必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2001:da8:801d:7f1c:4177:be70:bc9b:4549
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 52208
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2001:da8:801d:7f1c:4177:be70:bc9b:4549.	IN A

;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Mon Nov 03 19:57:30 CST 2025
;; MSG SIZE  rcvd: 67

'
HOST信息:
Host 9.4.5.4.b.9.c.b.0.7.e.b.7.7.1.4.c.1.f.7.d.1.0.8.8.a.d.0.1.0.0.2.ip6.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 2001:da8:801d:7f1c:4177:be70:bc9b:4549.in-addr.arpa: SERVFAIL
最新评论:
IP 类型 评论内容 时间
14.249.64.109 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 25-11-2019 06:20:31.
2019-11-25 21:27:43
78.16.229.198 attackbots
78.16.229.198 was recorded 5 times by 1 hosts attempting to connect to the following ports: 51413. Incident counter (4h, 24h, all-time): 5, 5, 5
2019-11-25 22:00:21
14.231.195.5 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 25-11-2019 06:20:30.
2019-11-25 21:28:43
219.91.183.109 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 25-11-2019 06:20:34.
2019-11-25 21:22:29
188.166.232.14 attack
Invalid user myrtie from 188.166.232.14 port 58856
2019-11-25 22:03:44
14.190.228.63 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 25-11-2019 06:20:29.
2019-11-25 21:29:50
51.91.158.136 attackspam
Invalid user guest from 51.91.158.136 port 54278
2019-11-25 22:02:16
180.214.233.83 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 25-11-2019 06:20:32.
2019-11-25 21:24:31
102.140.254.125 attack
firewall-block, port(s): 80/tcp
2019-11-25 21:52:21
203.217.170.115 attackspam
firewall-block, port(s): 23/tcp
2019-11-25 21:43:01
60.2.26.206 attackspam
firewall-block, port(s): 1433/tcp
2019-11-25 21:58:21
128.199.185.42 attackbotsspam
Nov 25 09:56:01 [host] sshd[10551]: Invalid user varcass from 128.199.185.42
Nov 25 09:56:01 [host] sshd[10551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.185.42
Nov 25 09:56:03 [host] sshd[10551]: Failed password for invalid user varcass from 128.199.185.42 port 49009 ssh2
2019-11-25 21:52:56
209.17.97.2 attack
209.17.97.2 was recorded 5 times by 5 hosts attempting to connect to the following ports: 8531,68,5906,6002,6379. Incident counter (4h, 24h, all-time): 5, 38, 797
2019-11-25 22:00:54
138.197.145.26 attackspam
Automatic report - Banned IP Access
2019-11-25 21:52:39
219.85.159.132 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 25-11-2019 06:20:33.
2019-11-25 21:22:50

最近上报的IP列表

103.164.81.118 154.83.92.9 196.171.125.40 101.36.108.175
185.135.180.173 64.225.17.183 54.225.14.76 37.49.148.105
103.211.222.98 50.7.250.164 240e:40d:9f00:4b03:a142:90fb:50da:f95d 66.249.75.236
66.249.69.12 176.65.148.246 106.120.7.124 129.19.0.1
192.165.198.152 2003:d2:1f4a:5200:d5e1:6a61:fb4a:b189 96.32.221.33 111.27.5.234