必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2001:41d0:2:193d::5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 29392
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2001:41d0:2:193d::5.		IN	A

;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Fri Feb 18 23:45:23 CST 2022
;; MSG SIZE  rcvd: 48

'
HOST信息:
5.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.d.3.9.1.2.0.0.0.0.d.1.4.1.0.0.2.ip6.arpa domain name pointer zap.marmotte.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
5.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.d.3.9.1.2.0.0.0.0.d.1.4.1.0.0.2.ip6.arpa	name = zap.marmotte.net.

Authoritative answers can be found from:
最新评论:
IP 类型 评论内容 时间
138.68.212.113 attackbotsspam
179/tcp 1433/tcp 5060/udp...
[2019-09-02/10-31]51pkt,43pt.(tcp),4pt.(udp)
2019-11-02 19:20:16
187.177.138.248 attackbots
Port 1433 Scan
2019-11-02 19:19:33
41.220.13.103 attackbotsspam
Nov  1 18:40:48 tdfoods sshd\[10832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=goga.data.co.ug  user=root
Nov  1 18:40:50 tdfoods sshd\[10832\]: Failed password for root from 41.220.13.103 port 42300 ssh2
Nov  1 18:45:39 tdfoods sshd\[11216\]: Invalid user operator from 41.220.13.103
Nov  1 18:45:39 tdfoods sshd\[11216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=goga.data.co.ug
Nov  1 18:45:40 tdfoods sshd\[11216\]: Failed password for invalid user operator from 41.220.13.103 port 53120 ssh2
2019-11-02 19:07:52
60.30.249.6 attackspambots
Unauthorised access (Nov  2) SRC=60.30.249.6 LEN=40 TTL=47 ID=39504 TCP DPT=8080 WINDOW=15253 SYN 
Unauthorised access (Nov  1) SRC=60.30.249.6 LEN=40 TTL=47 ID=63779 TCP DPT=8080 WINDOW=23029 SYN 
Unauthorised access (Nov  1) SRC=60.30.249.6 LEN=40 TTL=47 ID=48018 TCP DPT=8080 WINDOW=15253 SYN 
Unauthorised access (Oct 31) SRC=60.30.249.6 LEN=40 TTL=47 ID=11352 TCP DPT=8080 WINDOW=23029 SYN 
Unauthorised access (Oct 31) SRC=60.30.249.6 LEN=40 TTL=47 ID=43333 TCP DPT=8080 WINDOW=15253 SYN 
Unauthorised access (Oct 29) SRC=60.30.249.6 LEN=40 TTL=47 ID=62091 TCP DPT=8080 WINDOW=15253 SYN 
Unauthorised access (Oct 29) SRC=60.30.249.6 LEN=40 TTL=47 ID=25245 TCP DPT=8080 WINDOW=23029 SYN
2019-11-02 19:03:11
45.172.171.250 attackbotsspam
23/tcp 23/tcp 23/tcp
[2019-10-07/11-02]3pkt
2019-11-02 19:30:17
123.135.127.85 attackbotsspam
firewall-block, port(s): 60001/tcp
2019-11-02 19:21:35
43.245.222.176 attackbots
Scanning random ports - tries to find possible vulnerable services
2019-11-02 19:12:20
5.142.104.51 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/5.142.104.51/ 
 
 RU - 1H : (148)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RU 
 NAME ASN : ASN12389 
 
 IP : 5.142.104.51 
 
 CIDR : 5.142.64.0/18 
 
 PREFIX COUNT : 2741 
 
 UNIQUE IP COUNT : 8699648 
 
 
 ATTACKS DETECTED ASN12389 :  
  1H - 1 
  3H - 9 
  6H - 14 
 12H - 30 
 24H - 75 
 
 DateTime : 2019-11-02 04:42:34 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-02 19:24:24
159.203.201.209 attackbots
3389/tcp 3306/tcp 8090/tcp...
[2019-09-12/10-31]44pkt,39pt.(tcp),1pt.(udp)
2019-11-02 19:17:43
123.18.206.15 attack
Nov  2 04:55:55 sd-53420 sshd\[18166\]: User root from 123.18.206.15 not allowed because none of user's groups are listed in AllowGroups
Nov  2 04:55:55 sd-53420 sshd\[18166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.18.206.15  user=root
Nov  2 04:55:56 sd-53420 sshd\[18166\]: Failed password for invalid user root from 123.18.206.15 port 53095 ssh2
Nov  2 05:00:13 sd-53420 sshd\[18469\]: Invalid user daniel from 123.18.206.15
Nov  2 05:00:13 sd-53420 sshd\[18469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.18.206.15
...
2019-11-02 19:02:49
74.82.47.23 attackspam
5900/tcp 3389/tcp 548/tcp...
[2019-08-31/10-31]55pkt,16pt.(tcp),2pt.(udp)
2019-11-02 19:17:17
186.182.233.228 attackspambots
ssh failed login
2019-11-02 19:00:50
183.30.201.16 attackspam
Port 1433 Scan
2019-11-02 19:27:10
117.4.168.208 attack
445/tcp 445/tcp
[2019-09-05/11-01]2pkt
2019-11-02 19:29:09
217.76.40.82 attackspam
Nov  2 04:42:27 zooi sshd[17148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.76.40.82
Nov  2 04:42:28 zooi sshd[17148]: Failed password for invalid user zzz from 217.76.40.82 port 45568 ssh2
...
2019-11-02 19:28:17

最近上报的IP列表

2001:41d0:2:1d0::1 2001:41d0:2:1ec3:: 2001:41d0:2:4776:: 2001:41d0:2:2207::
2001:41d0:2:699:: 2001:41d0:2:34d3:: 2001:41d0:2:56cd::1 2001:41d0:2:5c19::
2001:41d0:2:5eb1:: 2001:41d0:2:8a2c:: 2001:41d0:2:9657::1 2001:41d0:2:b09e::5
2001:41d0:2:b436:: 2001:41d0:2:8bd5:: 2001:41d0:2:d416:: 2001:41d0:2:d733::1
2001:41d0:2:bfcd::111 2001:41d0:301:100:137:74:127:44 2001:41d0:2:af21:: 2001:41d0:301:1::24