必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2a09:bac6:d81f:16c8::245:94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 24207
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2a09:bac6:d81f:16c8::245:94.	IN	A

;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sun Dec 14 22:58:54 CST 2025
;; MSG SIZE  rcvd: 56

'
HOST信息:
Host 4.9.0.0.5.4.2.0.0.0.0.0.0.0.0.0.8.c.6.1.f.1.8.d.6.c.a.b.9.0.a.2.ip6.arpa not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 4.9.0.0.5.4.2.0.0.0.0.0.0.0.0.0.8.c.6.1.f.1.8.d.6.c.a.b.9.0.a.2.ip6.arpa: NXDOMAIN
最新评论:
IP 类型 评论内容 时间
98.128.144.159 attack
Mar 25 20:49:45 emirates sshd[56806]: refused connect from 98.128.144.159 (98.128.144.159)
Mar 25 22:23:27 emirates sshd[63670]: refused connect from 98.128.144.159 (98.128.144.159)
Mar 25 22:25:09 emirates sshd[63779]: refused connect from 98.128.144.159 (98.128.144.159)
Mar 25 22:26:48 emirates sshd[63865]: refused connect from 98.128.144.159 (98.128.144.159)
Mar 25 22:28:28 emirates sshd[63971]: refused connect from 98.128.144.159 (98.128.144.159)
Mar 25 22:30:08 emirates sshd[64091]: refused connect from 98.128.144.159 (98.128.144.159)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=98.128.144.159
2020-03-26 08:41:33
115.99.59.92 attackbots
DATE:2020-03-25 22:41:56, IP:115.99.59.92, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2020-03-26 08:16:39
116.196.93.133 attackbotsspam
Mar 26 00:19:07 santamaria sshd\[26135\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.93.133  user=gnats
Mar 26 00:19:10 santamaria sshd\[26135\]: Failed password for gnats from 116.196.93.133 port 43966 ssh2
Mar 26 00:22:32 santamaria sshd\[26207\]: Invalid user lo from 116.196.93.133
Mar 26 00:22:32 santamaria sshd\[26207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.93.133
...
2020-03-26 08:48:44
182.61.132.15 attack
B: Abusive ssh attack
2020-03-26 08:50:29
222.186.15.18 attack
Mar 26 00:10:45 localhost sshd[22684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.18  user=root
Mar 26 00:10:47 localhost sshd[22684]: Failed password for root from 222.186.15.18 port 42812 ssh2
Mar 26 00:10:50 localhost sshd[22684]: Failed password for root from 222.186.15.18 port 42812 ssh2
Mar 26 00:10:45 localhost sshd[22684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.18  user=root
Mar 26 00:10:47 localhost sshd[22684]: Failed password for root from 222.186.15.18 port 42812 ssh2
Mar 26 00:10:50 localhost sshd[22684]: Failed password for root from 222.186.15.18 port 42812 ssh2
Mar 26 00:10:45 localhost sshd[22684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.18  user=root
Mar 26 00:10:47 localhost sshd[22684]: Failed password for root from 222.186.15.18 port 42812 ssh2
Mar 26 00:10:50 localhost sshd[22684]: Failed pas
...
2020-03-26 08:26:03
106.13.63.253 attackspambots
Mar 25 10:23:44 Tower sshd[30065]: refused connect from 190.145.254.138 (190.145.254.138)
Mar 25 17:41:22 Tower sshd[30065]: Connection from 106.13.63.253 port 48162 on 192.168.10.220 port 22 rdomain ""
Mar 25 17:41:24 Tower sshd[30065]: Invalid user futures from 106.13.63.253 port 48162
Mar 25 17:41:24 Tower sshd[30065]: error: Could not get shadow information for NOUSER
Mar 25 17:41:24 Tower sshd[30065]: Failed password for invalid user futures from 106.13.63.253 port 48162 ssh2
