必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Multicast Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 230.149.227.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25563
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;230.149.227.239.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 04:24:25 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 239.227.149.230.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 239.227.149.230.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
50.60.29.239 attack
Nov 19 12:36:23 mxgate1 postfix/postscreen[3945]: CONNECT from [50.60.29.239]:38795 to [176.31.12.44]:25
Nov 19 12:36:23 mxgate1 postfix/dnsblog[3965]: addr 50.60.29.239 listed by domain cbl.abuseat.org as 127.0.0.2
Nov 19 12:36:23 mxgate1 postfix/dnsblog[3949]: addr 50.60.29.239 listed by domain zen.spamhaus.org as 127.0.0.3
Nov 19 12:36:23 mxgate1 postfix/dnsblog[3949]: addr 50.60.29.239 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 19 12:36:23 mxgate1 postfix/dnsblog[3946]: addr 50.60.29.239 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 19 12:36:29 mxgate1 postfix/postscreen[3945]: DNSBL rank 4 for [50.60.29.239]:38795
Nov x@x
Nov 19 12:36:31 mxgate1 postfix/postscreen[3945]: HANGUP after 1.8 from [50.60.29.239]:38795 in tests after SMTP handshake
Nov 19 12:36:31 mxgate1 postfix/postscreen[3945]: DISCONNECT [50.60.29.239]:38795


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=50.60.29.239
2019-11-21 17:29:56
45.82.153.34 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 35 - port: 9302 proto: TCP cat: Misc Attack
2019-11-21 17:49:53
94.191.86.249 attack
Nov 21 09:49:14 venus sshd\[16093\]: Invalid user \#\#\# from 94.191.86.249 port 35276
Nov 21 09:49:14 venus sshd\[16093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.86.249
Nov 21 09:49:17 venus sshd\[16093\]: Failed password for invalid user \#\#\# from 94.191.86.249 port 35276 ssh2
...
2019-11-21 18:02:24
211.21.191.39 attack
Fail2Ban Ban Triggered
2019-11-21 17:54:19
39.52.105.141 attackbotsspam
fail2ban honeypot
2019-11-21 18:01:32
61.0.254.9 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-11-21 17:28:25
51.75.23.62 attack
Nov 21 07:19:22 vps58358 sshd\[29250\]: Invalid user cobbe from 51.75.23.62Nov 21 07:19:24 vps58358 sshd\[29250\]: Failed password for invalid user cobbe from 51.75.23.62 port 59104 ssh2Nov 21 07:22:57 vps58358 sshd\[29264\]: Invalid user probench from 51.75.23.62Nov 21 07:23:00 vps58358 sshd\[29264\]: Failed password for invalid user probench from 51.75.23.62 port 39768 ssh2Nov 21 07:26:36 vps58358 sshd\[29290\]: Invalid user amol from 51.75.23.62Nov 21 07:26:39 vps58358 sshd\[29290\]: Failed password for invalid user amol from 51.75.23.62 port 48660 ssh2
...
2019-11-21 17:28:44
139.180.225.20 attackspam
Looking for resource vulnerabilities
2019-11-21 17:55:15
86.123.219.141 attackbots
Automatic report - Port Scan Attack
2019-11-21 17:48:09
186.7.16.17 attack
TCP Port Scanning
2019-11-21 17:48:39
141.237.73.155 attackspambots
Nov 19 12:38:45 mxgate1 postfix/postscreen[3945]: CONNECT from [141.237.73.155]:18527 to [176.31.12.44]:25
Nov 19 12:38:45 mxgate1 postfix/dnsblog[3946]: addr 141.237.73.155 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 19 12:38:45 mxgate1 postfix/dnsblog[3946]: addr 141.237.73.155 listed by domain zen.spamhaus.org as 127.0.0.11
Nov 19 12:38:45 mxgate1 postfix/dnsblog[3949]: addr 141.237.73.155 listed by domain cbl.abuseat.org as 127.0.0.2
Nov 19 12:38:45 mxgate1 postfix/dnsblog[3948]: addr 141.237.73.155 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 19 12:38:51 mxgate1 postfix/postscreen[3945]: DNSBL rank 4 for [141.237.73.155]:18527
Nov x@x
Nov 19 12:38:52 mxgate1 postfix/postscreen[3945]: HANGUP after 0.89 from [141.237.73.155]:18527 in tests after SMTP handshake
Nov 19 12:38:52 mxgate1 postfix/postscreen[3945]: DISCONNECT [141.237.73.155]:18527


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=141.237.73.155
2019-11-21 17:32:26
120.131.3.91 attackspambots
no
2019-11-21 17:55:30
212.216.210.213 attack
Lines containing failures of 212.216.210.213
Nov 19 12:47:14 server01 postfix/smtpd[24400]: connect from a-pt3-22.tin.hostname[212.216.210.213]
Nov x@x
Nov x@x
Nov 19 12:47:16 server01 postfix/policy-spf[24404]: : Policy action=550 Please see hxxp://www.openspf.org/Why?s=mfrom;id=bb7328fef%40orisline.es;ip=212.216.210.213;r=server01.2800km.de
Nov x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=212.216.210.213
2019-11-21 18:01:58
174.129.49.4 attackspambots
Honeypot attack, port: 445, PTR: ec2-174-129-49-4.compute-1.amazonaws.com.
2019-11-21 17:31:47
161.142.221.39 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/161.142.221.39/ 
 
 MY - 1H : (12)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : MY 
 NAME ASN : ASN9930 
 
 IP : 161.142.221.39 
 
 CIDR : 161.142.192.0/19 
 
 PREFIX COUNT : 256 
 
 UNIQUE IP COUNT : 807680 
 
 
 ATTACKS DETECTED ASN9930 :  
  1H - 2 
  3H - 2 
  6H - 2 
 12H - 2 
 24H - 4 
 
 DateTime : 2019-11-21 07:26:12 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-11-21 17:51:11

最近上报的IP列表

242.236.254.185 169.64.7.109 49.246.137.216 48.204.204.97
196.133.59.219 223.87.57.98 83.49.221.218 97.191.47.95
23.241.101.73 4.236.164.60 187.190.135.28 35.59.206.213
99.15.49.18 123.50.98.112 253.135.207.116 70.113.185.52
184.89.6.9 229.32.91.18 253.9.182.205 209.94.135.15