必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Erftstadt

省份(region): Nordrhein-Westfalen

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2001:16b8:29b:8700:fc61:9b0c:8a7a:20ac
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 35724
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2001:16b8:29b:8700:fc61:9b0c:8a7a:20ac.	IN A

;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Thu May 29 04:59:45 CST 2025
;; MSG SIZE  rcvd: 67

'
HOST信息:
b'c.a.0.2.a.7.a.8.c.0.b.9.1.6.c.f.0.0.7.8.b.9.2.0.8.b.6.1.1.0.0.2.ip6.arpa domain name pointer 200116b8029b8700fc619b0c8a7a20ac.dip.versatel-1u1.de.
'
NSLOOKUP信息:
b'c.a.0.2.a.7.a.8.c.0.b.9.1.6.c.f.0.0.7.8.b.9.2.0.8.b.6.1.1.0.0.2.ip6.arpa	name = 200116b8029b8700fc619b0c8a7a20ac.dip.versatel-1u1.de.

Authoritative answers can be found from:

'
最新评论:
IP 类型 评论内容 时间
200.89.129.233 attack
email spam
2019-11-06 20:15:35
211.235.51.63 attack
[portscan] tcp/23 [TELNET]
in spfbl.net:'listed'
*(RWIN=45990)(11061245)
2019-11-06 19:47:39
110.139.126.130 attackspambots
Nov  5 06:46:02 olgosrv01 sshd[1101]: reveeclipse mapping checking getaddrinfo for 130.subnet110-139-126.speedy.telkom.net.id [110.139.126.130] failed - POSSIBLE BREAK-IN ATTEMPT!
Nov  5 06:46:02 olgosrv01 sshd[1101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.139.126.130  user=r.r
Nov  5 06:46:04 olgosrv01 sshd[1101]: Failed password for r.r from 110.139.126.130 port 16278 ssh2
Nov  5 06:46:05 olgosrv01 sshd[1101]: Received disconnect from 110.139.126.130: 11: Bye Bye [preauth]
Nov  5 06:51:03 olgosrv01 sshd[1462]: reveeclipse mapping checking getaddrinfo for 130.subnet110-139-126.speedy.telkom.net.id [110.139.126.130] failed - POSSIBLE BREAK-IN ATTEMPT!
Nov  5 06:51:03 olgosrv01 sshd[1462]: Invalid user apache from 110.139.126.130
Nov  5 06:51:03 olgosrv01 sshd[1462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.139.126.130 
Nov  5 06:51:06 olgosrv01 sshd[1462]: Failed pass........
-------------------------------
2019-11-06 19:45:44
80.237.119.229 attackbotsspam
[portscan] Port scan
2019-11-06 19:51:30
218.18.101.84 attackbots
Nov  6 10:17:24 server sshd\[6380\]: Invalid user cqusers from 218.18.101.84 port 49856
Nov  6 10:17:24 server sshd\[6380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.18.101.84
Nov  6 10:17:26 server sshd\[6380\]: Failed password for invalid user cqusers from 218.18.101.84 port 49856 ssh2
Nov  6 10:22:15 server sshd\[21898\]: User root from 218.18.101.84 not allowed because listed in DenyUsers
Nov  6 10:22:15 server sshd\[21898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.18.101.84  user=root
2019-11-06 20:10:58
111.231.144.219 attack
web-1 [ssh_2] SSH Attack
2019-11-06 20:17:09
222.186.175.155 attackspambots
Nov  6 12:43:54 legacy sshd[28318]: Failed password for root from 222.186.175.155 port 28694 ssh2
Nov  6 12:44:12 legacy sshd[28318]: error: maximum authentication attempts exceeded for root from 222.186.175.155 port 28694 ssh2 [preauth]
Nov  6 12:44:22 legacy sshd[28328]: Failed password for root from 222.186.175.155 port 34234 ssh2
...
2019-11-06 19:46:12
51.68.44.13 attackspam
Nov  6 07:21:05 hcbbdb sshd\[18824\]: Invalid user xihuidc!@\# from 51.68.44.13
Nov  6 07:21:05 hcbbdb sshd\[18824\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.ip-51-68-44.eu
Nov  6 07:21:08 hcbbdb sshd\[18824\]: Failed password for invalid user xihuidc!@\# from 51.68.44.13 port 60436 ssh2
Nov  6 07:25:00 hcbbdb sshd\[19216\]: Invalid user MimaPass! from 51.68.44.13
Nov  6 07:25:00 hcbbdb sshd\[19216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.ip-51-68-44.eu
2019-11-06 19:57:00
165.22.30.12 attackbotsspam
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-11-06 19:40:55
106.13.67.127 attackspambots
Nov  6 01:14:03 srv2 sshd\[12654\]: Invalid user admin from 106.13.67.127
Nov  6 01:14:03 srv2 sshd\[12654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.67.127
Nov  6 01:14:05 srv2 sshd\[12654\]: Failed password for invalid user admin from 106.13.67.127 port 44538 ssh2
...
2019-11-06 20:07:21
118.26.23.225 attack
2019-11-06T08:39:05.992910abusebot-2.cloudsearch.cf sshd\[29373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.26.23.225  user=root
2019-11-06 20:12:50
104.197.98.229 attackbotsspam
CloudCIX Reconnaissance Scan Detected, PTR: 229.98.197.104.bc.googleusercontent.com.
2019-11-06 19:59:40
163.172.157.162 attack
Nov  6 03:10:36 ny01 sshd[14212]: Failed password for root from 163.172.157.162 port 46530 ssh2
Nov  6 03:14:41 ny01 sshd[14594]: Failed password for root from 163.172.157.162 port 57666 ssh2
2019-11-06 19:50:28
139.199.6.107 attack
Nov  5 15:30:35 server sshd\[9110\]: Failed password for invalid user arash from 139.199.6.107 port 56353 ssh2
Nov  6 10:03:19 server sshd\[1502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.6.107  user=root
Nov  6 10:03:21 server sshd\[1502\]: Failed password for root from 139.199.6.107 port 47939 ssh2
Nov  6 10:32:34 server sshd\[9669\]: Invalid user cloudadmin from 139.199.6.107
Nov  6 10:32:34 server sshd\[9669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.6.107 
...
2019-11-06 20:23:04
94.179.145.173 attack
Nov  6 13:56:19 webhost01 sshd[18031]: Failed password for root from 94.179.145.173 port 59302 ssh2
...
2019-11-06 20:12:20

最近上报的IP列表

36.99.197.9 46.236.65.54 198.204.244.4 113.215.189.185
159.203.20.228 59.82.21.153 20.14.74.238 35.203.211.204
20.65.194.180 135.237.123.227 111.199.34.127 111.199.34.174
111.199.34.57 111.199.34.73 35.203.210.121 35.161.114.75
113.215.189.203 113.215.189.201 88.189.199.194 39.105.194.72