必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.199.145.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4490
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.199.145.229.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:55:18 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 229.145.199.21.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 229.145.199.21.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.62.247.89 attackbots
2222/tcp 22/tcp 22222/tcp...
[2020-02-25/03-04]9pkt,3pt.(tcp)
2020-03-04 22:10:49
180.182.229.200 attackspam
8080/tcp 2323/tcp
[2020-02-17/03-04]2pkt
2020-03-04 21:53:43
49.51.13.40 attackbotsspam
Honeypot attack, port: 2000, PTR: PTR record not found
2020-03-04 21:52:25
71.6.233.191 attack
873/tcp 445/tcp 60443/tcp...
[2020-01-06/03-04]11pkt,10pt.(tcp),1pt.(udp)
2020-03-04 22:18:46
103.59.208.29 attackbots
port scan and connect, tcp 1433 (ms-sql-s)
2020-03-04 21:47:50
113.252.119.250 attack
Honeypot attack, port: 5555, PTR: 250-119-252-113-on-nets.com.
2020-03-04 22:03:21
189.41.104.143 attack
Unauthorised access (Mar  4) SRC=189.41.104.143 LEN=44 TTL=48 ID=26938 TCP DPT=23 WINDOW=48836 SYN
2020-03-04 22:06:45
221.195.189.144 attackspambots
$f2bV_matches
2020-03-04 22:20:11
181.188.191.226 attackbots
Honeypot attack, port: 445, PTR: LPZ-181-188-191-00226.tigo.bo.
2020-03-04 21:45:36
217.61.125.156 attackspam
3389BruteforceStormFW21
2020-03-04 21:54:37
81.17.92.4 attack
1433/tcp 445/tcp...
[2020-01-08/03-04]8pkt,2pt.(tcp)
2020-03-04 22:03:35
218.92.0.201 attackspambots
Mar  4 14:54:05 silence02 sshd[5371]: Failed password for root from 218.92.0.201 port 53229 ssh2
Mar  4 14:55:46 silence02 sshd[5439]: Failed password for root from 218.92.0.201 port 10202 ssh2
2020-03-04 22:12:59
111.11.26.217 attackbots
Portscan or hack attempt detected by psad/fwsnort
2020-03-04 22:20:51
206.189.145.251 attack
Mar  4 14:37:35 sso sshd[23395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.145.251
Mar  4 14:37:37 sso sshd[23395]: Failed password for invalid user db2fenc1 from 206.189.145.251 port 36916 ssh2
...
2020-03-04 21:50:34
221.214.74.10 attackbotsspam
$f2bV_matches
2020-03-04 22:08:36

最近上报的IP列表

46.192.83.19 160.218.169.37 98.209.206.75 160.206.31.108
37.56.70.13 118.85.46.0 147.82.135.80 20.73.53.112
95.47.53.81 46.65.179.42 33.234.204.8 78.72.109.104
179.173.239.143 117.166.193.209 147.201.185.250 161.127.17.64
188.67.216.72 193.52.185.163 211.26.201.124 79.148.204.181