必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.21.33.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1551
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;20.21.33.80.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091000 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Sep 10 23:05:15 CST 2019
;; MSG SIZE  rcvd: 115
HOST信息:
Host 80.33.21.20.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 80.33.21.20.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
167.172.215.57 attackbotsspam
this Ip is using hack form system to another beacuse my friend got hacked by this ip just please ban this ip
2020-01-02 07:58:26
188.80.50.127 attackbotsspam
Jan  1 19:53:22 ws22vmsma01 sshd[160221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.80.50.127
Jan  1 19:53:24 ws22vmsma01 sshd[160221]: Failed password for invalid user amano from 188.80.50.127 port 49674 ssh2
...
2020-01-02 07:51:14
222.186.175.23 attack
Jan  1 19:10:54 plusreed sshd[18413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.23  user=root
Jan  1 19:10:56 plusreed sshd[18413]: Failed password for root from 222.186.175.23 port 33333 ssh2
...
2020-01-02 08:11:17
49.88.112.67 attackbotsspam
Jan  1 18:32:57 linuxvps sshd\[34403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.67  user=root
Jan  1 18:32:59 linuxvps sshd\[34403\]: Failed password for root from 49.88.112.67 port 52690 ssh2
Jan  1 18:35:09 linuxvps sshd\[35879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.67  user=root
Jan  1 18:35:11 linuxvps sshd\[35879\]: Failed password for root from 49.88.112.67 port 14956 ssh2
Jan  1 18:41:44 linuxvps sshd\[40189\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.67  user=root
2020-01-02 07:53:39
92.190.153.246 attackspambots
2020-01-01T23:53:59.711843shield sshd\[32341\]: Invalid user corp from 92.190.153.246 port 58570
2020-01-01T23:53:59.717088shield sshd\[32341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.190.153.246
2020-01-01T23:54:01.348517shield sshd\[32341\]: Failed password for invalid user corp from 92.190.153.246 port 58570 ssh2
2020-01-01T23:57:16.701673shield sshd\[1328\]: Invalid user guest from 92.190.153.246 port 60636
2020-01-01T23:57:16.706100shield sshd\[1328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.190.153.246
2020-01-02 08:07:35
175.215.47.83 attack
Jan  1 23:41:20 ns382633 sshd\[18917\]: Invalid user sanhueza from 175.215.47.83 port 53384
Jan  1 23:41:20 ns382633 sshd\[18917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.215.47.83
Jan  1 23:41:22 ns382633 sshd\[18917\]: Failed password for invalid user sanhueza from 175.215.47.83 port 53384 ssh2
Jan  1 23:52:40 ns382633 sshd\[20638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.215.47.83  user=root
Jan  1 23:52:42 ns382633 sshd\[20638\]: Failed password for root from 175.215.47.83 port 44350 ssh2
2020-01-02 08:13:10
46.38.144.179 attackspambots
Jan  1 18:32:04 web1 postfix/smtpd[28822]: warning: unknown[46.38.144.179]: SASL LOGIN authentication failed: authentication failure
...
2020-01-02 07:44:59
47.246.24.131 attack
Portscan or hack attempt detected by psad/fwsnort
2020-01-02 07:50:14
191.232.163.135 attack
SSH Login Bruteforce
2020-01-02 07:40:26
51.77.146.142 attackbotsspam
Invalid user bergfall from 51.77.146.142 port 43028
2020-01-02 08:06:07
150.223.23.56 attackbots
Jan  1 23:12:11 localhost sshd\[48993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.23.56  user=mysql
Jan  1 23:12:13 localhost sshd\[48993\]: Failed password for mysql from 150.223.23.56 port 33384 ssh2
Jan  1 23:15:12 localhost sshd\[49067\]: Invalid user dierderick from 150.223.23.56 port 42999
Jan  1 23:15:12 localhost sshd\[49067\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.23.56
Jan  1 23:15:14 localhost sshd\[49067\]: Failed password for invalid user dierderick from 150.223.23.56 port 42999 ssh2
...
2020-01-02 07:39:10
220.130.10.13 attackspam
2020-01-01T18:48:27.347300xentho-1 sshd[365011]: Invalid user com from 220.130.10.13 port 28816
2020-01-01T18:48:27.354229xentho-1 sshd[365011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.10.13
2020-01-01T18:48:27.347300xentho-1 sshd[365011]: Invalid user com from 220.130.10.13 port 28816
2020-01-01T18:48:29.409511xentho-1 sshd[365011]: Failed password for invalid user com from 220.130.10.13 port 28816 ssh2
2020-01-01T18:50:52.216248xentho-1 sshd[365084]: Invalid user password from 220.130.10.13 port 54710
2020-01-01T18:50:52.225406xentho-1 sshd[365084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.10.13
2020-01-01T18:50:52.216248xentho-1 sshd[365084]: Invalid user password from 220.130.10.13 port 54710
2020-01-01T18:50:54.184750xentho-1 sshd[365084]: Failed password for invalid user password from 220.130.10.13 port 54710 ssh2
2020-01-01T18:53:10.798119xentho-1 sshd[365134]: Invalid 
...
2020-01-02 08:00:21
121.176.20.92 attackspam
...
2020-01-02 07:37:33
96.44.186.50 attack
(imapd) Failed IMAP login from 96.44.186.50 (US/United States/96.44.186.50.static.quadranet.com): 1 in the last 3600 secs
2020-01-02 07:44:24
176.126.62.18 attackbots
Triggered by Fail2Ban at Vostok web server
2020-01-02 07:46:57

最近上报的IP列表

196.2.252.136 162.241.2.26 162.222.227.215 146.88.240.44
92.53.2.20 75.182.14.189 51.223.34.82 46.209.15.218
157.37.181.233 157.47.193.156 157.245.173.48 126.148.220.101
16.180.155.198 68.94.157.120 193.255.46.114 108.201.175.65
74.45.69.252 162.77.78.86 51.47.118.226 46.217.112.7