必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2001:1850:1:5:103::20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 4917
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2001:1850:1:5:103::20.		IN	A

;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Fri Feb 18 23:45:03 CST 2022
;; MSG SIZE  rcvd: 50

'
HOST信息:
Host 0.2.0.0.0.0.0.0.0.0.0.0.3.0.1.0.5.0.0.0.1.0.0.0.0.5.8.1.1.0.0.2.ip6.arpa not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 0.2.0.0.0.0.0.0.0.0.0.0.3.0.1.0.5.0.0.0.1.0.0.0.0.5.8.1.1.0.0.2.ip6.arpa: NXDOMAIN
最新评论:
IP 类型 评论内容 时间
118.70.126.122 attack
1585713344 - 04/01/2020 05:55:44 Host: 118.70.126.122/118.70.126.122 Port: 445 TCP Blocked
2020-04-01 12:50:41
122.51.58.42 attackbots
Apr  1 01:47:11 vps46666688 sshd[21129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.58.42
Apr  1 01:47:12 vps46666688 sshd[21129]: Failed password for invalid user user from 122.51.58.42 port 33334 ssh2
...
2020-04-01 12:48:23
116.255.131.3 attack
Lines containing failures of 116.255.131.3 (max 1000)
Mar 31 04:02:41 localhost sshd[9753]: User r.r from 116.255.131.3 not allowed because listed in DenyUsers
Mar 31 04:02:41 localhost sshd[9753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.255.131.3  user=r.r
Mar 31 04:02:42 localhost sshd[9753]: Failed password for invalid user r.r from 116.255.131.3 port 44694 ssh2
Mar 31 04:02:43 localhost sshd[9753]: Received disconnect from 116.255.131.3 port 44694:11: Bye Bye [preauth]
Mar 31 04:02:43 localhost sshd[9753]: Disconnected from invalid user r.r 116.255.131.3 port 44694 [preauth]
Mar 31 04:11:06 localhost sshd[11461]: User r.r from 116.255.131.3 not allowed because listed in DenyUsers
Mar 31 04:11:06 localhost sshd[11461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.255.131.3  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=116.255.131.3
2020-04-01 12:53:57
218.75.62.132 attack
2020-04-01T06:46:58.972062librenms sshd[27251]: Failed password for root from 218.75.62.132 port 48228 ssh2
2020-04-01T06:50:30.841411librenms sshd[27746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.75.62.132  user=root
2020-04-01T06:50:32.901661librenms sshd[27746]: Failed password for root from 218.75.62.132 port 57608 ssh2
...
2020-04-01 12:58:11
101.109.150.64 attackspambots
20/4/1@00:26:06: FAIL: Alarm-Network address from=101.109.150.64
...
2020-04-01 12:58:45
45.125.65.35 attackbots
Apr  1 06:44:10 relay postfix/smtpd\[32018\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  1 06:44:15 relay postfix/smtpd\[24029\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  1 06:52:55 relay postfix/smtpd\[32018\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  1 07:01:39 relay postfix/smtpd\[7531\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  1 07:01:46 relay postfix/smtpd\[29335\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-04-01 13:02:08
79.11.32.140 attackspam
port scan and connect, tcp 23 (telnet)
2020-04-01 12:48:04
92.63.194.22 attackspambots
2020-03-31T15:39:43.972507homeassistant sshd[8210]: Failed password for invalid user admin from 92.63.194.22 port 42523 ssh2
2020-04-01T04:54:27.672880homeassistant sshd[7748]: Invalid user admin from 92.63.194.22 port 39929
2020-04-01T04:54:27.687233homeassistant sshd[7748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.22
...
2020-04-01 12:54:58
159.203.63.125 attackspam
Apr  1 06:08:26 silence02 sshd[24776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.63.125
Apr  1 06:08:28 silence02 sshd[24776]: Failed password for invalid user wqm from 159.203.63.125 port 57808 ssh2
Apr  1 06:12:42 silence02 sshd[25169]: Failed password for root from 159.203.63.125 port 35431 ssh2
2020-04-01 12:38:28
101.255.81.91 attackspam
(sshd) Failed SSH login from 101.255.81.91 (ID/Indonesia/-): 5 in the last 3600 secs
2020-04-01 12:21:43
2a02:4780:8:d::4 attackbots
xmlrpc attack
2020-04-01 12:59:06
106.13.164.212 attackspambots
(sshd) Failed SSH login from 106.13.164.212 (CN/China/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  1 05:55:49 ubnt-55d23 sshd[6154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.164.212  user=root
Apr  1 05:55:51 ubnt-55d23 sshd[6154]: Failed password for root from 106.13.164.212 port 58118 ssh2
2020-04-01 12:45:29
49.235.20.79 attackbots
Apr  1 06:06:03 localhost sshd\[11929\]: Invalid user yb from 49.235.20.79
Apr  1 06:06:03 localhost sshd\[11929\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.20.79
Apr  1 06:06:05 localhost sshd\[11929\]: Failed password for invalid user yb from 49.235.20.79 port 46808 ssh2
Apr  1 06:11:19 localhost sshd\[12182\]: Invalid user yamaken from 49.235.20.79
Apr  1 06:11:19 localhost sshd\[12182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.20.79
...
2020-04-01 12:49:17
87.98.190.42 attackspambots
Apr  1 01:04:47 hgb10301 sshd[25170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.98.190.42  user=r.r
Apr  1 01:04:49 hgb10301 sshd[25170]: Failed password for r.r from 87.98.190.42 port 52077 ssh2
Apr  1 01:04:51 hgb10301 sshd[25170]: Received disconnect from 87.98.190.42 port 52077:11: Bye Bye [preauth]
Apr  1 01:04:51 hgb10301 sshd[25170]: Disconnected from authenticating user r.r 87.98.190.42 port 52077 [preauth]
Apr  1 01:09:04 hgb10301 sshd[25286]: Invalid user shubh from 87.98.190.42 port 58926
Apr  1 01:09:04 hgb10301 sshd[25286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.98.190.42 
Apr  1 01:09:06 hgb10301 sshd[25286]: Failed password for invalid user shubh from 87.98.190.42 port 58926 ssh2
Apr  1 01:09:07 hgb10301 sshd[25286]: Received disconnect from 87.98.190.42 port 58926:11: Bye Bye [preauth]
Apr  1 01:09:07 hgb10301 sshd[25286]: Disconnected from invalid user s........
-------------------------------
2020-04-01 12:25:27
117.3.46.25 attackbots
117.3.46.25 - - [01/Apr/2020:05:55:24 +0200] "GET /wp-login.php HTTP/1.1" 200 5702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
117.3.46.25 - - [01/Apr/2020:05:55:26 +0200] "POST /wp-login.php HTTP/1.1" 200 6601 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
117.3.46.25 - - [01/Apr/2020:05:55:29 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-01 12:59:48

最近上报的IP列表

2001:1850:1:5:103::28 2001:1850:1:5:102::35 2001:1850:1:5:102::7d 2001:1850:1:5:103::22
2001:1850:1:5:103::8 2001:1850:1:5:103::21 2001:1878:500::100 2001:18c8:17f:fc75::d186:90e5
2001:1900:3001:11::31 2001:18e8:2:e::103 2001:1890:8409:6a00::14 2001:1850:1:5:103::f
2001:1900:3001:11::2c 2001:1930:d07::aaaa 2001:18e8:2:e::104 2001:1948:210:8::10
2001:1900:2200:b4::f00f:4b 2001:1938:4002::222 2001:1960:10f:2:0:f:7:2 2001:19f0:200:2eda:6c3d:287b:0:1