必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Morocco

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.80.11.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60961
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;196.80.11.100.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 07:02:45 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 100.11.80.196.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 100.11.80.196.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
150.95.217.213 attackbots
May 11 15:47:32 lukav-desktop sshd\[8341\]: Invalid user ts3server3 from 150.95.217.213
May 11 15:47:32 lukav-desktop sshd\[8341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.217.213
May 11 15:47:34 lukav-desktop sshd\[8341\]: Failed password for invalid user ts3server3 from 150.95.217.213 port 43706 ssh2
May 11 15:51:38 lukav-desktop sshd\[8449\]: Invalid user il from 150.95.217.213
May 11 15:51:38 lukav-desktop sshd\[8449\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.217.213
2020-05-11 22:00:12
188.128.28.59 attackbots
May 10 23:57:55 hostnameproxy sshd[4928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.128.28.59  user=r.r
May 10 23:57:57 hostnameproxy sshd[4928]: Failed password for r.r from 188.128.28.59 port 26880 ssh2
May 10 23:58:41 hostnameproxy sshd[4980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.128.28.59  user=r.r
May 10 23:58:43 hostnameproxy sshd[4980]: Failed password for r.r from 188.128.28.59 port 9489 ssh2
May 10 23:59:16 hostnameproxy sshd[5007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.128.28.59  user=r.r
May 10 23:59:18 hostnameproxy sshd[5007]: Failed password for r.r from 188.128.28.59 port 24454 ssh2
May 10 23:59:42 hostnameproxy sshd[5027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.128.28.59  user=r.r
May 10 23:59:44 hostnameproxy sshd[5027]: Failed password for r.r f........
------------------------------
2020-05-11 21:58:11
45.55.246.3 attack
2020-05-11T14:59:36.418040sd-86998 sshd[40834]: Invalid user ubuntu from 45.55.246.3 port 58232
2020-05-11T14:59:36.422992sd-86998 sshd[40834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.246.3
2020-05-11T14:59:36.418040sd-86998 sshd[40834]: Invalid user ubuntu from 45.55.246.3 port 58232
2020-05-11T14:59:38.121988sd-86998 sshd[40834]: Failed password for invalid user ubuntu from 45.55.246.3 port 58232 ssh2
2020-05-11T15:05:19.531483sd-86998 sshd[41669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.246.3  user=root
2020-05-11T15:05:21.651994sd-86998 sshd[41669]: Failed password for root from 45.55.246.3 port 34679 ssh2
...
2020-05-11 22:03:42
88.32.154.37 attackspam
May 11 14:03:50 roki-contabo sshd\[12917\]: Invalid user sdtdserver from 88.32.154.37
May 11 14:03:50 roki-contabo sshd\[12917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.32.154.37
May 11 14:03:52 roki-contabo sshd\[12917\]: Failed password for invalid user sdtdserver from 88.32.154.37 port 40060 ssh2
May 11 14:07:33 roki-contabo sshd\[12954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.32.154.37  user=root
May 11 14:07:35 roki-contabo sshd\[12954\]: Failed password for root from 88.32.154.37 port 18583 ssh2
...
2020-05-11 22:19:33
128.199.201.36 attack
$f2bV_matches
2020-05-11 22:09:57
122.51.57.78 attackspam
May 11 14:07:42 vpn01 sshd[5980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.57.78
May 11 14:07:44 vpn01 sshd[5980]: Failed password for invalid user 1111 from 122.51.57.78 port 47060 ssh2
...
2020-05-11 22:08:57
168.196.40.12 attackbotsspam
Lines containing failures of 168.196.40.12
May 11 00:01:07 jarvis sshd[9616]: Invalid user user from 168.196.40.12 port 43434
May 11 00:01:07 jarvis sshd[9616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.196.40.12 
