必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 201.222.21.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39926
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;201.222.21.249.			IN	A

;; AUTHORITY SECTION:
.			238	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062600 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 26 23:15:29 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
249.21.222.201.in-addr.arpa domain name pointer 201-222-21-249.dinamico.bahialink.net.br.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
249.21.222.201.in-addr.arpa	name = 201-222-21-249.dinamico.bahialink.net.br.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
78.30.239.222 attackbots
Unauthorized connection attempt detected from IP address 78.30.239.222 to port 80 [J]
2020-02-06 04:32:57
94.228.195.23 attack
Unauthorized connection attempt detected from IP address 94.228.195.23 to port 8080 [J]
2020-02-06 04:31:09
81.214.141.10 attackbots
Unauthorized connection attempt detected from IP address 81.214.141.10 to port 23 [J]
2020-02-06 04:52:55
211.107.247.246 attackspam
Unauthorized connection attempt detected from IP address 211.107.247.246 to port 23 [J]
2020-02-06 05:01:55
15.206.70.23 attackbotsspam
Unauthorized connection attempt detected from IP address 15.206.70.23 to port 2220 [J]
2020-02-06 04:38:51
3.87.153.5 attack
Unauthorized connection attempt detected from IP address 3.87.153.5 to port 81 [J]
2020-02-06 04:59:57
190.96.47.2 attackbots
Unauthorized connection attempt detected from IP address 190.96.47.2 to port 1433 [J]
2020-02-06 05:05:43
212.33.235.34 attackbots
Unauthorized connection attempt detected from IP address 212.33.235.34 to port 8080 [J]
2020-02-06 05:01:39
178.219.22.185 attackbotsspam
Unauthorized connection attempt detected from IP address 178.219.22.185 to port 8080 [J]
2020-02-06 05:08:44
191.97.36.214 attack
Unauthorized connection attempt detected from IP address 191.97.36.214 to port 23 [J]
2020-02-06 04:41:54
111.43.223.134 attackspambots
Unauthorized connection attempt detected from IP address 111.43.223.134 to port 23 [J]
2020-02-06 04:50:05
162.62.16.15 attack
Unauthorized connection attempt detected from IP address 162.62.16.15 to port 8138 [J]
2020-02-06 04:46:03
178.151.191.154 attackspam
Unauthorized connection attempt detected from IP address 178.151.191.154 to port 26 [J]
2020-02-06 05:08:55
106.45.1.39 attack
The IP has triggered Cloudflare WAF. CF-Ray: 560547b4df36eae7 | WAF_Rule_ID: a75424b44a1e4f27881d03344a122815 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: ip.skk.moe | User-Agent: Mozilla/4.049897920 Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729) | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2020-02-06 04:50:32
74.108.224.112 attackbots
Unauthorized connection attempt detected from IP address 74.108.224.112 to port 23 [J]
2020-02-06 04:54:18

最近上报的IP列表

180.76.84.97 169.229.25.240 169.229.25.246 169.229.26.120
169.229.26.7 137.226.242.188 116.203.210.245 137.226.36.21
170.239.84.238 180.76.36.61 101.35.230.8 169.229.59.165
169.229.63.253 169.229.63.243 169.229.66.201 169.229.89.204
169.229.115.47 169.229.94.239 141.212.122.156 169.229.86.244