必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2001:4420:801e:0:2::1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 21120
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2001:4420:801e:0:2::1.		IN	A

;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Fri Feb 18 23:45:40 CST 2022
;; MSG SIZE  rcvd: 50

'
HOST信息:
b'1.0.0.0.0.0.0.0.0.0.0.0.2.0.0.0.0.0.0.0.e.1.0.8.0.2.4.4.1.0.0.2.ip6.arpa domain name pointer mail.kmfa.gov.tw.
'
NSLOOKUP信息:
b'1.0.0.0.0.0.0.0.0.0.0.0.2.0.0.0.0.0.0.0.e.1.0.8.0.2.4.4.1.0.0.2.ip6.arpa	name = mail.kmfa.gov.tw.

Authoritative answers can be found from:

'
最新评论:
IP 类型 评论内容 时间
142.93.195.249 attackbots
Sep  4 12:09:33 marvibiene sshd[7134]: Failed password for root from 142.93.195.249 port 35784 ssh2
Sep  4 12:09:42 marvibiene sshd[7138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.195.249 
Sep  4 12:09:44 marvibiene sshd[7138]: Failed password for invalid user oracle from 142.93.195.249 port 60592 ssh2
2020-09-04 18:35:50
170.84.163.206 attack
Sep  3 18:44:57 mellenthin postfix/smtpd[20408]: NOQUEUE: reject: RCPT from unknown[170.84.163.206]: 554 5.7.1 Service unavailable; Client host [170.84.163.206] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/170.84.163.206; from= to= proto=ESMTP helo=<206.163.84.170.ampernet.com.br>
2020-09-04 18:06:48
213.14.216.51 attackbots
Unauthorized connection attempt from IP address 213.14.216.51 on Port 445(SMB)
2020-09-04 18:01:32
71.117.128.50 attack
2020-09-04T09:18:22.303387mail.broermann.family sshd[8333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=pool-71-117-128-50.prvdri.fios.verizon.net
2020-09-04T09:18:22.296346mail.broermann.family sshd[8333]: Invalid user al from 71.117.128.50 port 48978
2020-09-04T09:18:24.575267mail.broermann.family sshd[8333]: Failed password for invalid user al from 71.117.128.50 port 48978 ssh2
2020-09-04T09:20:55.382018mail.broermann.family sshd[8440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=pool-71-117-128-50.prvdri.fios.verizon.net  user=root
2020-09-04T09:20:57.657555mail.broermann.family sshd[8440]: Failed password for root from 71.117.128.50 port 33296 ssh2
...
2020-09-04 18:13:58
122.51.166.84 attackbotsspam
Sep  4 11:58:27 mout sshd[21304]: Invalid user tuan from 122.51.166.84 port 45236
2020-09-04 18:07:19
113.253.217.184 attackspambots
Unauthorized connection attempt from IP address 113.253.217.184 on Port 445(SMB)
2020-09-04 18:00:53
61.178.108.175 attackspambots
 TCP (SYN) 61.178.108.175:43492 -> port 445, len 44
2020-09-04 18:35:32
199.38.117.81 attackbotsspam
Received: from oneirritics.com (199.38.117.81.oneirocritics.com. [199.38.117.81])
        by mx.google.com with ESMTPS id c17si1728418qvi.120.2020.09.03.00.39.41
        for <>
        (version=TLS1 cipher=ECDHE-ECDSA-AES128-SHA bits=128/128);
        Thu, 03 Sep 2020 00:39:41 -0700 (PDT)
Received-SPF: neutral (google.com: 199.38.117.81 is neither permitted nor denied by best guess record for domain of return@restojob.lp) client-ip=199.38.117.81;
Authentication-Results: mx.google.com;
       dkim=pass header.i=@oneirocritics.com header.s=key1 header.b="An/fo+Ia";
       spf=neutral (google.com: 199.38.117.81 is neither permitted nor denied by best guess record for domain of return@restojob.lp) smtp.mailfrom=return@restojob.lp
2020-09-04 18:39:22
192.241.239.16 attack
firewall-block, port(s): 8088/tcp
2020-09-04 18:18:17
62.234.153.213 attackbotsspam
(sshd) Failed SSH login from 62.234.153.213 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  4 03:15:39 optimus sshd[2369]: Invalid user xy from 62.234.153.213
Sep  4 03:15:39 optimus sshd[2369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.153.213 
Sep  4 03:15:41 optimus sshd[2369]: Failed password for invalid user xy from 62.234.153.213 port 44746 ssh2
Sep  4 03:19:43 optimus sshd[3338]: Invalid user deploy from 62.234.153.213
Sep  4 03:19:43 optimus sshd[3338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.153.213
2020-09-04 18:26:58
72.19.12.144 attackbotsspam
72.19.12.144 has been banned for [spam]
...
2020-09-04 18:13:35
186.23.105.150 attack
Sep  3 18:44:43 mellenthin postfix/smtpd[20378]: NOQUEUE: reject: RCPT from unknown[186.23.105.150]: 554 5.7.1 Service unavailable; Client host [186.23.105.150] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/186.23.105.150; from= to= proto=ESMTP helo=
2020-09-04 18:18:36
122.224.237.234 attack
Sep  4 15:18:02 gw1 sshd[15015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.237.234
Sep  4 15:18:04 gw1 sshd[15015]: Failed password for invalid user ftp1 from 122.224.237.234 port 50772 ssh2
...
2020-09-04 18:34:11
194.180.224.103 attackbotsspam
Sep  4 12:08:32 MainVPS sshd[9137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.180.224.103  user=root
Sep  4 12:08:34 MainVPS sshd[9137]: Failed password for root from 194.180.224.103 port 43070 ssh2
Sep  4 12:08:47 MainVPS sshd[10057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.180.224.103  user=root
Sep  4 12:08:49 MainVPS sshd[10057]: Failed password for root from 194.180.224.103 port 35928 ssh2
Sep  4 12:09:03 MainVPS sshd[10144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.180.224.103  user=root
Sep  4 12:09:05 MainVPS sshd[10144]: Failed password for root from 194.180.224.103 port 56894 ssh2
...
2020-09-04 18:28:28
115.192.150.191 attackspambots
Honeypot attack, port: 5555, PTR: PTR record not found
2020-09-04 18:05:53

最近上报的IP列表

2001:41d0:404:200::69e 2001:4420:801e:0:2::15 2001:4490:effc:3:4000::47 2001:4420:e300:172:203:65:84:200
2001:4478:1310:1fff:203:173:50:152 2001:454e:c010:101::199 2001:4420:67f0:132::1 2001:468:cc0:1802:0:76ff:fe3e:a9dc
2001:470:0:170::b869:d20a 2001:470:0:19c::b869:816d 2001:468:c80:a202:0:b074:0:c082 2001:470:0:1d5::4131:3228
2001:470:0:1f2::b869:4820 2001:470:0:1f4::b869:4a09 2001:470:142:5::242 2001:470:142:5::116
2001:470:1:116::20 2001:470:1:1ec::403e:d6c3 2001:470:1:255::42a0:9063 2001:470:142::152