必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Köln

省份(region): North Rhine-Westphalia

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.14.219.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36456
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;195.14.219.91.			IN	A

;; AUTHORITY SECTION:
.			516	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030200 1800 900 604800 86400

;; Query time: 131 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 02 20:07:55 CST 2020
;; MSG SIZE  rcvd: 117
HOST信息:
91.219.14.195.in-addr.arpa domain name pointer xdsl-195-14-219-91.nc.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
91.219.14.195.in-addr.arpa	name = xdsl-195-14-219-91.nc.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.176.27.42 attackbots
09/26/2019-13:44:23.749286 185.176.27.42 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-09-26 19:45:40
162.158.107.118 attackspambots
162.158.107.118 - - [26/Sep/2019:10:41:27 +0700] "GET /apple-touch-icon.png HTTP/1.1" 404 2828 "-" "Googlebot-Image/1.0"
2019-09-26 19:14:21
198.58.107.53 attack
v+ssh-bruteforce
2019-09-26 19:25:01
211.183.238.12 attackspam
firewall-block, port(s): 34567/tcp
2019-09-26 19:36:59
162.158.106.93 attack
162.158.106.93 - - [26/Sep/2019:10:41:16 +0700] "GET /js/service-worker/fetch.js HTTP/1.1" 200 6027 "https://web.floware.ml/" "Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.96 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)"
2019-09-26 19:23:33
59.127.99.21 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-26 19:21:56
162.158.106.82 attackbots
162.158.106.82 - - [26/Sep/2019:10:41:25 +0700] "GET /apple-touch-icon-120x120.png HTTP/1.1" 404 2828 "-" "Googlebot-Image/1.0"
2019-09-26 19:17:14
190.109.160.73 attack
postfix (unknown user, SPF fail or relay access denied)
2019-09-26 19:34:11
185.168.173.121 attackbotsspam
Port scan attempt detected by AWS-CCS, CTS, India
2019-09-26 19:42:18
159.203.193.43 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-26 19:48:16
92.119.160.80 attackbotsspam
09/26/2019-07:30:41.143916 92.119.160.80 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-26 19:42:50
108.162.246.140 attack
108.162.246.140 - - [26/Sep/2019:10:41:18 +0700] "GET /js/service-worker/promise.js HTTP/1.1" 200 5014 "https://web.floware.ml/" "Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.96 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)"
2019-09-26 19:21:04
221.0.189.38 attackbots
firewall-block, port(s): 23/tcp
2019-09-26 19:36:12
185.170.224.81 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-26 19:44:08
129.211.35.94 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-26 19:55:57

最近上报的IP列表

61.221.216.53 159.252.108.255 8.249.64.88 61.216.105.68
51.233.131.20 85.129.249.199 185.26.153.192 32.143.86.84
60.176.228.159 35.129.106.139 44.149.216.87 59.126.13.182
111.103.211.233 24.61.43.210 163.105.71.122 44.202.255.16
58.220.131.75 69.115.51.155 68.27.124.51 121.148.45.107