必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Australia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.20.204.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38209
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;203.20.204.5.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 16:35:23 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 5.204.20.203.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 5.204.20.203.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.92.0.178 attackbotsspam
Feb  4 14:53:14 vpn01 sshd[21375]: Failed password for root from 218.92.0.178 port 11876 ssh2
Feb  4 14:53:17 vpn01 sshd[21375]: Failed password for root from 218.92.0.178 port 11876 ssh2
...
2020-02-04 21:53:46
138.118.101.69 attack
Automatic report - Port Scan Attack
2020-02-04 21:49:55
121.101.129.125 attackspam
Feb  4 05:52:40 grey postfix/smtpd\[14724\]: NOQUEUE: reject: RCPT from unknown\[121.101.129.125\]: 554 5.7.1 Service unavailable\; Client host \[121.101.129.125\] blocked using cbl.abuseat.org\; Blocked - see http://www.abuseat.org/lookup.cgi\?ip=121.101.129.125\; from=\ to=\ proto=ESMTP helo=\
...
2020-02-04 21:28:30
190.245.185.228 attack
Feb  4 05:52:09 grey postfix/smtpd\[28638\]: NOQUEUE: reject: RCPT from 228-185-245-190.fibertel.com.ar\[190.245.185.228\]: 554 5.7.1 Service unavailable\; Client host \[190.245.185.228\] blocked using dul.dnsbl.sorbs.net\; Dynamic IP Addresses See: http://www.sorbs.net/lookup.shtml\?190.245.185.228\; from=\ to=\ proto=ESMTP helo=\<228-185-245-190.fibertel.com.ar\>
...
2020-02-04 21:48:31
104.211.215.159 attackbots
Feb  4 08:37:52 plusreed sshd[8462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.215.159  user=root
Feb  4 08:37:54 plusreed sshd[8462]: Failed password for root from 104.211.215.159 port 32588 ssh2
...
2020-02-04 21:39:50
188.146.183.197 attackspam
Feb  4 14:53:20 grey postfix/smtpd\[25150\]: NOQUEUE: reject: RCPT from 188.146.183.197.nat.umts.dynamic.t-mobile.pl\[188.146.183.197\]: 554 5.7.1 Service unavailable\; Client host \[188.146.183.197\] blocked using dul.dnsbl.sorbs.net\; Dynamic IP Addresses See: http://www.sorbs.net/lookup.shtml\?188.146.183.197\; from=\ to=\ proto=ESMTP helo=\<188.146.183.197.nat.umts.dynamic.t-mobile.pl\>
...
2020-02-04 21:54:23
189.252.17.146 attack
" "
2020-02-04 21:56:58
125.161.128.161 attackspambots
1580791972 - 02/04/2020 05:52:52 Host: 125.161.128.161/125.161.128.161 Port: 445 TCP Blocked
2020-02-04 21:20:42
123.207.252.233 attack
Feb  4 11:55:44 journals dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 4 secs\): user=\, method=PLAIN, rip=123.207.252.233, lip=212.111.212.230, session=\<8sTgCr2dMOJ7z/zp\>
Feb  4 11:55:53 journals dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 8 secs\): user=\, method=PLAIN, rip=123.207.252.233, lip=212.111.212.230, session=\<3A8xC72dkOV7z/zp\>
Feb  4 11:56:07 journals dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 13 secs\): user=\, method=PLAIN, rip=123.207.252.233, lip=212.111.212.230, session=\
Feb  4 11:57:31 journals dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 5 secs\): user=\, method=PLAIN, rip=123.207.252.233, lip=212.111.212.230, session=\
Feb  4 11:57:39 journals dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 8 secs\): user=\, method=PLAIN, rip=123
...
2020-02-04 21:27:14
144.48.110.114 attackspambots
Feb  4 09:29:37 grey postfix/smtpd\[30206\]: NOQUEUE: reject: RCPT from unknown\[144.48.110.114\]: 554 5.7.1 Service unavailable\; Client host \[144.48.110.114\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[144.48.110.114\]\; from=\ to=\ proto=ESMTP helo=\<\[144.48.110.114\]\>
...
2020-02-04 21:44:26
117.50.90.10 attackbotsspam
Unauthorized connection attempt detected from IP address 117.50.90.10 to port 2220 [J]
2020-02-04 21:26:17
42.112.149.40 attackbotsspam
1580791926 - 02/04/2020 05:52:06 Host: 42.112.149.40/42.112.149.40 Port: 445 TCP Blocked
2020-02-04 21:51:15
120.132.12.162 attackspam
Unauthorized connection attempt detected from IP address 120.132.12.162 to port 2220 [J]
2020-02-04 21:52:02
46.166.142.108 attackspam
[2020-02-04 04:45:37] NOTICE[1148][C-000062c6] chan_sip.c: Call from '' (46.166.142.108:52143) to extension '59939011441904911123' rejected because extension not found in context 'public'.
[2020-02-04 04:45:37] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-02-04T04:45:37.335-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="59939011441904911123",SessionID="0x7fd82c2348d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.142.108/52143",ACLName="no_extension_match"
[2020-02-04 04:46:18] NOTICE[1148][C-000062c8] chan_sip.c: Call from '' (46.166.142.108:56061) to extension '59949011441904911123' rejected because extension not found in context 'public'.
[2020-02-04 04:46:18] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-02-04T04:46:18.908-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="59949011441904911123",SessionID="0x7fd82c3c1c38",LocalAddress="IPV4/UDP/192.168.244.6/5060",R
...
2020-02-04 21:26:36
180.76.183.99 attackspam
Unauthorized connection attempt detected from IP address 180.76.183.99 to port 2220 [J]
2020-02-04 21:24:09

最近上报的IP列表

138.22.50.30 79.254.76.142 42.107.224.152 110.29.102.107
229.235.5.9 34.10.241.54 3.118.214.68 246.111.241.179
66.196.80.48 146.233.187.29 241.49.15.158 160.148.255.248
50.11.234.89 186.247.93.157 213.27.130.127 97.80.122.3
63.222.107.77 81.9.179.211 240.165.223.102 90.141.200.68