必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2001:4118:300:48::212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 3005
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2001:4118:300:48::212.		IN	A

;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Fri Feb 18 23:45:17 CST 2022
;; MSG SIZE  rcvd: 50

'
HOST信息:
b'2.1.2.0.0.0.0.0.0.0.0.0.0.0.0.0.8.4.0.0.0.0.3.0.8.1.1.4.1.0.0.2.ip6.arpa domain name pointer www5.uniza.sk.
'
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
2.1.2.0.0.0.0.0.0.0.0.0.0.0.0.0.8.4.0.0.0.0.3.0.8.1.1.4.1.0.0.2.ip6.arpa	name = www5.uniza.sk.

Authoritative answers can be found from:
最新评论:
IP 类型 评论内容 时间
58.71.210.7 attack
Automatic report - Port Scan Attack
2020-07-30 21:40:22
79.120.54.174 attack
Jul 30 15:09:23 vmd36147 sshd[28524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.120.54.174
Jul 30 15:09:25 vmd36147 sshd[28524]: Failed password for invalid user augustus from 79.120.54.174 port 56956 ssh2
Jul 30 15:13:30 vmd36147 sshd[5585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.120.54.174
...
2020-07-30 21:33:42
49.232.172.244 attackbotsspam
Repeated brute force against a port
2020-07-30 21:21:36
121.234.32.253 attackspam
Jul 30 14:08:43 ns382633 sshd\[9651\]: Invalid user ubnt from 121.234.32.253 port 39825
Jul 30 14:08:44 ns382633 sshd\[9651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.234.32.253
Jul 30 14:08:46 ns382633 sshd\[9651\]: Failed password for invalid user ubnt from 121.234.32.253 port 39825 ssh2
Jul 30 14:08:57 ns382633 sshd\[9665\]: Invalid user osboxes from 121.234.32.253 port 45836
Jul 30 14:08:58 ns382633 sshd\[9665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.234.32.253
2020-07-30 21:22:51
170.106.32.101 attackspambots
ICMP MH Probe, Scan /Distributed -
2020-07-30 21:50:34
185.175.93.14 attackspam
ET DROP Dshield Block Listed Source group 1 - port: 42808 proto: tcp cat: Misc Attackbytes: 60
2020-07-30 21:37:21
176.16.101.52 attack
ICMP MH Probe, Scan /Distributed -
2020-07-30 21:17:34
145.239.154.240 attackbotsspam
Jul 30 18:27:30 gw1 sshd[15669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.154.240
Jul 30 18:27:32 gw1 sshd[15669]: Failed password for invalid user shenhe from 145.239.154.240 port 35500 ssh2
...
2020-07-30 21:39:32
175.97.130.20 attackspam
ICMP MH Probe, Scan /Distributed -
2020-07-30 21:33:28
121.186.122.216 attackspam
Jul 30 13:54:36 ns392434 sshd[21645]: Invalid user ljchen from 121.186.122.216 port 39386
Jul 30 13:54:36 ns392434 sshd[21645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.186.122.216
Jul 30 13:54:36 ns392434 sshd[21645]: Invalid user ljchen from 121.186.122.216 port 39386
Jul 30 13:54:38 ns392434 sshd[21645]: Failed password for invalid user ljchen from 121.186.122.216 port 39386 ssh2
Jul 30 14:02:55 ns392434 sshd[21763]: Invalid user yrs from 121.186.122.216 port 38178
Jul 30 14:02:55 ns392434 sshd[21763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.186.122.216
Jul 30 14:02:55 ns392434 sshd[21763]: Invalid user yrs from 121.186.122.216 port 38178
Jul 30 14:02:57 ns392434 sshd[21763]: Failed password for invalid user yrs from 121.186.122.216 port 38178 ssh2
Jul 30 14:08:44 ns392434 sshd[21930]: Invalid user wangjianxiong from 121.186.122.216 port 49860
2020-07-30 21:37:42
42.247.5.92 attack
Unauthorised access (Jul 30) SRC=42.247.5.92 LEN=40 TOS=0x08 PREC=0x20 TTL=223 ID=46808 TCP DPT=1433 WINDOW=1024 SYN
2020-07-30 21:58:24
222.73.215.81 attack
Jul 30 09:24:49 NPSTNNYC01T sshd[27852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.73.215.81
Jul 30 09:24:51 NPSTNNYC01T sshd[27852]: Failed password for invalid user zhangshifeng from 222.73.215.81 port 42125 ssh2
Jul 30 09:30:10 NPSTNNYC01T sshd[28229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.73.215.81
...
2020-07-30 21:49:41
191.234.161.50 attackspambots
Jul 30 10:21:06 ws12vmsma01 sshd[22906]: Invalid user angelo from 191.234.161.50
Jul 30 10:21:08 ws12vmsma01 sshd[22906]: Failed password for invalid user angelo from 191.234.161.50 port 55451 ssh2
Jul 30 10:30:47 ws12vmsma01 sshd[24342]: Invalid user yangyaorong from 191.234.161.50
...
2020-07-30 21:34:39
216.218.206.99 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-07-30 21:20:48
163.172.167.225 attack
Failed password for invalid user liuyh from 163.172.167.225 port 46614 ssh2
2020-07-30 21:19:34

最近上报的IP列表

2001:4178:2:1269::fed2 2001:4178:2:1294:85:236:56:246 2001:4178:2:1294:85:236:56:248 2001:418:9804:111::c
2001:4170:2801::127 2001:41c8:13b::d 2001:41c9:1:3ce::1:10 2001:41c8:13b::78
2001:41c8:51:4e9:feff:ff:fe00:3207 2001:41c8:20:60e::70:10 2001:41c8:10:1c7::10 2001:41d0:1004:1439::37
2001:41c9:1:424::35 2001:41d0:1004:1a24:178:32:110:246 2001:41d0:1004:1f71::12:1 2001:41c9:2:11f::84
2001:41c9:1:41f::142 2001:41c9:1:424::109 2001:41d0:1004:2041:: 2001:41d0:1008:2805::