必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.109.41.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22923
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.109.41.20.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012500 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 01:41:39 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 20.41.109.164.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 164.109.41.20.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
85.98.209.217 attackspambots
Unauthorized connection attempt detected from IP address 85.98.209.217 to port 23
2020-06-14 02:50:09
35.198.105.76 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-06-14 02:39:35
198.12.156.214 attackbots
10 attempts against mh-misc-ban on heat
2020-06-14 02:35:15
91.121.211.34 attackspam
2020-06-13T20:12:04.349394vps751288.ovh.net sshd\[31769\]: Invalid user pranava from 91.121.211.34 port 57362
2020-06-13T20:12:04.358200vps751288.ovh.net sshd\[31769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns337826.ip-91-121-211.eu
2020-06-13T20:12:06.603854vps751288.ovh.net sshd\[31769\]: Failed password for invalid user pranava from 91.121.211.34 port 57362 ssh2
2020-06-13T20:21:32.966388vps751288.ovh.net sshd\[31840\]: Invalid user kongxt from 91.121.211.34 port 57518
2020-06-13T20:21:32.974314vps751288.ovh.net sshd\[31840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns337826.ip-91-121-211.eu
2020-06-14 02:34:06
116.236.147.38 attack
Jun 13 15:11:48 vps647732 sshd[17069]: Failed password for root from 116.236.147.38 port 50592 ssh2
...
2020-06-14 02:30:35
111.229.28.34 attack
Jun 13 20:34:35 home sshd[14934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.28.34
Jun 13 20:34:37 home sshd[14934]: Failed password for invalid user zhangguangyao from 111.229.28.34 port 33850 ssh2
Jun 13 20:38:54 home sshd[15321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.28.34
...
2020-06-14 02:50:28
206.189.128.215 attack
 TCP (SYN) 206.189.128.215:46510 -> port 4811, len 44
2020-06-14 03:04:16
14.170.111.29 attackbots
1592050914 - 06/13/2020 14:21:54 Host: 14.170.111.29/14.170.111.29 Port: 445 TCP Blocked
2020-06-14 02:47:56
180.168.201.126 attackbotsspam
SSH login attempts.
2020-06-14 02:55:59
120.193.155.140 attack
Attempted connection to port 1022.
2020-06-14 02:51:55
36.92.95.10 attackbots
Jun 13 15:03:33 ns41 sshd[15922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.95.10
2020-06-14 02:59:21
129.205.112.253 attack
2020-06-13T20:36:36.655833lavrinenko.info sshd[20081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.205.112.253
2020-06-13T20:36:36.644878lavrinenko.info sshd[20081]: Invalid user matlab from 129.205.112.253 port 49070
2020-06-13T20:36:39.090135lavrinenko.info sshd[20081]: Failed password for invalid user matlab from 129.205.112.253 port 49070 ssh2
2020-06-13T20:41:00.189094lavrinenko.info sshd[20403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.205.112.253  user=root
2020-06-13T20:41:02.535327lavrinenko.info sshd[20403]: Failed password for root from 129.205.112.253 port 48942 ssh2
...
2020-06-14 02:49:08
14.186.4.235 attack
Automatic report - Port Scan
2020-06-14 02:59:53
42.107.135.255 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-06-14 02:42:42
111.229.85.222 attackbots
(sshd) Failed SSH login from 111.229.85.222 (CN/China/-): 5 in the last 3600 secs
2020-06-14 02:37:50

最近上报的IP列表

218.255.84.14 9.30.163.0 141.208.141.247 146.65.253.246
154.41.113.53 131.237.162.56 221.209.65.0 192.189.46.204
227.221.21.207 36.188.99.79 106.33.41.124 36.133.217.235
120.109.219.182 61.201.214.134 190.249.96.140 176.110.149.109
65.242.8.98 23.206.216.194 65.97.216.118 80.210.39.10