必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 215.54.255.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47515
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;215.54.255.150.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 03:54:40 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 150.255.54.215.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 215.54.255.150.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.121.148.30 attackbots
Unauthorized connection attempt from IP address 190.121.148.30 on Port 445(SMB)
2020-02-26 07:36:57
150.109.167.136 attackspam
suspicious action Tue, 25 Feb 2020 13:33:04 -0300
2020-02-26 07:06:19
62.196.125.153 attackspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-26 07:25:10
49.228.178.16 attack
Honeypot attack, port: 445, PTR: 49-228-178-0.24.nat.tls1b-cgn02.myaisfibre.com.
2020-02-26 07:32:55
59.126.158.139 attackbots
suspicious action Tue, 25 Feb 2020 13:32:31 -0300
2020-02-26 07:29:08
191.31.15.41 attackbots
Honeypot attack, port: 81, PTR: 191.31.15.41.dynamic.adsl.gvt.net.br.
2020-02-26 07:09:53
114.217.141.100 attack
suspicious action Tue, 25 Feb 2020 13:32:14 -0300
2020-02-26 07:43:17
189.213.160.28 attack
Feb 25 17:32:11 h2177944 kernel: \[5846112.641103\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=189.213.160.28 DST=85.214.117.9 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=4916 DF PROTO=TCP SPT=43419 DPT=23 WINDOW=5840 RES=0x00 SYN URGP=0 
Feb 25 17:32:11 h2177944 kernel: \[5846112.641118\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=189.213.160.28 DST=85.214.117.9 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=4916 DF PROTO=TCP SPT=43419 DPT=23 WINDOW=5840 RES=0x00 SYN URGP=0 
Feb 25 17:32:14 h2177944 kernel: \[5846115.640284\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=189.213.160.28 DST=85.214.117.9 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=4917 DF PROTO=TCP SPT=43419 DPT=23 WINDOW=5840 RES=0x00 SYN URGP=0 
Feb 25 17:32:14 h2177944 kernel: \[5846115.640302\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=189.213.160.28 DST=85.214.117.9 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=4917 DF PROTO=TCP SPT=43419 DPT=23 WINDOW=5840 RES=0x00 SYN URGP=0 
Feb 25 17:32:20 h2177944 kernel: \[5846121.639348\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=189.213.160.28 DST=85.214.117.
2020-02-26 07:35:49
200.98.163.186 attackspambots
suspicious action Tue, 25 Feb 2020 14:57:01 -0300
2020-02-26 07:19:51
46.148.192.41 attackbots
Invalid user john from 46.148.192.41 port 34708
2020-02-26 07:30:32
218.104.231.2 attack
Invalid user app from 218.104.231.2 port 33186
2020-02-26 07:18:08
81.33.27.115 attackspam
Unauthorized connection attempt from IP address 81.33.27.115 on Port 445(SMB)
2020-02-26 07:09:11
121.33.146.70 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-26 07:25:39
45.73.125.124 attack
Invalid user testuser from 45.73.125.124 port 37994
2020-02-26 07:17:37
2.59.78.29 attackbotsspam
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-02-26 07:36:29

最近上报的IP列表

217.137.14.110 215.99.66.139 210.225.48.26 210.124.22.94
144.216.125.234 251.219.143.12 20.209.240.11 219.10.191.115
127.175.171.230 167.117.32.56 79.207.217.246 87.86.208.248
7.61.218.221 30.80.8.218 134.7.201.1 42.163.158.119
255.200.183.188 191.208.72.100 91.57.44.231 217.7.228.100