必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Tanzania

运营商(isp): Airtel

主机名(hostname): unknown

机构(organization): airtel-tz-as

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.152.21.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38729
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;197.152.21.51.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019080200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Aug 02 23:51:14 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
Host 51.21.152.197.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 51.21.152.197.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
89.41.173.130 attackspambots
Feb 24 05:58:15 debian-2gb-nbg1-2 kernel: \[4779497.228215\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=89.41.173.130 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=48787 PROTO=TCP SPT=43732 DPT=1433 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-24 13:38:51
195.14.27.110 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/195.14.27.110/ 
 
 CH - 1H : (1)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CH 
 NAME ASN : ASN0 
 
 IP : 195.14.27.110 
 
 CIDR : 195.14.26.0/23 
 
 PREFIX COUNT : 50242 
 
 UNIQUE IP COUNT : 856039856 
 
 
 ATTACKS DETECTED ASN0 :  
  1H - 1 
  3H - 1 
  6H - 2 
 12H - 2 
 24H - 3 
 
 DateTime : 2020-02-24 05:58:06 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2020-02-24 13:42:00
60.249.208.164 attack
port scan and connect, tcp 23 (telnet)
2020-02-24 13:23:55
81.214.130.17 attackspambots
Automatic report - Port Scan Attack
2020-02-24 13:57:12
185.220.102.8 attackspam
02/24/2020-05:58:05.228160 185.220.102.8 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 34
2020-02-24 13:45:50
198.199.113.198 attack
suspicious action Mon, 24 Feb 2020 01:57:59 -0300
2020-02-24 13:47:05
218.86.199.24 attackspambots
Feb 24 05:57:50 debian-2gb-nbg1-2 kernel: \[4779472.049592\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=218.86.199.24 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=65226 PROTO=TCP SPT=34317 DPT=23 WINDOW=26509 RES=0x00 SYN URGP=0
2020-02-24 13:50:41
61.184.84.106 attackspam
suspicious action Mon, 24 Feb 2020 01:58:40 -0300
2020-02-24 13:28:49
222.186.31.135 attackspambots
Feb 24 05:38:20 marvibiene sshd[7042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.135  user=root
Feb 24 05:38:23 marvibiene sshd[7042]: Failed password for root from 222.186.31.135 port 16424 ssh2
Feb 24 05:38:24 marvibiene sshd[7042]: Failed password for root from 222.186.31.135 port 16424 ssh2
Feb 24 05:38:20 marvibiene sshd[7042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.135  user=root
Feb 24 05:38:23 marvibiene sshd[7042]: Failed password for root from 222.186.31.135 port 16424 ssh2
Feb 24 05:38:24 marvibiene sshd[7042]: Failed password for root from 222.186.31.135 port 16424 ssh2
...
2020-02-24 13:46:10
58.219.252.80 attack
(sshd) Failed SSH login from 58.219.252.80 (CN/China/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb 24 05:58:26 ubnt-55d23 sshd[27567]: Invalid user pi from 58.219.252.80 port 40838
Feb 24 05:58:28 ubnt-55d23 sshd[27567]: Failed password for invalid user pi from 58.219.252.80 port 40838 ssh2
2020-02-24 13:33:14
185.209.0.91 attack
02/24/2020-06:58:57.785225 185.209.0.91 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-02-24 14:04:12
194.26.29.128 attackspambots
Port scan on 12 port(s): 2470 10356 10649 11056 25508 32799 42343 46526 47914 47952 48507 58633
2020-02-24 13:50:23
49.88.112.111 attackbotsspam
Feb 24 05:56:59 * sshd[869]: Failed password for root from 49.88.112.111 port 23180 ssh2
2020-02-24 13:48:43
38.77.23.21 attack
1582520280 - 02/24/2020 05:58:00 Host: 38.77.23.21/38.77.23.21 Port: 445 TCP Blocked
2020-02-24 13:46:46
189.238.211.147 attack
suspicious action Mon, 24 Feb 2020 01:58:19 -0300
2020-02-24 13:37:18

最近上报的IP列表

89.80.194.71 200.52.213.89 215.36.34.222 111.144.209.244
213.74.242.106 130.96.95.79 177.103.164.103 194.237.70.250
96.166.30.179 66.138.171.82 93.253.89.235 70.139.138.140
36.21.193.79 39.61.88.75 200.244.113.227 138.123.18.32
125.240.11.3 179.157.169.239 12.225.237.99 132.59.26.115