必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2001:6b0:1:11c2::82ed:1c28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 61300
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2001:6b0:1:11c2::82ed:1c28.	IN	A

;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Fri Feb 18 23:46:19 CST 2022
;; MSG SIZE  rcvd: 55

'
HOST信息:
8.2.c.1.d.e.2.8.0.0.0.0.0.0.0.0.2.c.1.1.1.0.0.0.0.b.6.0.1.0.0.2.ip6.arpa domain name pointer www.kth.se.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
8.2.c.1.d.e.2.8.0.0.0.0.0.0.0.0.2.c.1.1.1.0.0.0.0.b.6.0.1.0.0.2.ip6.arpa	name = www.kth.se.

Authoritative answers can be found from:
最新评论:
IP 类型 评论内容 时间
81.133.12.221 attackbotsspam
Nov 24 03:52:23 ws22vmsma01 sshd[122952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.133.12.221
Nov 24 03:52:25 ws22vmsma01 sshd[122952]: Failed password for invalid user butter from 81.133.12.221 port 60547 ssh2
...
2019-11-24 16:27:55
80.82.65.74 attackbots
Scanning random ports - tries to find possible vulnerable services
2019-11-24 16:40:06
5.78.166.9 attackspambots
scan z
2019-11-24 16:32:48
113.111.54.209 attackbotsspam
Nov 24 06:26:36 www_kotimaassa_fi sshd[4697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.111.54.209
Nov 24 06:26:37 www_kotimaassa_fi sshd[4697]: Failed password for invalid user bl123 from 113.111.54.209 port 47078 ssh2
...
2019-11-24 16:45:26
40.73.78.233 attack
2019-11-24T08:24:08.669573tmaserv sshd\[24407\]: Failed password for invalid user kolek from 40.73.78.233 port 2624 ssh2
2019-11-24T09:30:35.437829tmaserv sshd\[27471\]: Invalid user tjemsland from 40.73.78.233 port 2624
2019-11-24T09:30:35.442263tmaserv sshd\[27471\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.78.233
2019-11-24T09:30:36.674753tmaserv sshd\[27471\]: Failed password for invalid user tjemsland from 40.73.78.233 port 2624 ssh2
2019-11-24T09:38:11.231083tmaserv sshd\[27851\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.78.233  user=root
2019-11-24T09:38:12.730068tmaserv sshd\[27851\]: Failed password for root from 40.73.78.233 port 2624 ssh2
...
2019-11-24 16:47:48
94.103.95.53 attackbots
0,10-01/01 [bc01/m07] PostRequest-Spammer scoring: brussels
2019-11-24 16:56:37
1.254.154.42 attackbots
Tried sshing with brute force.
2019-11-24 16:56:03
185.143.223.149 attack
firewall-block, port(s): 33002/tcp, 33011/tcp, 33034/tcp, 33185/tcp, 33197/tcp, 33252/tcp, 33324/tcp, 33353/tcp, 33359/tcp, 33400/tcp, 33469/tcp, 33473/tcp, 33634/tcp, 33730/tcp, 33803/tcp, 33810/tcp, 33848/tcp, 33916/tcp
2019-11-24 16:40:39
61.92.14.168 attack
Nov 24 03:21:45 server sshd\[32252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=061092014168.ctinets.com 
Nov 24 03:21:47 server sshd\[32252\]: Failed password for invalid user administrator from 61.92.14.168 port 44272 ssh2
Nov 24 11:08:46 server sshd\[22091\]: Invalid user www from 61.92.14.168
Nov 24 11:08:46 server sshd\[22091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=061092014168.ctinets.com 
Nov 24 11:08:47 server sshd\[22091\]: Failed password for invalid user www from 61.92.14.168 port 47244 ssh2
...
2019-11-24 16:31:20
116.236.85.130 attackbotsspam
Nov 23 20:19:45 web1 sshd\[14507\]: Invalid user pebekka123 from 116.236.85.130
Nov 23 20:19:45 web1 sshd\[14507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.236.85.130
Nov 23 20:19:47 web1 sshd\[14507\]: Failed password for invalid user pebekka123 from 116.236.85.130 port 51330 ssh2
Nov 23 20:26:47 web1 sshd\[15293\]: Invalid user isador from 116.236.85.130
Nov 23 20:26:47 web1 sshd\[15293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.236.85.130
2019-11-24 16:41:10
63.88.23.136 attack
63.88.23.136 was recorded 7 times by 5 hosts attempting to connect to the following ports: 80. Incident counter (4h, 24h, all-time): 7, 39, 565
2019-11-24 16:46:45
101.251.228.26 attack
Nov 24 08:38:32 vmanager6029 sshd\[14379\]: Invalid user emmetie from 101.251.228.26 port 55780
Nov 24 08:38:32 vmanager6029 sshd\[14379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.251.228.26
Nov 24 08:38:33 vmanager6029 sshd\[14379\]: Failed password for invalid user emmetie from 101.251.228.26 port 55780 ssh2
2019-11-24 16:22:56
182.61.33.137 attack
Nov 24 09:13:19 nextcloud sshd\[12280\]: Invalid user lansupport from 182.61.33.137
Nov 24 09:13:19 nextcloud sshd\[12280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.33.137
Nov 24 09:13:21 nextcloud sshd\[12280\]: Failed password for invalid user lansupport from 182.61.33.137 port 56984 ssh2
...
2019-11-24 16:44:48
117.6.125.102 attackspam
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=117.6.125.102
2019-11-24 16:55:20
218.92.0.193 attackbots
Nov 24 04:11:21 firewall sshd[8041]: Failed password for root from 218.92.0.193 port 29508 ssh2
Nov 24 04:11:21 firewall sshd[8041]: error: maximum authentication attempts exceeded for root from 218.92.0.193 port 29508 ssh2 [preauth]
Nov 24 04:11:21 firewall sshd[8041]: Disconnecting: Too many authentication failures [preauth]
...
2019-11-24 16:49:41

最近上报的IP列表

2001:6b0:23:90::29 2001:6b0:50::1:3 2001:6b0:2:200c::7110 2001:6b0:41:12::185
2001:6b0:52:4000::5:5 2001:6b0:53::34 2001:6b0:60:c0::51 2001:6b0:5:50::171
2001:6b0:60:c0::50 2001:6b0:b:242:130:238:7:135 2001:6b0:e:2::10 2001:6b0:b:242:130:238:7:133
2001:6d8:10:1060::6034 2001:700:200:6::11 2001:700:300:6::102 2001:700:300:6::103
2001:6d0:4001::226 2001:6b0:b:242:130:238:7:134 2001:700:4602:443::135 2001:700:700:1::46