必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Italy

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.231.148.63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1740
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.231.148.63.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 17:55:13 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
63.148.231.2.in-addr.arpa domain name pointer 2-231-148-63.ip207.fastwebnet.it.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
63.148.231.2.in-addr.arpa	name = 2-231-148-63.ip207.fastwebnet.it.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
94.102.50.136 attackspam
scans 3 times in preceeding hours on the ports (in chronological order) 7003 7005 7004 resulting in total of 47 scans from 94.102.48.0/20 block.
2020-04-25 22:38:19
117.50.23.52 attackspambots
scans once in preceeding hours on the ports (in chronological order) 10333 resulting in total of 1 scans from 117.50.0.0/16 block.
2020-04-25 22:34:30
80.82.64.110 attack
probes 8 times on the port 34567 9527 resulting in total of 85 scans from 80.82.64.0/20 block.
2020-04-25 22:51:02
51.91.212.81 attack
firewall-block, port(s): 88/tcp, 530/tcp, 9333/tcp, 11211/tcp, 30303/tcp
2020-04-25 22:55:17
89.248.172.16 attackspambots
Unauthorized connection attempt detected from IP address 89.248.172.16 to port 8334 [T]
2020-04-25 22:42:50
83.97.20.35 attackbotsspam
ET DROP Dshield Block Listed Source group 1 - port: 8009 proto: TCP cat: Misc Attack
2020-04-25 22:45:35
184.105.247.195 attackspambots
Unauthorized connection attempt detected from IP address 184.105.247.195 to port 23
2020-04-25 22:30:15
89.248.168.217 attackbots
ET DROP Dshield Block Listed Source group 1 - port: 49653 proto: UDP cat: Misc Attack
2020-04-25 22:43:22
5.188.210.226 attackbots
scans 2 times in preceeding hours on the ports (in chronological order) 53281 9000
2020-04-25 23:02:14
185.216.140.252 attackbots
Apr 25 16:10:23 debian-2gb-nbg1-2 kernel: \[10082762.792000\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.216.140.252 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=54257 PROTO=TCP SPT=49511 DPT=1530 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-25 22:21:55
184.105.247.223 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-04-25 22:29:51
172.104.112.244 attack
scans once in preceeding hours on the ports (in chronological order) 1080 resulting in total of 4 scans from 172.104.0.0/15 block.
2020-04-25 22:32:14
185.175.93.34 attackspam
04/25/2020-09:23:38.923588 185.175.93.34 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-04-25 22:25:26
89.248.172.85 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 83 - port: 21289 proto: TCP cat: Misc Attack
2020-04-25 22:42:19
125.64.94.221 attackspambots
125.64.94.221 was recorded 8 times by 6 hosts attempting to connect to the following ports: 3337,1911,8649,12203,2053,2332,38. Incident counter (4h, 24h, all-time): 8, 34, 4990
2020-04-25 22:33:32

最近上报的IP列表

77.12.221.50 230.219.201.235 252.6.64.237 52.224.54.10
173.212.131.212 189.125.185.253 104.42.199.181 191.192.108.216
141.196.85.94 227.25.100.47 138.23.36.214 50.79.199.16
4.197.75.216 8.95.149.72 29.87.59.176 116.95.221.184
191.29.231.20 50.16.32.135 86.7.138.77 121.238.137.226