必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2001:da8:801d:7f1c:4177:be70:bc9b:4549
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 52208
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2001:da8:801d:7f1c:4177:be70:bc9b:4549.	IN A

;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Mon Nov 03 19:57:30 CST 2025
;; MSG SIZE  rcvd: 67

'
HOST信息:
Host 9.4.5.4.b.9.c.b.0.7.e.b.7.7.1.4.c.1.f.7.d.1.0.8.8.a.d.0.1.0.0.2.ip6.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 2001:da8:801d:7f1c:4177:be70:bc9b:4549.in-addr.arpa: SERVFAIL
最新评论:
IP 类型 评论内容 时间
195.54.166.26 attackspam
May 10 16:45:51 debian-2gb-nbg1-2 kernel: \[11380822.433461\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.54.166.26 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=32485 PROTO=TCP SPT=49133 DPT=2830 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-10 23:22:11
176.92.165.64 attackspambots
Telnet Server BruteForce Attack
2020-05-10 23:13:36
193.254.135.252 attackspambots
May 10 14:13:06 host sshd[9292]: Invalid user cisco from 193.254.135.252 port 42238
...
2020-05-10 23:16:30
82.177.122.105 attack
(smtpauth) Failed SMTP AUTH login from 82.177.122.105 (PL/Poland/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-05-10 16:42:50 plain authenticator failed for ([82.177.122.105]) [82.177.122.105]: 535 Incorrect authentication data (set_id=m.kamran)
2020-05-10 23:18:21
197.238.106.42 attackspambots
Automatic report - Banned IP Access
2020-05-10 23:17:02
128.199.72.96 attack
May 10 14:31:00 vps sshd[885898]: Invalid user celine from 128.199.72.96 port 41380
May 10 14:31:00 vps sshd[885898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.72.96
May 10 14:31:03 vps sshd[885898]: Failed password for invalid user celine from 128.199.72.96 port 41380 ssh2
May 10 14:35:21 vps sshd[906311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.72.96  user=root
May 10 14:35:24 vps sshd[906311]: Failed password for root from 128.199.72.96 port 49900 ssh2
...
2020-05-10 22:54:42
197.185.112.140 attackbotsspam
2020-05-10T14:13:22.522924 X postfix/smtpd[991341]: NOQUEUE: reject: RCPT from unknown[197.185.112.140]: 554 5.7.1 Service unavailable; Client host [197.185.112.140] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/197.185.112.140; from= to= proto=ESMTP helo=
2020-05-10 23:03:14
141.98.9.157 attack
SSH Brute-Force attacks
2020-05-10 22:56:35
64.227.7.213 attack
64.227.7.213 - - \[10/May/2020:14:13:24 +0200\] "POST /wp-login.php HTTP/1.0" 200 5924 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
64.227.7.213 - - \[10/May/2020:14:13:29 +0200\] "POST /wp-login.php HTTP/1.0" 200 5737 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
64.227.7.213 - - \[10/May/2020:14:13:33 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-05-10 22:49:45
106.12.141.71 attackspambots
May 10 16:14:25 dev0-dcde-rnet sshd[13609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.141.71
May 10 16:14:27 dev0-dcde-rnet sshd[13609]: Failed password for invalid user test from 106.12.141.71 port 57064 ssh2
May 10 16:17:52 dev0-dcde-rnet sshd[13620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.141.71
2020-05-10 23:21:24
185.118.48.206 attackspam
May 10 15:14:09 legacy sshd[25315]: Failed password for root from 185.118.48.206 port 37312 ssh2
May 10 15:18:18 legacy sshd[25583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.118.48.206
May 10 15:18:20 legacy sshd[25583]: Failed password for invalid user amit from 185.118.48.206 port 45538 ssh2
...
2020-05-10 22:50:33
142.93.224.54 attack
port scan and connect, tcp 23 (telnet)
2020-05-10 22:54:04
106.12.16.2 attack
May 10 13:53:59 mail sshd[11338]: Invalid user user from 106.12.16.2
May 10 13:53:59 mail sshd[11338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.2
May 10 13:53:59 mail sshd[11338]: Invalid user user from 106.12.16.2
May 10 13:54:01 mail sshd[11338]: Failed password for invalid user user from 106.12.16.2 port 60660 ssh2
May 10 14:13:14 mail sshd[14003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.2  user=root
May 10 14:13:16 mail sshd[14003]: Failed password for root from 106.12.16.2 port 43508 ssh2
...
2020-05-10 23:08:08
118.70.216.153 attack
Unauthorized connection attempt detected from IP address 118.70.216.153 to port 22 [T]
2020-05-10 22:58:45
51.38.15.162 attackbots
client 51.38.15.162#51083 (VERSION.BIND): query: VERSION.BIND CH TXT +
2020-05-10 23:05:20

最近上报的IP列表

103.164.81.118 154.83.92.9 196.171.125.40 101.36.108.175
185.135.180.173 64.225.17.183 54.225.14.76 37.49.148.105
103.211.222.98 50.7.250.164 240e:40d:9f00:4b03:a142:90fb:50da:f95d 66.249.75.236
66.249.69.12 176.65.148.246 106.120.7.124 129.19.0.1
192.165.198.152 2003:d2:1f4a:5200:d5e1:6a61:fb4a:b189 96.32.221.33 111.27.5.234