必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.224.81.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51753
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;245.224.81.207.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 22:44:04 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 207.81.224.245.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 207.81.224.245.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
177.33.139.26 attackspam
¯\_(ツ)_/¯
2019-06-22 04:36:09
185.255.47.201 attackbotsspam
Request: "GET / HTTP/1.1"
2019-06-22 04:49:30
192.144.221.221 attackbotsspam
Jun 22 04:46:29 martinbaileyphotography sshd\[10373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.221.221  user=root
Jun 22 04:46:31 martinbaileyphotography sshd\[10373\]: Failed password for root from 192.144.221.221 port 59086 ssh2
Jun 22 04:46:33 martinbaileyphotography sshd\[10431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.221.221  user=root
Jun 22 04:46:35 martinbaileyphotography sshd\[10431\]: Failed password for root from 192.144.221.221 port 59290 ssh2
Jun 22 04:46:36 martinbaileyphotography sshd\[10492\]: Invalid user pi from 192.144.221.221 port 59504
...
2019-06-22 04:35:07
222.160.218.129 attackbots
5500/tcp
[2019-06-21]1pkt
2019-06-22 04:56:05
125.137.120.54 attackbots
port scan and connect, tcp 23 (telnet)
2019-06-22 05:10:03
132.145.240.3 attackspambots
9999/tcp
[2019-06-21]1pkt
2019-06-22 05:05:35
45.55.170.158 attackbots
Request: "GET / HTTP/1.1"
2019-06-22 05:15:44
138.118.100.245 attackbots
Request: "GET / HTTP/1.1"
2019-06-22 04:39:44
103.41.146.207 attackspambots
Request: "GET / HTTP/1.1"
2019-06-22 04:46:04
185.161.115.146 attack
Request: "GET / HTTP/1.1"
2019-06-22 04:38:15
14.85.88.4 attackspam
Autoban   14.85.88.4 ABORTED AUTH
2019-06-22 05:07:46
178.54.140.129 attackspam
445/tcp
[2019-06-21]1pkt
2019-06-22 04:53:03
116.212.150.7 attack
Jun 17 07:23:16 mxgate1 postfix/postscreen[3992]: CONNECT from [116.212.150.7]:53257 to [176.31.12.44]:25
Jun 17 07:23:16 mxgate1 postfix/dnsblog[4314]: addr 116.212.150.7 listed by domain zen.spamhaus.org as 127.0.0.3
Jun 17 07:23:16 mxgate1 postfix/dnsblog[4314]: addr 116.212.150.7 listed by domain zen.spamhaus.org as 127.0.0.4
Jun 17 07:23:16 mxgate1 postfix/dnsblog[4347]: addr 116.212.150.7 listed by domain cbl.abuseat.org as 127.0.0.2
Jun 17 07:23:16 mxgate1 postfix/dnsblog[4315]: addr 116.212.150.7 listed by domain bl.spamcop.net as 127.0.0.2
Jun 17 07:23:16 mxgate1 postfix/dnsblog[4348]: addr 116.212.150.7 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jun 17 07:23:16 mxgate1 postfix/dnsblog[4316]: addr 116.212.150.7 listed by domain b.barracudacentral.org as 127.0.0.2
Jun 17 07:23:16 mxgate1 postfix/postscreen[3992]: PREGREET 22 after 0.52 from [116.212.150.7]:53257: EHLO 1122gilford.com

Jun 17 07:23:16 mxgate1 postfix/postscreen[3992]: DNSBL rank 6 for [116........
-------------------------------
2019-06-22 04:36:27
17.133.234.33 attack
¯\_(ツ)_/¯
2019-06-22 04:43:59
201.1.116.246 attackspambots
Request: "GET / HTTP/1.1"
2019-06-22 04:52:32

最近上报的IP列表

16.186.137.114 141.167.252.139 101.247.78.85 99.161.209.157
215.136.81.158 150.139.56.185 73.42.42.125 18.210.101.170
5.19.56.67 19.62.88.232 151.221.20.84 211.229.115.155
202.111.210.4 246.218.67.175 212.106.137.190 108.4.198.8
23.151.90.151 191.143.65.24 100.59.193.66 110.4.114.233