必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.48.16.231
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56892
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.48.16.231.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022702 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 04:08:13 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
231.16.48.220.in-addr.arpa domain name pointer softbank220048016231.bbtec.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
231.16.48.220.in-addr.arpa	name = softbank220048016231.bbtec.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
162.247.72.199 attackbots
(sshd) Failed SSH login from 162.247.72.199 (US/United States/jaffer.tor-exit.calyxinstitute.org): 10 in the last 3600 secs
2020-08-28 21:30:57
157.230.230.152 attackspam
(sshd) Failed SSH login from 157.230.230.152 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug 28 14:51:24 srv sshd[2742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.230.152  user=root
Aug 28 14:51:26 srv sshd[2742]: Failed password for root from 157.230.230.152 port 49722 ssh2
Aug 28 15:05:11 srv sshd[3014]: Invalid user fang from 157.230.230.152 port 55486
Aug 28 15:05:13 srv sshd[3014]: Failed password for invalid user fang from 157.230.230.152 port 55486 ssh2
Aug 28 15:08:29 srv sshd[3071]: Invalid user xo from 157.230.230.152 port 33460
2020-08-28 21:42:44
222.186.175.182 attackspam
Aug 28 15:48:38 santamaria sshd\[14784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Aug 28 15:48:39 santamaria sshd\[14784\]: Failed password for root from 222.186.175.182 port 59346 ssh2
Aug 28 15:48:58 santamaria sshd\[14786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
...
2020-08-28 21:50:57
171.244.139.236 attackbots
Aug 28 14:08:22 mellenthin sshd[4865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.139.236  user=root
Aug 28 14:08:24 mellenthin sshd[4865]: Failed password for invalid user root from 171.244.139.236 port 19148 ssh2
2020-08-28 21:54:02
222.186.15.115 attackbotsspam
Aug 28 16:06:00 abendstille sshd\[15252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115  user=root
Aug 28 16:06:02 abendstille sshd\[15252\]: Failed password for root from 222.186.15.115 port 55659 ssh2
Aug 28 16:06:04 abendstille sshd\[15252\]: Failed password for root from 222.186.15.115 port 55659 ssh2
Aug 28 16:06:07 abendstille sshd\[15252\]: Failed password for root from 222.186.15.115 port 55659 ssh2
Aug 28 16:06:09 abendstille sshd\[15353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115  user=root
...
2020-08-28 22:09:13
20.44.232.74 attack
Hacked computer
2020-08-28 21:51:24
90.188.248.246 attackspam
failed_logins
2020-08-28 21:41:33
142.93.246.42 attackspambots
(sshd) Failed SSH login from 142.93.246.42 (US/United States/-): 5 in the last 3600 secs
2020-08-28 21:43:03
218.92.0.165 attackspambots
Aug 28 16:04:50 vps639187 sshd\[8745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.165  user=root
Aug 28 16:04:52 vps639187 sshd\[8745\]: Failed password for root from 218.92.0.165 port 27034 ssh2
Aug 28 16:04:56 vps639187 sshd\[8745\]: Failed password for root from 218.92.0.165 port 27034 ssh2
...
2020-08-28 22:09:46
129.204.238.250 attack
Aug 28 15:28:02 eventyay sshd[3887]: Failed password for root from 129.204.238.250 port 51174 ssh2
Aug 28 15:33:31 eventyay sshd[4029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.238.250
Aug 28 15:33:33 eventyay sshd[4029]: Failed password for invalid user templates from 129.204.238.250 port 57566 ssh2
...
2020-08-28 21:47:00
122.166.192.26 attack
Failed password for root from 122.166.192.26 port 49274 ssh2
Invalid user vin from 122.166.192.26 port 50500
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.166.192.26
Invalid user vin from 122.166.192.26 port 50500
Failed password for invalid user vin from 122.166.192.26 port 50500 ssh2
2020-08-28 21:56:17
103.65.194.34 attackbotsspam
Port Scan detected!
...
2020-08-28 21:50:09
218.92.0.171 attack
Aug 28 15:32:07 marvibiene sshd[24332]: Failed password for root from 218.92.0.171 port 17361 ssh2
Aug 28 15:32:12 marvibiene sshd[24332]: Failed password for root from 218.92.0.171 port 17361 ssh2
2020-08-28 22:05:00
151.236.62.211 attack
Aug 28 14:08:31 rancher-0 sshd[1318895]: Invalid user techno from 151.236.62.211 port 46114
...
2020-08-28 21:46:27
122.51.166.84 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-28 21:47:15

最近上报的IP列表

194.233.29.219 45.63.118.187 179.223.229.72 66.172.240.94
177.219.46.14 115.63.253.145 21.98.4.90 180.13.19.162
98.175.106.74 15.208.0.212 235.158.250.76 162.55.218.6
16.162.91.62 190.131.197.245 156.36.237.199 174.21.248.13
116.161.150.232 119.95.77.122 244.125.165.6 150.252.164.155