必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Colombia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.97.221.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49265
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;190.97.221.94.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021000 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 15:56:39 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
94.221.97.190.in-addr.arpa domain name pointer 190-97-221-94-BUE.ert.com.co.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
94.221.97.190.in-addr.arpa	name = 190-97-221-94-BUE.ert.com.co.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
74.6.131.217 spam
Podvodný spam!
Received: from sonic311-43.consmr.mail.bf2.yahoo.com (sonic311-43.consmr.mail.bf2.yahoo.com [74.6.131.217])
	by email-smtpd17. (Seznam SMTPD 1.3.137) with ESMTP;
	Wed, 17 Aug 2022 17:48:56 +0200 (CEST)  
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1660751333; bh=sYB7O8PVzZ3c1+uYiSSY3SpQME/C3EHZAb61FfXsudA=; h=From:Date:To:Cc:References:From:Subject:Reply-To; b=Bv1Cf9yFLqnPB4oFw981MwLFVmeZpjEaVsnNHojnL9Dx33197/khXGpEk4SX2pSw9eh+WS8hDwh6l4C+leuDtLC2xtil4vbjBfyk8/MFS4iJQw+WlDn7KJe1kcPs0yK0xMpEmS3QJojg60g3FJ/hC3xhV7YGdoiIJuGziK0N+dj8P7OzcvNjm8XXkCakYcpo7Zopc+JzwXwOScVD1tCaI4rtFYdya/JZvjN6dODLBFD6019pyNu/jIYptrPyHSKZGzmt0mcU4562XJ98Qjsa9J+Y+DC77JTzgdPdrlLtKFMV22SuygomrH3rP56XYgO5oj1ZL10QAE5/8QsZih8riw==
From: panfil.alexandrina@yahoo.com
jalk.pdf
2022-08-18 00:12:15
103.145.13.88 attack
Port Scan
2022-08-18 13:44:23
167.99.248.252 attack
Sep  3 05:31:57 host sshd[2214]: Failed password for root from 167.99.248.252 port 40276 ssh2
Sep  3 05:31:57 host sshd[2203]: Failed password for root from 167.99.248.252 port 39580 ssh2
Sep  3 05:31:57 host sshd[2179]: Failed password for root from 167.99.248.252 port 38018 ssh2
Sep  3 05:31:57 host sshd[2196]: Failed password for root from 167.99.248.252 port 39254 ssh2
2022-09-05 08:21:45
20.26.235.21 attack
client 20.26.235.21 sent malformed packet (size: 26625, cmd: 843933184)
2022-08-01 13:20:47
211.236.225.41 attack
DDoS
2022-08-26 12:48:33
107.180.46.26 normal
secureserver
2022-08-12 04:32:28
200.68.159.87 spambotsproxy
Roban mi información
2022-08-29 19:43:19
185.236.228.101 spamattack
this IP was used to hack my website
2022-08-04 21:00:43
192.168.1.100 proxynormal
192.168.1.100
2022-08-29 20:48:19
2001:0002:14:5:1:2:bf35:2610 spamattack
Bad ip addresses
2022-08-25 10:24:45
43.128.104.42 spambotsattackproxynormal
who own this IP
2022-08-30 22:48:16
174.127.195.30 spambotsattackproxynormal
John Fitz Marcus Hook pa
2022-08-22 20:06:19
222.252.29.244 attack
Hacker
2022-08-09 23:05:04
163.171.132.38 attack
Scan port
2022-08-08 12:59:58
175.6.148.219 attack
Port Scan SSHD
2022-07-31 08:48:38

最近上报的IP列表

41.91.149.132 168.175.59.251 146.66.223.57 246.30.154.86
226.70.149.88 8.165.227.203 97.145.65.236 101.69.51.185
114.162.241.219 44.132.120.49 14.19.87.54 236.243.241.126
172.66.234.35 179.39.161.75 144.173.139.148 229.137.142.248
30.75.155.129 93.134.102.163 87.147.150.239 122.154.227.148