必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): China Unicom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
类型 评论内容 时间
attack
Unauthorized connection attempt detected from IP address 220.200.156.119 to port 802 [T]
2020-01-10 08:12:30
相同子网IP讨论:
IP 类型 评论内容 时间
220.200.156.28 attack
Unauthorized connection attempt detected from IP address 220.200.156.28 to port 8081 [J]
2020-03-02 16:59:21
220.200.156.40 attack
Unauthorized connection attempt detected from IP address 220.200.156.40 to port 3129
2020-01-04 09:16:01
220.200.156.185 attack
Unauthorized connection attempt detected from IP address 220.200.156.185 to port 8081
2019-12-31 06:17:05
220.200.156.90 attackbotsspam
The IP has triggered Cloudflare WAF. CF-Ray: 543340137f62d34a | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: disqus.skk.moe | User-Agent: Mozilla/5.081397758 Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 06:14:40
220.200.156.167 attack
The IP has triggered Cloudflare WAF. CF-Ray: 541088bc6aeaeb00 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: api.skk.moe | User-Agent: Mozilla/5.0101097241 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.81 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 00:50:50
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.200.156.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45328
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;220.200.156.119.		IN	A

;; AUTHORITY SECTION:
.			399	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010901 1800 900 604800 86400

;; Query time: 106 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 10 08:12:27 CST 2020
;; MSG SIZE  rcvd: 119
HOST信息:
Host 119.156.200.220.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 119.156.200.220.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.138.74.217 attackspam
2020-07-06 22:47:35
80.187.111.72 attackbotsspam
Chat Spam
2020-07-06 22:57:34
209.141.35.68 attack
9200/tcp 7003/tcp 9001/tcp...
[2020-06-18/07-06]99pkt,29pt.(tcp)
2020-07-06 23:05:34
159.65.100.233 attack
scans 2 times in preceeding hours on the ports (in chronological order) 25722 10728
2020-07-06 23:13:29
88.214.26.53 attack
scans 3 times in preceeding hours on the ports (in chronological order) 33395 33394 33396
2020-07-06 23:20:55
120.78.93.10 attackbots
scans 7 times in preceeding hours on the ports (in chronological order) 6380 8088 7001 7002 7001 8080 7002
2020-07-06 23:17:10
114.156.3.171 attackspam
scans 20 times in preceeding hours on the ports (in chronological order) 49152 5555 37426 9000 9092 2379 9200 5000 1434 5432 10250 5916 5009 27017 9001 2222 3478 1935 37193 5540
2020-07-06 23:17:35
222.186.180.6 attackspam
Jul  6 16:37:21 ns381471 sshd[23424]: Failed password for root from 222.186.180.6 port 63484 ssh2
Jul  6 16:37:25 ns381471 sshd[23424]: Failed password for root from 222.186.180.6 port 63484 ssh2
2020-07-06 22:44:44
113.200.121.186 attackspambots
scans 2 times in preceeding hours on the ports (in chronological order) 2205 2205
2020-07-06 23:17:50
202.152.1.89 attackspam
 TCP (SYN) 202.152.1.89:41995 -> port 2541, len 44
2020-07-06 23:06:54
150.107.149.11 attack
firewall-block, port(s): 15463/tcp
2020-07-06 23:15:26
180.140.108.241 attackbots
Unauthorised access (Jul  6) SRC=180.140.108.241 LEN=40 TTL=50 ID=3878 TCP DPT=23 WINDOW=1060 SYN
2020-07-06 22:49:16
134.209.63.140 attack
 TCP (SYN) 134.209.63.140:53862 -> port 15728, len 44
2020-07-06 23:16:57
185.175.93.24 attackspam
 TCP (SYN) 185.175.93.24:46057 -> port 5928, len 44
2020-07-06 22:56:15
193.32.161.147 attackbotsspam
07/06/2020-10:17:25.020255 193.32.161.147 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-07-06 22:43:28

最近上报的IP列表

125.24.111.62 124.235.138.225 124.235.138.58 105.112.107.135
124.225.45.169 123.191.150.220 96.172.220.115 123.145.38.177
121.57.225.64 117.109.177.196 121.57.10.15 69.191.53.83
120.76.123.100 119.39.46.250 152.68.255.156 117.14.149.159
212.49.73.184 114.187.116.152 113.240.253.218 113.200.71.105