必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Korea

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.64.120.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42054
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.64.120.164.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024122100 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 21 19:33:04 CST 2024
;; MSG SIZE  rcvd: 107
HOST信息:
Host 164.120.64.220.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.120.64.220.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.75.165.187 attackbotsspam
Sep 27 02:15:27 TORMINT sshd\[16380\]: Invalid user tomcat5 from 106.75.165.187
Sep 27 02:15:27 TORMINT sshd\[16380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.165.187
Sep 27 02:15:29 TORMINT sshd\[16380\]: Failed password for invalid user tomcat5 from 106.75.165.187 port 57422 ssh2
...
2019-09-27 14:25:16
198.108.66.200 attack
Port scan: Attack repeated for 24 hours
2019-09-27 14:41:44
121.12.151.250 attackbotsspam
Sep 27 07:08:38 www sshd\[5681\]: Invalid user qz from 121.12.151.250
Sep 27 07:08:38 www sshd\[5681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.12.151.250
Sep 27 07:08:40 www sshd\[5681\]: Failed password for invalid user qz from 121.12.151.250 port 37956 ssh2
...
2019-09-27 14:39:36
77.42.109.75 attackspambots
Automatic report - Port Scan Attack
2019-09-27 14:32:20
112.85.42.171 attackspambots
2019-09-27T05:27:19.525284abusebot-4.cloudsearch.cf sshd\[15504\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.171  user=root
2019-09-27 14:00:29
51.91.212.215 attackbotsspam
Sep 26 20:19:24 auw2 sshd\[6875\]: Invalid user long from 51.91.212.215
Sep 26 20:19:24 auw2 sshd\[6875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3156903.ip-51-91-212.eu
Sep 26 20:19:27 auw2 sshd\[6875\]: Failed password for invalid user long from 51.91.212.215 port 40870 ssh2
Sep 26 20:23:06 auw2 sshd\[7204\]: Invalid user replicador from 51.91.212.215
Sep 26 20:23:06 auw2 sshd\[7204\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3156903.ip-51-91-212.eu
2019-09-27 14:30:42
160.119.141.196 attack
Sep 27 05:54:01 lnxmail61 sshd[4786]: Failed password for root from 160.119.141.196 port 38722 ssh2
Sep 27 05:54:06 lnxmail61 sshd[4819]: Failed password for root from 160.119.141.196 port 44228 ssh2
2019-09-27 13:58:06
132.232.54.102 attackspambots
Sep 27 06:51:44 site3 sshd\[90218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.54.102  user=root
Sep 27 06:51:46 site3 sshd\[90218\]: Failed password for root from 132.232.54.102 port 39196 ssh2
Sep 27 06:56:32 site3 sshd\[90342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.54.102  user=root
Sep 27 06:56:35 site3 sshd\[90342\]: Failed password for root from 132.232.54.102 port 54194 ssh2
Sep 27 07:01:14 site3 sshd\[90501\]: Invalid user denied from 132.232.54.102
...
2019-09-27 14:30:56
51.254.134.18 attackbots
Sep 27 07:09:12 taivassalofi sshd[192053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.134.18
Sep 27 07:09:14 taivassalofi sshd[192053]: Failed password for invalid user gmodserver2 from 51.254.134.18 port 57002 ssh2
...
2019-09-27 14:23:25
123.108.200.150 attackspam
2019-09-27T06:04:16.776841hub.schaetter.us sshd\[29792\]: Invalid user qomo from 123.108.200.150 port 36210
2019-09-27T06:04:16.788915hub.schaetter.us sshd\[29792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.108.200.150
2019-09-27T06:04:18.552135hub.schaetter.us sshd\[29792\]: Failed password for invalid user qomo from 123.108.200.150 port 36210 ssh2
2019-09-27T06:08:52.505370hub.schaetter.us sshd\[29832\]: Invalid user aeneas from 123.108.200.150 port 48532
2019-09-27T06:08:52.525154hub.schaetter.us sshd\[29832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.108.200.150
...
2019-09-27 14:08:59
222.186.31.136 attack
2019-09-27T06:40:20.240602abusebot-7.cloudsearch.cf sshd\[24949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.136  user=root
2019-09-27 14:40:32
14.162.188.214 attackspambots
Chat Spam
2019-09-27 14:41:09
59.25.197.158 attackbotsspam
Invalid user dev from 59.25.197.158 port 48230
2019-09-27 14:17:12
47.40.20.138 attackspam
Sep 26 19:48:02 friendsofhawaii sshd\[21912\]: Invalid user manager from 47.40.20.138
Sep 26 19:48:02 friendsofhawaii sshd\[21912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47-40-20-138.dhcp.stls.mo.charter.com
Sep 26 19:48:05 friendsofhawaii sshd\[21912\]: Failed password for invalid user manager from 47.40.20.138 port 41626 ssh2
Sep 26 19:52:25 friendsofhawaii sshd\[22273\]: Invalid user db2inst1 from 47.40.20.138
Sep 26 19:52:25 friendsofhawaii sshd\[22273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47-40-20-138.dhcp.stls.mo.charter.com
2019-09-27 14:04:16
2.136.131.36 attackbotsspam
2019-09-27T06:00:25.729579abusebot-2.cloudsearch.cf sshd\[25119\]: Invalid user html from 2.136.131.36 port 43584
2019-09-27 14:09:13

最近上报的IP列表

47.161.114.243 20.114.85.191 101.168.241.138 162.68.176.148
147.214.29.47 244.208.225.101 73.215.174.110 238.38.7.35
240.61.184.27 4.4.244.78 30.165.199.215 179.41.50.240
28.175.52.116 139.218.74.141 172.199.212.8 208.188.195.91
25.68.60.139 103.156.5.232 189.145.216.135 231.27.3.173