必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.20.3.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55001
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.20.3.164.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022201 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 02:54:58 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 164.3.20.169.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.3.20.169.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
200.24.84.12 attackbots
Autoban   200.24.84.12 AUTH/CONNECT
2019-11-25 16:11:27
74.208.94.213 attackbots
Nov 25 09:10:14 mail sshd[12104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.208.94.213 
Nov 25 09:10:16 mail sshd[12104]: Failed password for invalid user 777777777 from 74.208.94.213 port 39008 ssh2
Nov 25 09:16:31 mail sshd[13576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.208.94.213
2019-11-25 16:28:19
145.239.88.31 attackspam
xmlrpc attack
2019-11-25 16:16:03
130.61.51.26 attackbotsspam
abuse
2019-11-25 16:33:03
65.49.33.62 attackspam
firewall-block, port(s): 445/tcp
2019-11-25 16:06:45
118.70.185.229 attack
Nov 24 22:14:41 sachi sshd\[22508\]: Invalid user uluao from 118.70.185.229
Nov 24 22:14:41 sachi sshd\[22508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.185.229
Nov 24 22:14:44 sachi sshd\[22508\]: Failed password for invalid user uluao from 118.70.185.229 port 42912 ssh2
Nov 24 22:22:16 sachi sshd\[23135\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.185.229  user=root
Nov 24 22:22:18 sachi sshd\[23135\]: Failed password for root from 118.70.185.229 port 51916 ssh2
2019-11-25 16:23:39
58.56.104.250 attack
Unauthorised access (Nov 25) SRC=58.56.104.250 LEN=52 TTL=114 ID=31857 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov 25) SRC=58.56.104.250 LEN=52 TTL=114 ID=16896 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-25 16:17:30
113.89.69.229 attackspam
Nov 24 20:24:02 web1 sshd\[19811\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.89.69.229  user=root
Nov 24 20:24:03 web1 sshd\[19811\]: Failed password for root from 113.89.69.229 port 34030 ssh2
Nov 24 20:29:28 web1 sshd\[20303\]: Invalid user durval from 113.89.69.229
Nov 24 20:29:28 web1 sshd\[20303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.89.69.229
Nov 24 20:29:30 web1 sshd\[20303\]: Failed password for invalid user durval from 113.89.69.229 port 36391 ssh2
2019-11-25 16:17:05
113.62.176.98 attackspambots
Nov 25 06:15:32 XXXXXX sshd[29360]: Invalid user oliverio from 113.62.176.98 port 51347
2019-11-25 16:18:43
1.213.195.154 attackspam
ssh brute force
2019-11-25 16:15:03
171.61.129.253 attackbots
Automatic report - Port Scan Attack
2019-11-25 16:07:20
101.36.153.183 attackbotsspam
Nov 25 07:38:46 localhost sshd\[69341\]: Invalid user katsu123 from 101.36.153.183 port 59904
Nov 25 07:38:46 localhost sshd\[69341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.153.183
Nov 25 07:38:48 localhost sshd\[69341\]: Failed password for invalid user katsu123 from 101.36.153.183 port 59904 ssh2
Nov 25 07:47:22 localhost sshd\[69647\]: Invalid user Dark@123 from 101.36.153.183 port 49854
Nov 25 07:47:22 localhost sshd\[69647\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.153.183
...
2019-11-25 16:31:00
160.238.241.130 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/160.238.241.130/ 
 
 BR - 1H : (115)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN266572 
 
 IP : 160.238.241.130 
 
 CIDR : 160.238.241.0/24 
 
 PREFIX COUNT : 4 
 
 UNIQUE IP COUNT : 1024 
 
 
 ATTACKS DETECTED ASN266572 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-25 07:28:56 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-25 16:33:51
139.155.74.38 attackspambots
$f2bV_matches
2019-11-25 16:14:50
103.219.143.9 attack
1574663377 - 11/25/2019 07:29:37 Host: 103.219.143.9/103.219.143.9 Port: 6001 TCP Blocked
2019-11-25 16:15:50

最近上报的IP列表

37.55.78.108 88.205.3.245 219.2.170.18 131.106.94.9
18.127.131.102 41.234.81.112 143.38.53.28 30.67.5.209
94.89.133.34 240.214.37.180 62.179.81.228 81.41.230.247
248.241.211.171 8.197.133.152 149.46.59.234 184.191.90.125
177.243.30.106 148.148.249.46 196.30.148.51 250.205.153.62