必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.89.69.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53934
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.89.69.134.			IN	A

;; AUTHORITY SECTION:
.			471	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021123001 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 31 09:32:11 CST 2021
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 134.69.89.164.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 164.89.69.134.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
38.203.0.226 spam
boring unsollicited spam emails
2020-05-11 01:53:28
185.216.140.252 attackspam
 TCP (SYN) 185.216.140.252:55193 -> port 1647, len 44
2020-05-11 01:50:18
61.228.153.203 attack
Honeypot attack, port: 445, PTR: 61-228-153-203.dynamic-ip.hinet.net.
2020-05-11 01:40:26
170.106.33.94 attack
Invalid user wangk from 170.106.33.94 port 55830
2020-05-11 01:38:31
198.108.66.184 attackbots
 TCP (SYN) 198.108.66.184:58669 -> port 6379, len 44
2020-05-11 01:57:40
62.42.5.118 attackspambots
Honeypot attack, port: 81, PTR: 62.42.5.118.dyn.user.ono.com.
2020-05-11 02:02:34
137.215.181.250 attack
Honeypot attack, port: 445, PTR: gksc2k8main.up.ac.za.
2020-05-11 01:48:50
124.225.69.95 attackbots
$f2bV_matches
2020-05-11 01:58:48
222.95.98.125 attackbots
Port probing on unauthorized port 5555
2020-05-11 01:31:25
202.175.122.210 attackbots
Honeypot attack, port: 81, PTR: z122l210.static.ctm.net.
2020-05-11 01:34:45
197.240.170.178 attack
scan r
2020-05-11 01:50:42
200.75.24.156 attackbotsspam
Honeypot attack, port: 81, PTR: static.200.75.24.156.gtdinternet.com.
2020-05-11 02:00:20
125.71.225.229 attackbots
1589112610 - 05/10/2020 14:10:10 Host: 125.71.225.229/125.71.225.229 Port: 445 TCP Blocked
2020-05-11 02:02:03
114.34.184.208 attackspam
firewall-block, port(s): 81/tcp
2020-05-11 01:59:31
197.90.245.30 attackbots
Honeypot attack, port: 81, PTR: 197-90-245-30.hff.mweb.co.za.
2020-05-11 01:28:32

最近上报的IP列表

0.59.8.241 131.168.180.195 34.241.55.212 185.218.169.137
16.147.78.23 187.62.124.61 206.241.155.217 243.231.50.26
56.213.81.117 107.88.57.108 215.176.251.71 129.21.26.179
97.44.189.128 121.238.227.49 0.1.212.209 207.10.232.58
170.86.92.149 3.253.5.148 29.207.71.226 19.159.143.141