必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Denmark

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.128.31.190
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16127
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.128.31.190.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 08:19:19 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
190.31.128.2.in-addr.arpa domain name pointer 002128031190.mbb.telenor.dk.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
190.31.128.2.in-addr.arpa	name = 002128031190.mbb.telenor.dk.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.68.229.177 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-11 04:26:32
216.104.200.22 attackbots
web-1 [ssh] SSH Attack
2020-08-11 04:47:36
46.105.244.17 attack
Aug 10 22:24:08 piServer sshd[17858]: Failed password for root from 46.105.244.17 port 38910 ssh2
Aug 10 22:28:09 piServer sshd[18285]: Failed password for root from 46.105.244.17 port 56070 ssh2
...
2020-08-11 04:45:34
105.159.0.125 attackspam
trying to access non-authorized port
2020-08-11 04:28:56
183.82.4.69 attackspambots
Unauthorized connection attempt from IP address 183.82.4.69 on Port 445(SMB)
2020-08-11 04:39:27
177.130.140.52 attackspam
Automatic report - Port Scan Attack
2020-08-11 04:47:22
195.54.160.38 attack
firewall-block, port(s): 3854/tcp, 5632/tcp, 5914/tcp, 8838/tcp, 9925/tcp, 9935/tcp, 10774/tcp, 11485/tcp, 12642/tcp, 14460/tcp, 16000/tcp, 16866/tcp, 16870/tcp, 19964/tcp, 20808/tcp, 21026/tcp, 21034/tcp, 21315/tcp, 21326/tcp, 21358/tcp, 21857/tcp, 21869/tcp, 22046/tcp, 22649/tcp, 22865/tcp, 23285/tcp, 23457/tcp, 24076/tcp, 24161/tcp, 27877/tcp, 28636/tcp, 32128/tcp, 32951/tcp, 36145/tcp, 37032/tcp, 38021/tcp, 38186/tcp, 38241/tcp, 39167/tcp, 39221/tcp, 39677/tcp, 39836/tcp, 42314/tcp, 42425/tcp, 43804/tcp, 45450/tcp, 45712/tcp, 46142/tcp, 46285/tcp, 46289/tcp, 46602/tcp, 47126/tcp, 47130/tcp, 51414/tcp, 52572/tcp, 52609/tcp, 53379/tcp, 53391/tcp, 54138/tcp, 55175/tcp, 55183/tcp, 55199/tcp, 55785/tcp, 58471/tcp, 58479/tcp, 58666/tcp, 59505/tcp, 61241/tcp, 64374/tcp
2020-08-11 04:30:35
87.98.152.54 attackbots
Automatic report - Banned IP Access
2020-08-11 04:54:49
76.14.133.76 attackspambots
Port scan on 1 port(s): 22
2020-08-11 04:49:35
95.149.190.2 attack
Automatic report - Port Scan Attack
2020-08-11 04:50:38
222.209.107.226 attackbotsspam
Unauthorized connection attempt from IP address 222.209.107.226 on Port 445(SMB)
2020-08-11 04:32:50
213.164.238.118 attack
firewall-block, port(s): 3389/tcp
2020-08-11 04:23:45
196.245.219.38 attackspam
Unauthorized access detected from black listed ip!
2020-08-11 04:58:34
211.157.2.92 attackspambots
$f2bV_matches
2020-08-11 04:30:13
27.79.231.73 attackbots
Unauthorized connection attempt from IP address 27.79.231.73 on Port 445(SMB)
2020-08-11 04:37:25

最近上报的IP列表

157.21.245.65 249.122.4.156 200.226.184.174 194.230.66.71
153.94.149.96 117.58.255.91 162.190.29.247 73.90.210.249
171.197.30.115 242.16.75.128 29.248.47.42 226.99.39.181
26.184.172.60 148.14.91.129 173.105.248.234 180.230.226.117
87.79.89.163 145.41.138.200 169.251.190.143 45.196.114.210