必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Hungary

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 217.20.131.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 892
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;217.20.131.8.			IN	A

;; AUTHORITY SECTION:
.			240	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021801 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 01:58:21 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
8.131.20.217.in-addr.arpa domain name pointer blog.hu.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
8.131.20.217.in-addr.arpa	name = blog.hu.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
109.194.174.78 attackbotsspam
Automatic report - Banned IP Access
2019-09-22 04:15:30
113.182.101.113 attack
Chat Spam
2019-09-22 04:30:31
107.170.18.163 attackspambots
2019-09-21T20:00:56.295916abusebot-2.cloudsearch.cf sshd\[27906\]: Invalid user nagios from 107.170.18.163 port 38821
2019-09-22 04:12:54
80.82.77.240 attack
Scanning random ports - tries to find possible vulnerable services
2019-09-22 04:30:44
200.236.16.35 attackspam
Sep 21 22:37:11 site3 sshd\[210139\]: Invalid user admin from 200.236.16.35
Sep 21 22:37:11 site3 sshd\[210139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.236.16.35
Sep 21 22:37:13 site3 sshd\[210139\]: Failed password for invalid user admin from 200.236.16.35 port 54046 ssh2
Sep 21 22:42:51 site3 sshd\[210231\]: Invalid user newuser from 200.236.16.35
Sep 21 22:42:51 site3 sshd\[210231\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.236.16.35
...
2019-09-22 04:43:52
31.182.57.162 attack
Sep 21 13:18:41 hcbbdb sshd\[1356\]: Invalid user meme from 31.182.57.162
Sep 21 13:18:41 hcbbdb sshd\[1356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=staticline-31-182-57-162.toya.net.pl
Sep 21 13:18:43 hcbbdb sshd\[1356\]: Failed password for invalid user meme from 31.182.57.162 port 65157 ssh2
Sep 21 13:22:53 hcbbdb sshd\[1889\]: Invalid user qwerty from 31.182.57.162
Sep 21 13:22:53 hcbbdb sshd\[1889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=staticline-31-182-57-162.toya.net.pl
2019-09-22 04:47:48
167.71.56.82 attackbots
Sep 21 19:27:29 anodpoucpklekan sshd[83911]: Invalid user admin from 167.71.56.82 port 40880
...
2019-09-22 04:46:47
178.150.216.229 attackspam
Sep 21 20:31:27 localhost sshd\[110945\]: Invalid user !QAZ2wsx3edc from 178.150.216.229 port 49566
Sep 21 20:31:27 localhost sshd\[110945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.150.216.229
Sep 21 20:31:29 localhost sshd\[110945\]: Failed password for invalid user !QAZ2wsx3edc from 178.150.216.229 port 49566 ssh2
Sep 21 20:36:15 localhost sshd\[111122\]: Invalid user donald from 178.150.216.229 port 34196
Sep 21 20:36:15 localhost sshd\[111122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.150.216.229
...
2019-09-22 04:37:29
122.14.199.232 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/122.14.199.232/ 
 CN - 1H : (99)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN133119 
 
 IP : 122.14.199.232 
 
 CIDR : 122.14.192.0/18 
 
 PREFIX COUNT : 45 
 
 UNIQUE IP COUNT : 235264 
 
 
 WYKRYTE ATAKI Z ASN133119 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery
2019-09-22 04:44:27
178.32.151.196 attackbots
Sep 21 21:25:17 SilenceServices sshd[12715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.151.196
Sep 21 21:25:19 SilenceServices sshd[12715]: Failed password for invalid user no from 178.32.151.196 port 43110 ssh2
Sep 21 21:29:03 SilenceServices sshd[13690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.151.196
2019-09-22 04:21:09
142.93.85.35 attackspambots
Sep 21 21:52:45 bouncer sshd\[881\]: Invalid user testxp from 142.93.85.35 port 47086
Sep 21 21:52:45 bouncer sshd\[881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.85.35 
Sep 21 21:52:47 bouncer sshd\[881\]: Failed password for invalid user testxp from 142.93.85.35 port 47086 ssh2
...
2019-09-22 04:26:59
162.243.94.34 attackspam
Sep 21 22:31:15 webhost01 sshd[19031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.94.34
Sep 21 22:31:16 webhost01 sshd[19031]: Failed password for invalid user tibero2 from 162.243.94.34 port 37090 ssh2
...
2019-09-22 04:33:19
86.124.95.214 attackbots
Automatic report - Port Scan Attack
2019-09-22 04:15:50
91.121.46.35 attackbots
SSH Bruteforce attempt
2019-09-22 04:09:05
38.98.183.75 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 21-09-2019 13:50:22.
2019-09-22 04:16:10

最近上报的IP列表

217.20.130.236 217.20.147.1 217.20.138.54 217.20.131.149
217.20.152.226 217.20.131.245 217.20.131.11 217.20.156.72
217.20.155.13 217.20.36.68 217.20.192.231 217.20.155.82
217.20.83.18 217.208.221.29 217.21.11.83 217.21.190.146
217.21.191.248 217.21.184.252 217.21.190.142 217.21.68.2