必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.74.137.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38146
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.74.137.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 13:41:24 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 80.137.74.21.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 80.137.74.21.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
176.43.131.49 attackbotsspam
Jul 22 17:18:47 pornomens sshd\[27565\]: Invalid user kit from 176.43.131.49 port 35437
Jul 22 17:18:47 pornomens sshd\[27565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.43.131.49
Jul 22 17:18:49 pornomens sshd\[27565\]: Failed password for invalid user kit from 176.43.131.49 port 35437 ssh2
...
2019-07-23 00:17:57
217.138.50.154 attackbots
Jul 22 17:54:41 mail sshd\[10814\]: Invalid user user from 217.138.50.154 port 35726
Jul 22 17:54:41 mail sshd\[10814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.138.50.154
Jul 22 17:54:43 mail sshd\[10814\]: Failed password for invalid user user from 217.138.50.154 port 35726 ssh2
Jul 22 17:59:04 mail sshd\[11340\]: Invalid user server from 217.138.50.154 port 60878
Jul 22 17:59:04 mail sshd\[11340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.138.50.154
2019-07-23 00:02:35
138.197.213.233 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2019-07-23 00:45:33
121.144.118.2 attack
Feb 19 18:57:32 vtv3 sshd\[14155\]: Invalid user ts2 from 121.144.118.2 port 59794
Feb 19 18:57:32 vtv3 sshd\[14155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.144.118.2
Feb 19 18:57:34 vtv3 sshd\[14155\]: Failed password for invalid user ts2 from 121.144.118.2 port 59794 ssh2
Feb 19 19:04:18 vtv3 sshd\[15826\]: Invalid user bot from 121.144.118.2 port 49842
Feb 19 19:04:18 vtv3 sshd\[15826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.144.118.2
Mar  1 08:54:35 vtv3 sshd\[32294\]: Invalid user vh from 121.144.118.2 port 37546
Mar  1 08:54:35 vtv3 sshd\[32294\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.144.118.2
Mar  1 08:54:37 vtv3 sshd\[32294\]: Failed password for invalid user vh from 121.144.118.2 port 37546 ssh2
Mar  1 09:02:32 vtv3 sshd\[4308\]: Invalid user gruiz from 121.144.118.2 port 44188
Mar  1 09:02:32 vtv3 sshd\[4308\]: pam_unix\(sshd:auth
2019-07-22 23:47:40
13.71.1.224 attack
Jul 22 10:58:37 plusreed sshd[28252]: Invalid user admin1 from 13.71.1.224
...
2019-07-23 00:42:24
180.101.221.152 attackbotsspam
Jul 22 11:30:02 rb06 sshd[6549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.221.152  user=r.r
Jul 22 11:30:03 rb06 sshd[6549]: Failed password for r.r from 180.101.221.152 port 50800 ssh2
Jul 22 11:30:03 rb06 sshd[6549]: Received disconnect from 180.101.221.152: 11: Bye Bye [preauth]
Jul 22 11:45:58 rb06 sshd[7577]: Failed password for invalid user wangyi from 180.101.221.152 port 58676 ssh2
Jul 22 11:45:58 rb06 sshd[7577]: Received disconnect from 180.101.221.152: 11: Bye Bye [preauth]
Jul 22 11:49:42 rb06 sshd[17462]: Failed password for invalid user toni from 180.101.221.152 port 33288 ssh2
Jul 22 11:49:43 rb06 sshd[17462]: Received disconnect from 180.101.221.152: 11: Bye Bye [preauth]
Jul 22 11:53:26 rb06 sshd[17444]: Failed password for invalid user didi from 180.101.221.152 port 36136 ssh2
Jul 22 11:53:27 rb06 sshd[17444]: Received disconnect from 180.101.221.152: 11: Bye Bye [preauth]


........
-----------------------------------------------
https:
2019-07-23 00:13:21
131.175.120.99 attackbots
Jul 22 17:46:39 mail sshd\[9762\]: Invalid user feng from 131.175.120.99 port 46866
Jul 22 17:46:39 mail sshd\[9762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.175.120.99
Jul 22 17:46:41 mail sshd\[9762\]: Failed password for invalid user feng from 131.175.120.99 port 46866 ssh2
Jul 22 17:51:45 mail sshd\[10374\]: Invalid user support from 131.175.120.99 port 44674
Jul 22 17:51:45 mail sshd\[10374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.175.120.99
2019-07-23 00:03:54
54.36.148.252 attackbotsspam
Automatic report - Banned IP Access
2019-07-23 00:46:48
58.48.153.127 attackbots
Telnet Server BruteForce Attack
2019-07-22 23:49:08
177.94.84.243 attack
port scan and connect, tcp 80 (http)
2019-07-23 00:14:01
178.128.84.122 attackbots
2019-07-22T14:56:46.199317abusebot-5.cloudsearch.cf sshd\[27440\]: Invalid user roberto from 178.128.84.122 port 55742
2019-07-22 23:40:01
164.132.74.224 attack
Jul 22 17:36:47 SilenceServices sshd[7444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.74.224
Jul 22 17:36:49 SilenceServices sshd[7444]: Failed password for invalid user pm from 164.132.74.224 port 57526 ssh2
Jul 22 17:41:22 SilenceServices sshd[12587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.74.224
2019-07-23 00:00:20
190.242.46.250 attackbots
Unauthorised access (Jul 22) SRC=190.242.46.250 LEN=52 TTL=109 ID=2903 DF TCP DPT=445 WINDOW=8192 SYN
2019-07-22 23:53:14
77.116.174.254 attackspam
2019-07-22T15:39:13.965340abusebot-4.cloudsearch.cf sshd\[28928\]: Invalid user bh from 77.116.174.254 port 59390
2019-07-22 23:42:51
185.53.88.11 attack
MultiPort Probe, Scan (2015, 6015, 7015)
2019-07-23 00:38:53

最近上报的IP列表

237.22.206.104 181.241.246.244 206.24.47.153 120.88.28.107
206.40.240.52 71.6.168.53 159.220.151.116 119.210.43.6
73.24.162.207 165.136.51.208 149.43.253.174 207.148.203.213
37.118.224.175 119.175.229.5 101.30.88.157 128.224.72.92
255.44.197.116 93.68.242.92 47.62.5.62 43.240.122.146