必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2001:1af8:4700:b220::118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 4837
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2001:1af8:4700:b220::118.	IN	A

;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Fri Feb 18 23:45:10 CST 2022
;; MSG SIZE  rcvd: 53

'
HOST信息:
Host 8.1.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.2.b.0.0.7.4.8.f.a.1.1.0.0.2.ip6.arpa not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 8.1.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.2.b.0.0.7.4.8.f.a.1.1.0.0.2.ip6.arpa: NXDOMAIN
最新评论:
IP 类型 评论内容 时间
113.178.140.253 attackspambots
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-01-13 23:26:14
106.12.131.204 attack
Jan 13 18:23:53 server sshd\[30271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.131.204  user=root
Jan 13 18:23:55 server sshd\[30271\]: Failed password for root from 106.12.131.204 port 39890 ssh2
Jan 13 18:25:18 server sshd\[30962\]: Invalid user test from 106.12.131.204
Jan 13 18:25:18 server sshd\[30962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.131.204 
Jan 13 18:25:20 server sshd\[30962\]: Failed password for invalid user test from 106.12.131.204 port 49928 ssh2
...
2020-01-13 23:30:09
201.192.152.202 attackspambots
Unauthorized connection attempt detected from IP address 201.192.152.202 to port 2220 [J]
2020-01-13 23:36:35
177.73.124.90 attack
Unauthorized connection attempt detected from IP address 177.73.124.90 to port 1433 [J]
2020-01-13 23:23:52
218.64.226.45 attack
1578920887 - 01/13/2020 14:08:07 Host: 218.64.226.45/218.64.226.45 Port: 445 TCP Blocked
2020-01-13 23:14:29
222.186.173.180 attackspam
Jan 13 12:01:29 firewall sshd[18193]: Failed password for root from 222.186.173.180 port 59886 ssh2
Jan 13 12:01:43 firewall sshd[18193]: error: maximum authentication attempts exceeded for root from 222.186.173.180 port 59886 ssh2 [preauth]
Jan 13 12:01:43 firewall sshd[18193]: Disconnecting: Too many authentication failures [preauth]
...
2020-01-13 23:06:36
46.38.144.32 attackspam
Jan 13 15:59:47 relay postfix/smtpd\[8447\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 13 15:59:59 relay postfix/smtpd\[6476\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 13 16:00:19 relay postfix/smtpd\[3572\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 13 16:00:35 relay postfix/smtpd\[8704\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 13 16:00:55 relay postfix/smtpd\[10864\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-01-13 23:04:43
120.70.101.46 attackbots
2020-01-13T08:57:29.8171671495-001 sshd[59379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.101.46  user=root
2020-01-13T08:57:31.3557911495-001 sshd[59379]: Failed password for root from 120.70.101.46 port 52045 ssh2
2020-01-13T09:00:26.6259001495-001 sshd[59502]: Invalid user mike from 120.70.101.46 port 59722
2020-01-13T09:00:26.6290591495-001 sshd[59502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.101.46
2020-01-13T09:00:26.6259001495-001 sshd[59502]: Invalid user mike from 120.70.101.46 port 59722
2020-01-13T09:00:28.1316161495-001 sshd[59502]: Failed password for invalid user mike from 120.70.101.46 port 59722 ssh2
2020-01-13T09:03:33.1300301495-001 sshd[59656]: Invalid user udo from 120.70.101.46 port 39164
2020-01-13T09:03:33.1357981495-001 sshd[59656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.101.46
2020-01-13T09:03:33.130
...
2020-01-13 23:28:22
223.4.70.106 attack
2020-01-13T12:58:30.461069abusebot-5.cloudsearch.cf sshd[27038]: Invalid user ftpuser from 223.4.70.106 port 35426
2020-01-13T12:58:30.476743abusebot-5.cloudsearch.cf sshd[27038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.4.70.106
2020-01-13T12:58:30.461069abusebot-5.cloudsearch.cf sshd[27038]: Invalid user ftpuser from 223.4.70.106 port 35426
2020-01-13T12:58:32.838757abusebot-5.cloudsearch.cf sshd[27038]: Failed password for invalid user ftpuser from 223.4.70.106 port 35426 ssh2
2020-01-13T13:08:06.893055abusebot-5.cloudsearch.cf sshd[27117]: Invalid user yany from 223.4.70.106 port 37780
2020-01-13T13:08:06.902193abusebot-5.cloudsearch.cf sshd[27117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.4.70.106
2020-01-13T13:08:06.893055abusebot-5.cloudsearch.cf sshd[27117]: Invalid user yany from 223.4.70.106 port 37780
2020-01-13T13:08:08.336221abusebot-5.cloudsearch.cf sshd[27117]: Failed pa
...
2020-01-13 23:12:26
1.64.91.42 attack
Honeypot attack, port: 5555, PTR: 1-64-91-042.static.netvigator.com.
2020-01-13 23:11:57
124.153.236.6 attackbots
Unauthorized connection attempt detected from IP address 124.153.236.6 to port 81 [J]
2020-01-13 23:34:21
159.203.201.240 attack
Unauthorized connection attempt detected from IP address 159.203.201.240 to port 808
2020-01-13 23:15:56
138.68.72.7 attackspambots
Unauthorized connection attempt detected from IP address 138.68.72.7 to port 2220 [J]
2020-01-13 23:35:30
59.63.48.117 attack
Jan 13 07:58:49 cumulus sshd[29462]: Invalid user webadmin from 59.63.48.117 port 52310
Jan 13 07:58:49 cumulus sshd[29462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.63.48.117
Jan 13 07:58:52 cumulus sshd[29462]: Failed password for invalid user webadmin from 59.63.48.117 port 52310 ssh2
Jan 13 07:58:52 cumulus sshd[29462]: Received disconnect from 59.63.48.117 port 52310:11: Bye Bye [preauth]
Jan 13 07:58:52 cumulus sshd[29462]: Disconnected from 59.63.48.117 port 52310 [preauth]
Jan 13 08:01:52 cumulus sshd[29575]: Invalid user bots from 59.63.48.117 port 42550
Jan 13 08:01:52 cumulus sshd[29575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.63.48.117
Jan 13 08:01:54 cumulus sshd[29575]: Failed password for invalid user bots from 59.63.48.117 port 42550 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=59.63.48.117
2020-01-13 23:11:14
191.195.149.200 attackspambots
Unauthorized connection attempt detected from IP address 191.195.149.200 to port 81
2020-01-13 23:20:13

最近上报的IP列表

2001:1af8:4700:a158:121:0:1:89 2001:1af8:4700:a1fb::214 2001:1af8:4c00:9::3 2001:1af8:5000:a004:1::3
2001:1af8:4a00:18::1 2001:1b60:3:38:4702::2 2001:1af8:4a00:17:123::1 2001:1b28:4::8:181
2001:1bb0:e000:1e::76d 2001:1bb0:e000:1e::8cd 2001:1bb0:e000:1e::dd 2001:1bb0:e000:15::203
2001:1bb0:e000:1e::1ce 2001:1bc0:ad::d100 2001:1bb0:e000:1e::96 2001:2010:b:20::40
2001:1bc8:11:10:678d:54fb:8799:1ef9 2001:240:1a7:1029::1:71 2001:218:3001:7::b0 2001:1bc0:af::a1