invalid user developer from 51.38.185.121 port 40102
2019-09-15 21:16:42
103.60.212.221 attack
Sep 15 03:20:56 auw2 sshd\[26372\]: Invalid user lenny from 103.60.212.221
Sep 15 03:20:56 auw2 sshd\[26372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.60.212.221
Sep 15 03:20:57 auw2 sshd\[26372\]: Failed password for invalid user lenny from 103.60.212.221 port 58678 ssh2
Sep 15 03:25:09 auw2 sshd\[26743\]: Invalid user ovidio from 103.60.212.221
Sep 15 03:25:09 auw2 sshd\[26743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.60.212.221
2019-09-15 21:42:13
103.207.11.10 attackbots
Invalid user teste from 103.207.11.10 port 40256
2019-09-15 21:09:29
46.105.110.79 attackbots
Invalid user usuario from 46.105.110.79 port 36862
2019-09-15 21:17:12
153.36.242.143 attackspambots
Sep 15 18:57:32 areeb-Workstation sshd[4181]: Failed password for root from 153.36.242.143 port 63683 ssh2
Sep 15 18:57:34 areeb-Workstation sshd[4181]: Failed password for root from 153.36.242.143 port 63683 ssh2
...
2019-09-15 21:39:14
178.128.86.127 attackspambots
Sep 15 15:31:41 mail sshd\[9070\]: Invalid user tarun from 178.128.86.127 port 56652
Sep 15 15:31:41 mail sshd\[9070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.86.127
Sep 15 15:31:42 mail sshd\[9070\]: Failed password for invalid user tarun from 178.128.86.127 port 56652 ssh2
Sep 15 15:36:46 mail sshd\[9788\]: Invalid user usa from 178.128.86.127 port 44062
Sep 15 15:36:46 mail sshd\[9788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.86.127
2019-09-15 21:42:51
80.82.65.60 attack
Sep 15 15:56:48 relay dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=80.82.65.60, lip=176.9.177.164, session=\<06mp25eSWjNQUkE8\>
Sep 15 15:56:59 relay dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 6 secs\): user=\, method=PLAIN, rip=80.82.65.60, lip=176.9.177.164, session=\
Sep 15 15:57:15 relay dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 10 secs\): user=\, method=PLAIN, rip=80.82.65.60, lip=176.9.177.164, session=\
Sep 15 15:59:17 relay dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=80.82.65.60, lip=176.9.177.164, session=\<2hWJ5JeScApQUkE8\>
Sep 15 16:01:40 relay dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN
...
2019-09-15 22:08:59
14.189.107.229 attack
2019-09-15T04:47:17.436854stark.klein-stark.info sshd\[13664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.189.107.229  user=root
2019-09-15T04:47:19.744338stark.klein-stark.info sshd\[13664\]: Failed password for root from 14.189.107.229 port 45838 ssh2
2019-09-15T04:47:22.746303stark.klein-stark.info sshd\[13664\]: Failed password for root from 14.189.107.229 port 45838 ssh2
...
2019-09-15 21:21:50
124.42.239.214 attack
Sep 15 03:35:00 web1 sshd\[2020\]: Invalid user stpi from 124.42.239.214
Sep 15 03:35:00 web1 sshd\[2020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.42.239.214
Sep 15 03:35:02 web1 sshd\[2020\]: Failed password for invalid user stpi from 124.42.239.214 port 34950 ssh2
Sep 15 03:40:43 web1 sshd\[2598\]: Invalid user ui from 124.42.239.214
Sep 15 03:40:43 web1 sshd\[2598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.42.239.214
2019-09-15 21:57:16
132.232.39.15 attack
Sep 15 15:35:30 mail sshd\[9571\]: Invalid user shaktidhar from 132.232.39.15 port 36084
Sep 15 15:35:30 mail sshd\[9571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.39.15
Sep 15 15:35:33 mail sshd\[9571\]: Failed password for invalid user shaktidhar from 132.232.39.15 port 36084 ssh2
Sep 15 15:42:06 mail sshd\[10671\]: Invalid user ops from 132.232.39.15 port 50404
Sep 15 15:42:06 mail sshd\[10671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.39.15
2019-09-15 21:44:34

最近上报的IP列表

234.239.89.99 71.206.220.238 40.180.158.123 137.188.245.107
23.186.126.0 53.156.91.174 228.37.33.219 143.224.233.8
82.248.102.35 72.8.158.185 205.160.104.95 163.230.12.110
119.239.159.47 195.21.226.250 128.85.26.32 24.156.142.153
5.130.115.49 71.222.64.28 115.245.112.55 129.221.5.129