必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): SoftBank

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.0.21.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24720
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.0.21.44.			IN	A

;; AUTHORITY SECTION:
.			370	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024100100 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 02 04:25:10 CST 2024
;; MSG SIZE  rcvd: 104
HOST信息:
44.21.0.220.in-addr.arpa domain name pointer softbank220000021044.bbtec.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
44.21.0.220.in-addr.arpa	name = softbank220000021044.bbtec.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.169.192 attackbotsspam
Nov  1 13:03:05 firewall sshd[2890]: Failed password for root from 222.186.169.192 port 38950 ssh2
Nov  1 13:03:19 firewall sshd[2890]: error: maximum authentication attempts exceeded for root from 222.186.169.192 port 38950 ssh2 [preauth]
Nov  1 13:03:19 firewall sshd[2890]: Disconnecting: Too many authentication failures [preauth]
...
2019-11-02 00:13:43
136.228.161.66 attack
Invalid user Samsung1 from 136.228.161.66 port 51040
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.228.161.66
Failed password for invalid user Samsung1 from 136.228.161.66 port 51040 ssh2
Invalid user abc123 from 136.228.161.66 port 59956
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.228.161.66
2019-11-02 00:35:52
167.71.245.84 attack
Digital Ocean BotNet attack - 10s of requests to none existent pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks
node-superagent/4.1.0
2019-11-02 00:38:50
222.186.175.217 attackbots
$f2bV_matches
2019-11-02 00:21:18
190.160.110.104 attackspam
Automatic report - Port Scan Attack
2019-11-02 00:43:51
104.131.217.36 attackspam
Digital Ocean BotNet attack - 10s of requests to none existent pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks
node-superagent/4.1.0
2019-11-02 00:14:05
157.230.240.34 attack
Nov  1 16:45:23 gw1 sshd[20902]: Failed password for root from 157.230.240.34 port 46192 ssh2
Nov  1 16:49:39 gw1 sshd[20992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.240.34
...
2019-11-02 00:09:36
45.136.108.68 attackbotsspam
Connection by 45.136.108.68 on port: 4348 got caught by honeypot at 11/1/2019 1:23:46 PM
2019-11-02 00:37:29
218.58.80.86 attackbots
Nov  1 05:24:00 php1 sshd\[2210\]: Invalid user VFREDCxswqaz from 218.58.80.86
Nov  1 05:24:00 php1 sshd\[2210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.58.80.86
Nov  1 05:24:03 php1 sshd\[2210\]: Failed password for invalid user VFREDCxswqaz from 218.58.80.86 port 45837 ssh2
Nov  1 05:29:27 php1 sshd\[2835\]: Invalid user traktor from 218.58.80.86
Nov  1 05:29:27 php1 sshd\[2835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.58.80.86
2019-11-02 00:33:55
112.230.136.225 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/112.230.136.225/ 
 
 CN - 1H : (664)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4837 
 
 IP : 112.230.136.225 
 
 CIDR : 112.224.0.0/11 
 
 PREFIX COUNT : 1262 
 
 UNIQUE IP COUNT : 56665856 
 
 
 ATTACKS DETECTED ASN4837 :  
  1H - 9 
  3H - 34 
  6H - 65 
 12H - 122 
 24H - 253 
 
 DateTime : 2019-11-01 12:49:34 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-02 00:10:57
129.28.128.149 attack
Nov  1 12:49:17 MK-Soft-VM6 sshd[31498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.128.149 
Nov  1 12:49:19 MK-Soft-VM6 sshd[31498]: Failed password for invalid user tads from 129.28.128.149 port 39384 ssh2
...
2019-11-02 00:18:57
138.94.160.57 attackspam
2019-11-01T11:48:43.505021homeassistant sshd[5414]: Invalid user dg from 138.94.160.57 port 45338
2019-11-01T11:48:43.513747homeassistant sshd[5414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.94.160.57
2019-11-01T11:48:45.694289homeassistant sshd[5414]: Failed password for invalid user dg from 138.94.160.57 port 45338 ssh2
...
2019-11-02 00:40:37
198.50.201.31 attackspam
Postfix SMTP rejection
...
2019-11-02 00:29:56
104.131.222.35 attackbotsspam
Digital Ocean BotNet attack - 10s of requests to none existent pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks
node-superagent/4.1.0
2019-11-02 00:55:14
2.50.142.99 attack
Nov  1 12:48:18 cavern sshd[14325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.50.142.99
2019-11-02 00:55:35

最近上报的IP列表

170.74.254.34 121.191.50.50 167.212.84.127 242.108.75.31
168.8.74.40 242.171.116.104 28.231.233.141 234.66.123.102
6.102.179.64 173.252.107.114 135.127.59.41 75.95.240.13
34.166.0.15 173.153.160.118 149.46.167.247 24.243.3.207
218.220.185.35 193.12.21.91 251.73.11.119 150.50.195.142