必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Burnaby

省份(region): British Columbia

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.21.138.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43766
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;216.21.138.152.			IN	A

;; AUTHORITY SECTION:
.			540	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020021901 1800 900 604800 86400

;; Query time: 88 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 05:40:37 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
152.138.21.216.in-addr.arpa domain name pointer 216-21-138-152.ip.van.radiant.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
152.138.21.216.in-addr.arpa	name = 216-21-138-152.ip.van.radiant.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
80.82.65.90 attackspam
SmallBizIT.US 3 packets to udp(53,123,389)
2020-07-20 06:28:16
83.169.216.207 attackspambots
20/7/19@12:02:24: FAIL: Alarm-Network address from=83.169.216.207
...
2020-07-20 06:00:15
103.137.152.114 attack
1433/tcp 445/tcp...
[2020-06-26/07-19]9pkt,2pt.(tcp)
2020-07-20 06:05:56
205.185.116.156 attackbotsspam
 TCP (SYN) 205.185.116.156:55888 -> port 8080, len 44
2020-07-20 06:27:49
107.132.88.42 attackspam
Jul 20 00:15:40 webhost01 sshd[20010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.132.88.42
Jul 20 00:15:42 webhost01 sshd[20010]: Failed password for invalid user kv from 107.132.88.42 port 40724 ssh2
...
2020-07-20 06:24:32
112.64.33.38 attackspam
Jul 19 22:50:31 vps639187 sshd\[1307\]: Invalid user school from 112.64.33.38 port 38411
Jul 19 22:50:31 vps639187 sshd\[1307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.33.38
Jul 19 22:50:33 vps639187 sshd\[1307\]: Failed password for invalid user school from 112.64.33.38 port 38411 ssh2
...
2020-07-20 06:02:31
79.137.116.226 attack
5070/udp 5060/udp...
[2020-07-10/19]34pkt,2pt.(udp)
2020-07-20 06:26:51
138.99.216.92 attackspambots
SmallBizIT.US 4 packets to tcp(3380,3384,3386,3390)
2020-07-20 06:26:17
45.92.126.74 attackbotsspam
Multiport scan : 68 ports scanned 81 82 83 84 85 88 100 113 139 143 199 214 280 322 444 465 497 505 510 514 515 548 554 591 620 623 631 636 666 731 771 783 789 808 898 900 901 989 990 992 993 994 999 1000 1001 1010 1022 1024 1026 1042 1080 1194 1200 1214 1220 1234 1241 1302 9668 9864 9870 9876 9943 9944 9981 9997 9999 10000
2020-07-20 06:03:28
46.229.168.131 attackbotsspam
Malicious Traffic/Form Submission
2020-07-20 06:08:19
42.51.34.174 attack
baned by mod_evasive
2020-07-20 06:28:34
116.247.81.99 attack
$f2bV_matches
2020-07-20 05:55:09
212.70.149.67 attackspam
Jul 19 23:43:25 mellenthin postfix/smtps/smtpd[9330]: warning: unknown[212.70.149.67]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 19 23:45:16 mellenthin postfix/smtps/smtpd[9330]: warning: unknown[212.70.149.67]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-07-20 05:50:11
122.51.220.97 attackspambots
firewall-block, port(s): 445/tcp
2020-07-20 06:07:29
93.29.62.200 attack
23/tcp 37215/tcp...
[2020-05-28/07-19]12pkt,2pt.(tcp)
2020-07-20 05:55:32

最近上报的IP列表

100.7.104.208 110.228.192.44 49.82.119.202 196.68.231.105
75.216.233.126 74.196.221.242 200.94.17.162 137.217.86.77
182.187.66.63 52.140.34.134 83.82.250.253 119.164.54.88
35.243.191.147 171.242.146.196 62.164.9.81 27.78.123.11
62.235.91.226 119.90.108.53 32.3.103.137 203.252.251.242