必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): North Holland

国家(country): Netherlands

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
198.20.99.130 attackspambots
Unauthorized connection attempt detected from IP address 198.20.99.130 to port 9300 [T]
2020-08-31 17:01:37
198.20.99.130 attackspam
Unauthorized connection attempt detected from IP address 198.20.99.130 to port 1830 [T]
2020-08-29 20:34:43
198.20.99.130 attack
scans 2 times in preceeding hours on the ports (in chronological order) 8411 9034
2020-08-26 23:51:38
198.20.99.130 attackspambots
Unauthorized connection attempt detected from IP address 198.20.99.130 to port 5190
2020-08-07 14:32:10
198.20.99.130 attackbots
 TCP (SYN) 198.20.99.130:26200 -> port 6003, len 44
2020-08-02 01:13:56
198.20.99.130 attackbotsspam
Unauthorized connection attempt detected from IP address 198.20.99.130 to port 3554
2020-07-22 01:25:50
198.20.99.130 attackspam
Unauthorized connection attempt detected from IP address 198.20.99.130 to port 8024
2020-07-14 01:36:15
198.20.99.130 attackbotsspam
Port scanning [2 denied]
2020-07-13 14:55:35
198.20.99.130 attackbots
 TCP (SYN) 198.20.99.130:26200 -> port 8874, len 44
2020-06-27 17:33:04
198.20.99.130 attack
Unauthorized connection attempt detected from IP address 198.20.99.130 to port 3400 [T]
2020-06-24 03:27:14
198.20.99.130 attack
Unauthorized connection attempt detected from IP address 198.20.99.130 to port 3103 [T]
2020-06-21 00:33:45
198.20.99.130 attackspambots
Unauthorized connection attempt detected from IP address 198.20.99.130 to port 3118
2020-06-02 05:44:30
198.20.99.130 attackbots
Unauthorized connection attempt detected from IP address 198.20.99.130 to port 8869
2020-06-01 00:30:49
198.20.99.130 attack
Unauthorized connection attempt detected from IP address 198.20.99.130 to port 8406
2020-05-09 04:33:17
198.20.99.130 attackbotsspam
Unauthorized connection attempt detected from IP address 198.20.99.130 to port 5400
2020-05-07 01:43:37
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.20.99.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50785
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;198.20.99.131.			IN	A

;; AUTHORITY SECTION:
.			489	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061102 1800 900 604800 86400

;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 12 07:10:47 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
131.99.20.198.in-addr.arpa domain name pointer census4.shodan.io.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
131.99.20.198.in-addr.arpa	name = census4.shodan.io.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
75.134.150.171 attackspambots
Sep  5 18:39:57 server2 sshd[15731]: Invalid user admin from 75.134.150.171
Sep  5 18:39:59 server2 sshd[15731]: Failed password for invalid user admin from 75.134.150.171 port 56563 ssh2
Sep  5 18:39:59 server2 sshd[15731]: Received disconnect from 75.134.150.171: 11: Bye Bye [preauth]
Sep  5 18:40:00 server2 sshd[15749]: Invalid user admin from 75.134.150.171


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=75.134.150.171
2020-09-06 19:46:18
14.177.219.246 attackbotsspam
1599324071 - 09/05/2020 18:41:11 Host: 14.177.219.246/14.177.219.246 Port: 445 TCP Blocked
2020-09-06 19:42:51
103.83.7.173 attack
email spam
2020-09-06 19:49:53
112.104.18.27 attackbots
Honeypot attack, port: 445, PTR: 112-104-18-27.adsl.dynamic.seed.net.tw.
2020-09-06 19:24:16
195.82.113.65 attack
Sep  6 12:19:09 jane sshd[4787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.82.113.65 
Sep  6 12:19:11 jane sshd[4787]: Failed password for invalid user test from 195.82.113.65 port 54414 ssh2
...
2020-09-06 19:09:43
112.85.42.176 attackbotsspam
$f2bV_matches
2020-09-06 19:21:27
117.240.89.18 attackbots
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-09-06 19:45:15
90.148.221.175 attackspambots
1599324083 - 09/05/2020 18:41:23 Host: 90.148.221.175/90.148.221.175 Port: 445 TCP Blocked
2020-09-06 19:33:35
51.210.52.220 attackspambots
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: ip220.ip-51-210-52.eu.
2020-09-06 19:47:34
142.93.127.16 attackspambots
SSH brute force attempt (f)
2020-09-06 19:23:47
102.185.82.136 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-06 19:22:46
213.59.135.87 attackspam
Sep  6 07:29:07 sshgateway sshd\[14036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.59.135.87  user=root
Sep  6 07:29:10 sshgateway sshd\[14036\]: Failed password for root from 213.59.135.87 port 44624 ssh2
Sep  6 07:30:37 sshgateway sshd\[14570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.59.135.87  user=root
2020-09-06 19:48:05
222.186.173.226 attackspambots
Sep  6 13:08:40 nextcloud sshd\[11011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.226  user=root
Sep  6 13:08:41 nextcloud sshd\[11011\]: Failed password for root from 222.186.173.226 port 21074 ssh2
Sep  6 13:08:58 nextcloud sshd\[11405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.226  user=root
2020-09-06 19:18:49
162.142.125.30 attackspam
 TCP (SYN) 162.142.125.30:35937 -> port 3389, len 44
2020-09-06 19:31:00
157.39.31.42 attackbots
Icarus honeypot on github
2020-09-06 19:29:12

最近上报的IP列表

137.226.1.176 39.103.200.29 3.109.125.135 5.167.64.40
192.241.196.178 5.167.65.113 5.167.65.109 5.167.65.162
137.226.1.117 5.167.65.169 5.167.65.136 23.128.248.105
137.226.0.120 137.226.2.189 137.226.1.3 137.226.0.235
137.226.2.183 137.226.0.128 83.137.158.2 137.226.2.149