必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Taiwan (Province of China)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 27.52.150.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49042
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;27.52.150.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 09:17:58 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
21.150.52.27.in-addr.arpa domain name pointer 27-52-150-21.adsl.fetnet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.150.52.27.in-addr.arpa	name = 27-52-150-21.adsl.fetnet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
110.81.102.116 attack
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: 116.102.81.110.broad.qz.fj.dynamic.163data.com.cn.
2020-09-05 17:52:47
200.6.203.85 attackbotsspam
Postfix attempt blocked due to public blacklist entry
2020-09-05 18:07:32
77.104.74.101 attackspam
Unauthorized connection attempt from IP address 77.104.74.101 on Port 445(SMB)
2020-09-05 18:32:14
188.219.117.26 attackspambots
Invalid user tt from 188.219.117.26 port 57865
2020-09-05 18:28:29
49.205.243.128 attackbots
1599238002 - 09/04/2020 18:46:42 Host: 49.205.243.128/49.205.243.128 Port: 445 TCP Blocked
2020-09-05 18:01:46
195.144.21.219 attackspam
Sep  5 07:56:34 mail sshd[9441]: Failed password for root from 195.144.21.219 port 38644 ssh2
Sep  5 07:56:36 mail sshd[9441]: Failed password for root from 195.144.21.219 port 38644 ssh2
...
2020-09-05 18:26:07
158.140.178.7 attackspambots
Unauthorized connection attempt from IP address 158.140.178.7 on Port 445(SMB)
2020-09-05 18:20:14
91.72.171.138 attackbots
Sep  5 17:08:29 webhost01 sshd[21387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.72.171.138
Sep  5 17:08:30 webhost01 sshd[21387]: Failed password for invalid user 2 from 91.72.171.138 port 56236 ssh2
...
2020-09-05 18:14:10
89.245.109.197 attackspambots
Sep  4 18:46:28 mellenthin postfix/smtpd[30890]: NOQUEUE: reject: RCPT from i59F56DC5.versanet.de[89.245.109.197]: 554 5.7.1 Service unavailable; Client host [89.245.109.197] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/89.245.109.197; from= to= proto=ESMTP helo=
2020-09-05 18:14:34
49.232.191.67 attackspambots
SSH auth scanning - multiple failed logins
2020-09-05 17:56:45
42.111.14.177 attackbots
Unauthorized connection attempt from IP address 42.111.14.177 on Port 445(SMB)
2020-09-05 18:17:55
138.118.100.145 attackbots
Automatic report - Port Scan Attack
2020-09-05 18:04:24
14.207.82.167 attackbots
Attempted connection to port 445.
2020-09-05 18:39:10
132.255.94.2 attackbots
Dovecot Invalid User Login Attempt.
2020-09-05 18:13:38
45.4.52.112 attackbots
Sep  4 18:46:26 mellenthin postfix/smtpd[28829]: NOQUEUE: reject: RCPT from unknown[45.4.52.112]: 554 5.7.1 Service unavailable; Client host [45.4.52.112] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/45.4.52.112; from= to= proto=ESMTP helo=<[45.4.52.112]>
2020-09-05 18:17:18

最近上报的IP列表

229.4.147.238 251.61.33.108 206.13.252.73 193.143.156.114
164.188.85.203 128.149.86.179 188.19.40.147 165.19.102.20
74.25.160.254 45.142.203.59 189.31.56.235 139.52.208.164
166.209.30.106 153.120.203.61 75.2.80.112 154.246.61.79
58.133.230.68 53.99.216.81 66.192.71.123 114.128.66.214