必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2001:550:2:30::45:11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 13590
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2001:550:2:30::45:11.		IN	A

;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Fri Feb 18 23:46:00 CST 2022
;; MSG SIZE  rcvd: 49

'
HOST信息:
Host 1.1.0.0.5.4.0.0.0.0.0.0.0.0.0.0.0.3.0.0.2.0.0.0.0.5.5.0.1.0.0.2.ip6.arpa not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 1.1.0.0.5.4.0.0.0.0.0.0.0.0.0.0.0.3.0.0.2.0.0.0.0.5.5.0.1.0.0.2.ip6.arpa: NXDOMAIN
最新评论:
IP 类型 评论内容 时间
119.29.134.163 attackspambots
Dec 16 15:57:57 meumeu sshd[12418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.134.163 
Dec 16 15:57:59 meumeu sshd[12418]: Failed password for invalid user alessandro from 119.29.134.163 port 59134 ssh2
Dec 16 16:04:12 meumeu sshd[13523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.134.163 
...
2019-12-16 23:19:06
81.22.45.71 attackspam
TCP 3389 (RDP)
2019-12-16 23:24:20
146.0.141.88 attackbots
Dec 16 04:37:33 auw2 sshd\[9129\]: Invalid user pcap from 146.0.141.88
Dec 16 04:37:33 auw2 sshd\[9129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.0.141.88
Dec 16 04:37:35 auw2 sshd\[9129\]: Failed password for invalid user pcap from 146.0.141.88 port 48096 ssh2
Dec 16 04:45:45 auw2 sshd\[10078\]: Invalid user wilmore from 146.0.141.88
Dec 16 04:45:45 auw2 sshd\[10078\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.0.141.88
2019-12-16 23:02:00
163.172.187.30 attackbotsspam
Dec 16 15:45:36 * sshd[10713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.187.30
Dec 16 15:45:39 * sshd[10713]: Failed password for invalid user blaisa from 163.172.187.30 port 41278 ssh2
2019-12-16 23:18:36
128.140.138.202 attackbotsspam
Automatically reported by fail2ban report script (powermetal_old)
2019-12-16 23:16:29
195.154.179.110 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-16 23:07:01
40.92.10.77 attackbotsspam
Dec 16 17:45:45 debian-2gb-vpn-nbg1-1 kernel: [885914.453692] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.10.77 DST=78.46.192.101 LEN=52 TOS=0x02 PREC=0x00 TTL=105 ID=16578 DF PROTO=TCP SPT=37446 DPT=25 WINDOW=8192 RES=0x00 CWR ECE SYN URGP=0
2019-12-16 23:05:58
172.105.83.142 attackbotsspam
Dec 16 15:45:17 novum-srv2 sshd[4310]: Invalid user like from 172.105.83.142 port 49644
Dec 16 15:46:57 novum-srv2 sshd[4479]: Invalid user like from 172.105.83.142 port 53200
Dec 16 15:48:34 novum-srv2 sshd[4523]: Invalid user adam from 172.105.83.142 port 56756
...
2019-12-16 23:18:07
106.13.114.26 attackbots
Dec 16 04:37:47 web1 sshd\[26051\]: Invalid user web from 106.13.114.26
Dec 16 04:37:47 web1 sshd\[26051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.114.26
Dec 16 04:37:49 web1 sshd\[26051\]: Failed password for invalid user web from 106.13.114.26 port 54744 ssh2
Dec 16 04:45:51 web1 sshd\[27080\]: Invalid user yoyo from 106.13.114.26
Dec 16 04:45:51 web1 sshd\[27080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.114.26
2019-12-16 22:56:36
42.112.51.75 attack
Unauthorized connection attempt from IP address 42.112.51.75 on Port 445(SMB)
2019-12-16 23:02:33
189.254.140.210 attack
Unauthorized connection attempt from IP address 189.254.140.210 on Port 445(SMB)
2019-12-16 23:07:27
170.130.187.42 attackspam
TCP 3389 (RDP)
2019-12-16 23:36:34
185.184.79.30 attack
firewall-block, port(s): 3389/tcp
2019-12-16 23:33:37
143.204.190.93 attackbots
TCP Port: 443 _    invalid blocked  zen-spamhaus also rbldns-ru _  _ Client xx.xx.4.90 _ _ (576)
2019-12-16 23:05:13
213.74.206.122 attackbots
Unauthorized connection attempt from IP address 213.74.206.122 on Port 445(SMB)
2019-12-16 23:20:10

最近上报的IP列表

2001:550:30e:4000::a 2001:550:30e:4000::d 2001:559:327:231::78 2001:608:c00:180::1:e6
2001:608:800:1::25 2001:550:30e:4000::e 2001:610:1410:280:24ee:f0cd:6282:7639 2001:610:1410:280:24ee:f0cd:bb36:7745
2001:5a8:601:7::80:0 2001:57b:100f:5200::1bc 2001:608:e00:72::120:0 2001:610:188:410:145:100:190:243
2001:610:1a0:1530:192:87:130:83 2001:610:468:4412::94 2001:610:1d9:ffff::80:10 2001:610:188:412:145:100:190:10
2001:610:1a08:292:129:125:2:51 2001:610:508:108:192:87:108:15 2001:610:908:112:131:180:77:102 2001:610:2d8:405::37:81