Mar 25 17:41:24 Tower sshd[30065]: Received disconnect from 106.13.63.253 port 48162:11: Bye Bye [preauth]
Mar 25 17:41:24 Tower sshd[30065]: Disconnected from invalid user futures 106.13.63.253 port 48162 [preauth]
2020-03-26 08:25:28
222.101.206.56 attackbots
2020-03-26T00:32:23.639491ns386461 sshd\[19280\]: Invalid user bill from 222.101.206.56 port 34228
2020-03-26T00:32:23.644022ns386461 sshd\[19280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.101.206.56
2020-03-26T00:32:26.438110ns386461 sshd\[19280\]: Failed password for invalid user bill from 222.101.206.56 port 34228 ssh2
2020-03-26T00:37:35.287877ns386461 sshd\[23986\]: Invalid user ut from 222.101.206.56 port 34094
2020-03-26T00:37:35.292718ns386461 sshd\[23986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.101.206.56
...
2020-03-26 08:10:51
162.243.170.149 attackspam
Scanned 1 times in the last 24 hours on port 22
2020-03-26 08:20:09
34.247.254.228 attack
Malicious brute force vulnerability hacking attacks
2020-03-26 08:35:32
64.225.99.7 attack
2020-03-26T01:00:53.854333librenms sshd[12310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.99.7
2020-03-26T01:00:53.848079librenms sshd[12310]: Invalid user xr from 64.225.99.7 port 48002
2020-03-26T01:00:56.065619librenms sshd[12310]: Failed password for invalid user xr from 64.225.99.7 port 48002 ssh2
...
2020-03-26 08:43:33
58.246.187.102 attackbotsspam
Invalid user 22 from 58.246.187.102 port 46912
2020-03-26 08:49:44
82.6.141.117 attackbots
2020-03-26T00:43:06.720531ns386461 sshd\[29195\]: Invalid user test from 82.6.141.117 port 54708
2020-03-26T00:43:06.725440ns386461 sshd\[29195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpc69062-oxfd26-2-0-cust372.4-3.cable.virginm.net
2020-03-26T00:43:09.122540ns386461 sshd\[29195\]: Failed password for invalid user test from 82.6.141.117 port 54708 ssh2
2020-03-26T00:49:15.001625ns386461 sshd\[2516\]: Invalid user as from 82.6.141.117 port 52160
2020-03-26T00:49:15.006539ns386461 sshd\[2516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpc69062-oxfd26-2-0-cust372.4-3.cable.virginm.net
...
2020-03-26 08:33:35
42.157.163.103 attackbots
2020-03-26T00:40:12.940327ns386461 sshd\[26497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.157.163.103  user=root
2020-03-26T00:40:15.783017ns386461 sshd\[26497\]: Failed password for root from 42.157.163.103 port 26892 ssh2
2020-03-26T00:40:17.702089ns386461 sshd\[26572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.157.163.103  user=root
2020-03-26T00:40:19.898644ns386461 sshd\[26572\]: Failed password for root from 42.157.163.103 port 59762 ssh2
2020-03-26T00:40:21.740920ns386461 sshd\[26618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.157.163.103  user=root
...
2020-03-26 08:36:25
194.152.12.121 attackspambots
Mar 26 01:15:35 mintao sshd\[19074\]: Invalid user pi from 194.152.12.121\
Mar 26 01:15:35 mintao sshd\[19076\]: Invalid user pi from 194.152.12.121\
2020-03-26 08:46:12
31.23.15.191 attackbotsspam
7,02-04/13 [bc01/m06] PostRequest-Spammer scoring: maputo01_x2b
2020-03-26 08:12:03

最近上报的IP列表

38.101.149.116 39.103.154.124 122.231.239.166 134.244.207.168
8.222.138.106 47.84.127.61 64.227.76.143 45.204.215.184
36.107.172.102 49.234.192.248 195.178.110.162 34.230.71.135
212.248.67.38 117.235.79.93 159.223.231.254 194.180.49.176
45.94.31.25 45.59.163.167 198.235.24.180 27.46.69.9