必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 252.20.58.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53025
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;252.20.58.158.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 13:40:54 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 158.58.20.252.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 158.58.20.252.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
92.82.232.158 attack
port scan and connect, tcp 81 (hosts2-ns)
2020-05-21 01:45:14
185.143.221.46 attackspambots
2020-05-20T18:11:43.351872+02:00 lumpi kernel: [15280814.778203] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=185.143.221.46 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=23745 PROTO=TCP SPT=59710 DPT=2209 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2020-05-21 02:02:20
220.134.130.171 attackbots
Port probing on unauthorized port 8000
2020-05-21 01:47:50
193.169.110.23 attack
port scan and connect, tcp 23 (telnet)
2020-05-21 01:40:41
175.193.13.3 attackspambots
May 20 11:59:51 r.ca sshd[16264]: Failed password for invalid user whs from 175.193.13.3 port 42320 ssh2
2020-05-21 01:27:50
139.59.17.33 attackbotsspam
Invalid user teamspeak from 139.59.17.33 port 44146
2020-05-21 01:32:56
106.52.135.166 attack
" "
2020-05-21 01:24:34
163.179.126.39 attackbotsspam
May 20 16:53:01 onepixel sshd[520080]: Invalid user lmw from 163.179.126.39 port 28241
May 20 16:53:01 onepixel sshd[520080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.179.126.39 
May 20 16:53:01 onepixel sshd[520080]: Invalid user lmw from 163.179.126.39 port 28241
May 20 16:53:03 onepixel sshd[520080]: Failed password for invalid user lmw from 163.179.126.39 port 28241 ssh2
May 20 16:59:38 onepixel sshd[520925]: Invalid user xuj from 163.179.126.39 port 49782
2020-05-21 01:42:15
89.248.172.123 attack
05/20/2020-12:24:39.402451 89.248.172.123 Protocol: 17 ET DROP Dshield Block Listed Source group 1
2020-05-21 01:37:21
152.200.128.250 attackspam
Unauthorised access (May 20) SRC=152.200.128.250 LEN=52 TTL=110 ID=26281 DF TCP DPT=445 WINDOW=8192 SYN
2020-05-21 01:23:55
106.12.93.141 attackbotsspam
May 20 13:22:19 mail sshd\[15733\]: Invalid user ayt from 106.12.93.141
May 20 13:22:19 mail sshd\[15733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.93.141
...
2020-05-21 01:49:54
140.249.19.110 attack
2020-05-20T18:05:31.510681  sshd[20169]: Invalid user blackfire from 140.249.19.110 port 34388
2020-05-20T18:05:31.524903  sshd[20169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.19.110
2020-05-20T18:05:31.510681  sshd[20169]: Invalid user blackfire from 140.249.19.110 port 34388
2020-05-20T18:05:33.549054  sshd[20169]: Failed password for invalid user blackfire from 140.249.19.110 port 34388 ssh2
...
2020-05-21 01:28:13
54.72.170.109 attackbotsspam
[Wed May 20 17:01:50.967417 2020] [access_compat:error] [pid 22974] [client 54.72.170.109:36790] AH01797: client denied by server configuration: /var/www/html/josh/wp-login.php
...
2020-05-21 01:52:12
152.32.164.39 attackbots
2020-05-20T11:02:47.412808server.mjenks.net sshd[713547]: Invalid user hcz from 152.32.164.39 port 57018
2020-05-20T11:02:47.420072server.mjenks.net sshd[713547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.164.39
2020-05-20T11:02:47.412808server.mjenks.net sshd[713547]: Invalid user hcz from 152.32.164.39 port 57018
2020-05-20T11:02:49.258278server.mjenks.net sshd[713547]: Failed password for invalid user hcz from 152.32.164.39 port 57018 ssh2
2020-05-20T11:05:34.136015server.mjenks.net sshd[713844]: Invalid user hxd from 152.32.164.39 port 56996
...
2020-05-21 01:24:10
212.64.91.105 attackspam
May 20 17:50:41 vps sshd[23486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.91.105 
May 20 17:50:42 vps sshd[23486]: Failed password for invalid user lsc from 212.64.91.105 port 40066 ssh2
May 20 18:05:31 vps sshd[24553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.91.105 
...
2020-05-21 01:22:40

最近上报的IP列表

193.110.22.107 251.226.91.164 2.5.22.217 237.47.201.118
133.254.197.123 3.186.209.6 70.212.113.99 28.152.57.21
40.217.177.2 201.229.84.114 234.170.52.177 146.55.212.84
137.104.158.198 77.103.198.4 225.36.218.113 120.106.90.234
65.184.214.52 117.193.4.138 75.19.104.90 222.138.213.254