必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2001:550:2:30::45:11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 13590
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2001:550:2:30::45:11.		IN	A

;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Fri Feb 18 23:46:00 CST 2022
;; MSG SIZE  rcvd: 49

'
HOST信息:
Host 1.1.0.0.5.4.0.0.0.0.0.0.0.0.0.0.0.3.0.0.2.0.0.0.0.5.5.0.1.0.0.2.ip6.arpa not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 1.1.0.0.5.4.0.0.0.0.0.0.0.0.0.0.0.3.0.0.2.0.0.0.0.5.5.0.1.0.0.2.ip6.arpa: NXDOMAIN
最新评论:
IP 类型 评论内容 时间
209.97.155.122 attackspam
209.97.155.122 - - [24/Oct/2019:11:01:13 +0200] "GET /wp-login.php HTTP/1.1" 200 1129 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
209.97.155.122 - - [24/Oct/2019:11:01:19 +0200] "POST /wp-login.php HTTP/1.1" 200 1524 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
209.97.155.122 - - [24/Oct/2019:11:01:19 +0200] "GET /wp-login.php HTTP/1.1" 200 1129 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
209.97.155.122 - - [24/Oct/2019:11:01:20 +0200] "POST /wp-login.php HTTP/1.1" 200 1530 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
209.97.155.122 - - [24/Oct/2019:11:01:21 +0200] "GET /wp-login.php HTTP/1.1" 200 1129 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
209.97.155.122 - - [24/Oct/2019:11:01:23 +0200] "POST /wp-login.php HTTP/1.1" 200 1526 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-10-24 19:52:30
92.86.179.186 attackspambots
Oct 24 11:41:59 VM-53c21161-1059-419a-8c46-6835f32d2b41 sshd[32600]: Failed password for root from 92.86.179.186 port 43832 ssh2
Oct 24 11:49:09 VM-53c21161-1059-419a-8c46-6835f32d2b41 sshd[1409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.86.179.186
Oct 24 11:49:11 VM-53c21161-1059-419a-8c46-6835f32d2b41 sshd[1409]: Failed password for invalid user salomao from 92.86.179.186 port 44212 ssh2
...
2019-10-24 19:57:08
185.83.208.120 attackspambots
Automatic report - XMLRPC Attack
2019-10-24 19:36:55
138.197.89.212 attack
$f2bV_matches
2019-10-24 19:56:12
51.68.70.142 attackspam
Oct 24 13:59:54 srv206 sshd[26643]: Invalid user kcs from 51.68.70.142
Oct 24 13:59:54 srv206 sshd[26643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.ip-51-68-70.eu
Oct 24 13:59:54 srv206 sshd[26643]: Invalid user kcs from 51.68.70.142
Oct 24 13:59:56 srv206 sshd[26643]: Failed password for invalid user kcs from 51.68.70.142 port 37664 ssh2
...
2019-10-24 20:14:05
129.213.194.201 attack
Oct 23 21:15:19 eddieflores sshd\[9189\]: Invalid user password\* from 129.213.194.201
Oct 23 21:15:19 eddieflores sshd\[9189\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.194.201
Oct 23 21:15:22 eddieflores sshd\[9189\]: Failed password for invalid user password\* from 129.213.194.201 port 36968 ssh2
Oct 23 21:20:39 eddieflores sshd\[9571\]: Invalid user 123456 from 129.213.194.201
Oct 23 21:20:39 eddieflores sshd\[9571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.194.201
2019-10-24 19:38:12
116.110.117.42 attackbotsspam
Oct 24 17:33:51 areeb-Workstation sshd[11367]: Failed password for root from 116.110.117.42 port 24428 ssh2
...
2019-10-24 20:06:42
198.98.49.101 attackbots
2019-10-24T03:43:28.796185abusebot-6.cloudsearch.cf sshd\[12849\]: Invalid user vds from 198.98.49.101 port 41496
2019-10-24 19:46:08
81.84.235.209 attack
Oct 24 13:37:33 srv206 sshd[26571]: Invalid user ubuntu from 81.84.235.209
Oct 24 13:37:33 srv206 sshd[26571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns4.portugalinteractivo.pt
Oct 24 13:37:33 srv206 sshd[26571]: Invalid user ubuntu from 81.84.235.209
Oct 24 13:37:35 srv206 sshd[26571]: Failed password for invalid user ubuntu from 81.84.235.209 port 48528 ssh2
...
2019-10-24 19:41:08
45.73.12.219 attack
Oct 24 14:00:00 lnxmail61 sshd[2123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.73.12.219
2019-10-24 20:04:13
114.225.63.103 attack
Oct 23 23:24:30 esmtp postfix/smtpd[19939]: lost connection after AUTH from unknown[114.225.63.103]
Oct 23 23:24:31 esmtp postfix/smtpd[19939]: lost connection after AUTH from unknown[114.225.63.103]
Oct 23 23:24:33 esmtp postfix/smtpd[19939]: lost connection after AUTH from unknown[114.225.63.103]
Oct 23 23:24:34 esmtp postfix/smtpd[19939]: lost connection after AUTH from unknown[114.225.63.103]
Oct 23 23:24:36 esmtp postfix/smtpd[19939]: lost connection after AUTH from unknown[114.225.63.103]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=114.225.63.103
2019-10-24 20:00:16
51.75.160.215 attack
Oct 24 07:08:04 mail sshd\[15292\]: Invalid user sapaccount from 51.75.160.215
Oct 24 07:08:04 mail sshd\[15292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.160.215
...
2019-10-24 19:45:39
213.149.178.143 attackspambots
Automatic report - Banned IP Access
2019-10-24 19:52:07
177.66.79.201 attack
$f2bV_matches
2019-10-24 19:55:27
145.239.88.31 attack
WordPress wp-login brute force :: 145.239.88.31 0.136 BYPASS [24/Oct/2019:16:44:21  1100] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-24 19:50:38

最近上报的IP列表

2001:550:30e:4000::a 2001:550:30e:4000::d 2001:559:327:231::78 2001:608:c00:180::1:e6
2001:608:800:1::25 2001:550:30e:4000::e 2001:610:1410:280:24ee:f0cd:6282:7639 2001:610:1410:280:24ee:f0cd:bb36:7745
2001:5a8:601:7::80:0 2001:57b:100f:5200::1bc 2001:608:e00:72::120:0 2001:610:188:410:145:100:190:243
2001:610:1a0:1530:192:87:130:83 2001:610:468:4412::94 2001:610:1d9:ffff::80:10 2001:610:188:412:145:100:190:10
2001:610:1a08:292:129:125:2:51 2001:610:508:108:192:87:108:15 2001:610:908:112:131:180:77:102 2001:610:2d8:405::37:81