必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.69.164.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17943
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;221.69.164.107.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 05:58:33 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
107.164.69.221.in-addr.arpa domain name pointer softbank221069164107.bbtec.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
107.164.69.221.in-addr.arpa	name = softbank221069164107.bbtec.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
93.89.225.181 attackspam
Trolling for resource vulnerabilities
2020-07-30 19:56:50
88.68.171.72 attack
Jul 30 14:06:12 xeon sshd[10928]: Failed password for invalid user zihang from 88.68.171.72 port 60986 ssh2
2020-07-30 20:14:50
89.165.171.88 attackspambots
1596110997 - 07/30/2020 14:09:57 Host: 89.165.171.88/89.165.171.88 Port: 445 TCP Blocked
2020-07-30 20:22:27
34.87.73.45 attack
(sshd) Failed SSH login from 34.87.73.45 (SG/Singapore/45.73.87.34.bc.googleusercontent.com): 5 in the last 3600 secs
2020-07-30 20:06:51
218.92.0.249 attackbotsspam
2020-07-30T14:18:26.164557vps773228.ovh.net sshd[13663]: Failed password for root from 218.92.0.249 port 49663 ssh2
2020-07-30T14:18:30.220954vps773228.ovh.net sshd[13663]: Failed password for root from 218.92.0.249 port 49663 ssh2
2020-07-30T14:18:35.602205vps773228.ovh.net sshd[13663]: Failed password for root from 218.92.0.249 port 49663 ssh2
2020-07-30T14:18:38.994346vps773228.ovh.net sshd[13663]: Failed password for root from 218.92.0.249 port 49663 ssh2
2020-07-30T14:18:42.309177vps773228.ovh.net sshd[13663]: Failed password for root from 218.92.0.249 port 49663 ssh2
...
2020-07-30 20:23:29
45.172.99.239 attack
Distributed brute force attack
2020-07-30 20:00:56
222.186.3.249 attack
Jul 30 13:16:15 minden010 sshd[9777]: Failed password for root from 222.186.3.249 port 61649 ssh2
Jul 30 13:16:17 minden010 sshd[9777]: Failed password for root from 222.186.3.249 port 61649 ssh2
Jul 30 13:16:19 minden010 sshd[9777]: Failed password for root from 222.186.3.249 port 61649 ssh2
...
2020-07-30 19:51:05
212.64.91.105 attack
Jul 30 05:25:37 *hidden* sshd[45714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.91.105 Jul 30 05:25:40 *hidden* sshd[45714]: Failed password for invalid user hxy from 212.64.91.105 port 38624 ssh2 Jul 30 05:47:13 *hidden* sshd[46221]: Invalid user ctso from 212.64.91.105 port 33952
2020-07-30 20:04:18
51.144.73.114 attack
51.144.73.114 - - [30/Jul/2020:10:09:55 +0200] "GET /wp-login.php HTTP/1.1" 200 5738 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.144.73.114 - - [30/Jul/2020:10:09:56 +0200] "POST /wp-login.php HTTP/1.1" 200 5989 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.144.73.114 - - [30/Jul/2020:10:09:57 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-30 20:03:54
197.60.80.68 attackspam
Jul 27 16:31:12 h2034429 sshd[6326]: Invalid user lijie from 197.60.80.68
Jul 27 16:31:12 h2034429 sshd[6326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.60.80.68
Jul 27 16:31:14 h2034429 sshd[6326]: Failed password for invalid user lijie from 197.60.80.68 port 44724 ssh2
Jul 27 16:31:14 h2034429 sshd[6326]: Received disconnect from 197.60.80.68 port 44724:11: Bye Bye [preauth]
Jul 27 16:31:14 h2034429 sshd[6326]: Disconnected from 197.60.80.68 port 44724 [preauth]
Jul 27 16:51:41 h2034429 sshd[6718]: Invalid user terrariaserver from 197.60.80.68
Jul 27 16:51:41 h2034429 sshd[6718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.60.80.68
Jul 27 16:51:44 h2034429 sshd[6718]: Failed password for invalid user terrariaserver from 197.60.80.68 port 43136 ssh2
Jul 27 16:51:44 h2034429 sshd[6718]: Received disconnect from 197.60.80.68 port 43136:11: Bye Bye [preauth]
Jul 27 16:51:44 h........
-------------------------------
2020-07-30 19:47:49
106.54.194.35 attack
Jul 30 08:10:00 lanister sshd[25297]: Invalid user oswbb from 106.54.194.35
Jul 30 08:10:00 lanister sshd[25297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.194.35
Jul 30 08:10:00 lanister sshd[25297]: Invalid user oswbb from 106.54.194.35
Jul 30 08:10:02 lanister sshd[25297]: Failed password for invalid user oswbb from 106.54.194.35 port 46088 ssh2
2020-07-30 20:13:49
178.128.183.90 attackspam
Invalid user student4 from 178.128.183.90 port 45122
2020-07-30 20:04:42
222.186.180.41 attack
Jul 30 14:23:58 vps647732 sshd[6284]: Failed password for root from 222.186.180.41 port 45870 ssh2
Jul 30 14:24:12 vps647732 sshd[6284]: error: maximum authentication attempts exceeded for root from 222.186.180.41 port 45870 ssh2 [preauth]
...
2020-07-30 20:25:27
218.92.0.211 attack
Jul 30 14:01:25 mx sshd[178396]: Failed password for root from 218.92.0.211 port 10225 ssh2
Jul 30 14:02:52 mx sshd[178398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.211  user=root
Jul 30 14:02:54 mx sshd[178398]: Failed password for root from 218.92.0.211 port 37851 ssh2
Jul 30 14:04:19 mx sshd[178402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.211  user=root
Jul 30 14:04:21 mx sshd[178402]: Failed password for root from 218.92.0.211 port 49223 ssh2
...
2020-07-30 20:07:40
93.39.104.224 attack
Jul 30 12:45:08 ns3164893 sshd[2047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.39.104.224
Jul 30 12:45:10 ns3164893 sshd[2047]: Failed password for invalid user centos from 93.39.104.224 port 45018 ssh2
...
2020-07-30 19:47:24

最近上报的IP列表

91.156.73.36 74.169.183.224 72.237.225.73 145.151.172.232
106.95.36.38 196.116.195.218 228.185.172.3 52.174.143.81
249.47.175.210 223.242.78.97 229.41.30.24 125.250.146.59
225.135.182.89 53.208.225.126 215.65.227.28 82.210.170.224
73.174.15.255 132.183.145.156 101.85.222.59 232.66.37.184