May 11 00:01:08 jarvis sshd[9616]: Failed password for invalid user user from 168.196.40.12 port 43434 ssh2
May 11 00:01:10 jarvis sshd[9616]: Received disconnect from 168.196.40.12 port 43434:11: Bye Bye [preauth]
May 11 00:01:10 jarvis sshd[9616]: Disconnected from invalid user user 168.196.40.12 port 43434 [preauth]
May 11 00:07:07 jarvis sshd[10369]: Invalid user usuario from 168.196.40.12 port 60674
May 11 00:07:07 jarvis sshd[10369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.196.40.12 
May 11 00:07:08 jarvis sshd[10369]: Failed password for invalid user usuario from 168.196.40.12 port 60674 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=1
2020-05-11 22:08:35
185.232.30.130 attackspam
5333/tcp 3507/tcp 5111/tcp...
[2020-03-15/05-11]762pkt,83pt.(tcp)
2020-05-11 21:58:53
197.44.186.28 attack
1589198861 - 05/11/2020 14:07:41 Host: 197.44.186.28/197.44.186.28 Port: 445 TCP Blocked
2020-05-11 22:10:47
222.186.175.215 attackspam
May 11 15:39:44 eventyay sshd[3183]: Failed password for root from 222.186.175.215 port 49452 ssh2
May 11 15:39:47 eventyay sshd[3183]: Failed password for root from 222.186.175.215 port 49452 ssh2
May 11 15:39:59 eventyay sshd[3183]: Failed password for root from 222.186.175.215 port 49452 ssh2
May 11 15:39:59 eventyay sshd[3183]: error: maximum authentication attempts exceeded for root from 222.186.175.215 port 49452 ssh2 [preauth]
...
2020-05-11 22:09:23
31.184.177.6 attackspambots
2020-05-11T15:27:24.131516  sshd[11358]: Invalid user production from 31.184.177.6 port 55204
2020-05-11T15:27:24.145322  sshd[11358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.184.177.6
2020-05-11T15:27:24.131516  sshd[11358]: Invalid user production from 31.184.177.6 port 55204
2020-05-11T15:27:26.496962  sshd[11358]: Failed password for invalid user production from 31.184.177.6 port 55204 ssh2
...
2020-05-11 22:16:31
93.99.104.191 attack
20 attempts against mh_ha-misbehave-ban on ice
2020-05-11 22:14:54
51.75.19.45 attack
Bruteforce detected by fail2ban
2020-05-11 21:48:44
183.95.84.34 attackspam
May 11 15:42:55 OPSO sshd\[13047\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.95.84.34  user=admin
May 11 15:42:56 OPSO sshd\[13047\]: Failed password for admin from 183.95.84.34 port 56520 ssh2
May 11 15:47:49 OPSO sshd\[13925\]: Invalid user laurentiu from 183.95.84.34 port 53776
May 11 15:47:49 OPSO sshd\[13925\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.95.84.34
May 11 15:47:51 OPSO sshd\[13925\]: Failed password for invalid user laurentiu from 183.95.84.34 port 53776 ssh2
2020-05-11 22:21:36
188.128.28.51 attackspam
May 10 23:57:49 hostnameproxy sshd[4921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.128.28.51  user=r.r
May 10 23:57:52 hostnameproxy sshd[4921]: Failed password for r.r from 188.128.28.51 port 27557 ssh2
May 10 23:58:53 hostnameproxy sshd[4989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.128.28.51  user=r.r
May 10 23:58:55 hostnameproxy sshd[4989]: Failed password for r.r from 188.128.28.51 port 27083 ssh2
May 11 00:00:33 hostnameproxy sshd[5071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.128.28.51  user=r.r
May 11 00:00:34 hostnameproxy sshd[5071]: Failed password for r.r from 188.128.28.51 port 26059 ssh2
May 11 00:01:34 hostnameproxy sshd[5153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.128.28.51  user=r.r
May 11 00:01:36 hostnameproxy sshd[5153]: Failed password for r.r ........
------------------------------
2020-05-11 21:51:35

最近上报的IP列表

169.68.80.129 145.28.123.107 6.215.116.235 140.121.61.187
19.170.198.55 122.4.50.237 127.13.207.177 202.54.190.21
211.239.112.17 127.15.183.98 228.99.22.97 175.207.63.16
6.223.108.206 181.31.154.181 104.161.14.6 50.154.110.127
57.178.60.237 197.167.140.61 154.8.41.184 205.34.34.198