必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 30.206.52.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53625
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;30.206.52.212.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 13:12:20 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 212.52.206.30.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 212.52.206.30.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.199.100.51 attackbotsspam
Apr 14 19:00:01 vtv3 sshd\[8159\]: Invalid user vrouwerff from 139.199.100.51 port 53063
Apr 14 19:00:01 vtv3 sshd\[8159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.100.51
Apr 14 19:00:03 vtv3 sshd\[8159\]: Failed password for invalid user vrouwerff from 139.199.100.51 port 53063 ssh2
Apr 14 19:07:21 vtv3 sshd\[12162\]: Invalid user csserver from 139.199.100.51 port 39798
Apr 14 19:07:21 vtv3 sshd\[12162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.100.51
Apr 16 06:40:21 vtv3 sshd\[10489\]: Invalid user Access from 139.199.100.51 port 18148
Apr 16 06:40:21 vtv3 sshd\[10489\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.100.51
Apr 16 06:40:24 vtv3 sshd\[10489\]: Failed password for invalid user Access from 139.199.100.51 port 18148 ssh2
Apr 16 06:49:45 vtv3 sshd\[14565\]: Invalid user tac1 from 139.199.100.51 port 4829
Apr 16 06:49:45 vtv3 ssh
2019-09-08 05:21:41
193.77.216.143 attackbotsspam
Sep  7 23:03:20 OPSO sshd\[14980\]: Invalid user user from 193.77.216.143 port 34206
Sep  7 23:03:20 OPSO sshd\[14980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.77.216.143
Sep  7 23:03:23 OPSO sshd\[14980\]: Failed password for invalid user user from 193.77.216.143 port 34206 ssh2
Sep  7 23:12:14 OPSO sshd\[16888\]: Invalid user 12345 from 193.77.216.143 port 50824
Sep  7 23:12:14 OPSO sshd\[16888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.77.216.143
2019-09-08 05:12:57
202.75.62.141 attack
Sep  7 17:56:21 OPSO sshd\[25645\]: Invalid user 1234 from 202.75.62.141 port 47688
Sep  7 17:56:21 OPSO sshd\[25645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.75.62.141
Sep  7 17:56:23 OPSO sshd\[25645\]: Failed password for invalid user 1234 from 202.75.62.141 port 47688 ssh2
Sep  7 18:01:28 OPSO sshd\[26640\]: Invalid user 123456 from 202.75.62.141 port 33766
Sep  7 18:01:28 OPSO sshd\[26640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.75.62.141
2019-09-08 05:02:51
139.59.77.237 attack
F2B jail: sshd. Time: 2019-09-07 13:57:17, Reported by: VKReport
2019-09-08 04:51:04
132.232.112.25 attack
Sep  7 11:46:47 xtremcommunity sshd\[40057\]: Invalid user gitblit from 132.232.112.25 port 48478
Sep  7 11:46:47 xtremcommunity sshd\[40057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.112.25
Sep  7 11:46:49 xtremcommunity sshd\[40057\]: Failed password for invalid user gitblit from 132.232.112.25 port 48478 ssh2
Sep  7 11:53:31 xtremcommunity sshd\[40300\]: Invalid user webuser from 132.232.112.25 port 35116
Sep  7 11:53:31 xtremcommunity sshd\[40300\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.112.25
...
2019-09-08 05:22:13
223.220.159.78 attackbotsspam
Sep  7 11:16:04 php1 sshd\[20009\]: Invalid user hadoop from 223.220.159.78
Sep  7 11:16:04 php1 sshd\[20009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.220.159.78
Sep  7 11:16:06 php1 sshd\[20009\]: Failed password for invalid user hadoop from 223.220.159.78 port 64082 ssh2
Sep  7 11:20:31 php1 sshd\[20384\]: Invalid user steam from 223.220.159.78
Sep  7 11:20:31 php1 sshd\[20384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.220.159.78
2019-09-08 05:26:59
54.222.219.87 attack
Sep  7 13:03:15 legacy sshd[22870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.222.219.87
Sep  7 13:03:16 legacy sshd[22870]: Failed password for invalid user vandam2432462 from 54.222.219.87 port 37704 ssh2
Sep  7 13:05:18 legacy sshd[22907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.222.219.87
...
2019-09-08 05:01:18
217.182.158.104 attackspambots
Sep  7 23:46:11 pkdns2 sshd\[61977\]: Invalid user 1q2w3e from 217.182.158.104Sep  7 23:46:13 pkdns2 sshd\[61977\]: Failed password for invalid user 1q2w3e from 217.182.158.104 port 13278 ssh2Sep  7 23:50:14 pkdns2 sshd\[62175\]: Invalid user 123456 from 217.182.158.104Sep  7 23:50:16 pkdns2 sshd\[62175\]: Failed password for invalid user 123456 from 217.182.158.104 port 40783 ssh2Sep  7 23:54:21 pkdns2 sshd\[62315\]: Invalid user steam123 from 217.182.158.104Sep  7 23:54:24 pkdns2 sshd\[62315\]: Failed password for invalid user steam123 from 217.182.158.104 port 13043 ssh2
...
2019-09-08 05:17:42
62.234.8.41 attackspambots
Sep  7 17:56:29 SilenceServices sshd[7146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.8.41
Sep  7 17:56:31 SilenceServices sshd[7146]: Failed password for invalid user testftp from 62.234.8.41 port 39022 ssh2
Sep  7 18:00:18 SilenceServices sshd[8624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.8.41
2019-09-08 05:24:13
191.100.26.142 attackbots
Sep  7 06:36:17 eddieflores sshd\[25293\]: Invalid user oracle from 191.100.26.142
Sep  7 06:36:17 eddieflores sshd\[25293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.100.26.142
Sep  7 06:36:19 eddieflores sshd\[25293\]: Failed password for invalid user oracle from 191.100.26.142 port 57423 ssh2
Sep  7 06:44:16 eddieflores sshd\[26038\]: Invalid user radio from 191.100.26.142
Sep  7 06:44:16 eddieflores sshd\[26038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.100.26.142
2019-09-08 05:09:01
186.226.227.122 attack
Automatic report - Port Scan Attack
2019-09-08 04:54:57
221.202.195.40 attackspam
Sep  7 12:41:11 web1 sshd[22378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.202.195.40  user=r.r
Sep  7 12:41:13 web1 sshd[22378]: Failed password for r.r from 221.202.195.40 port 34709 ssh2
Sep  7 12:41:15 web1 sshd[22378]: Failed password for r.r from 221.202.195.40 port 34709 ssh2
Sep  7 12:41:17 web1 sshd[22378]: Failed password for r.r from 221.202.195.40 port 34709 ssh2
Sep  7 12:41:20 web1 sshd[22378]: Failed password for r.r from 221.202.195.40 port 34709 ssh2
Sep  7 12:41:23 web1 sshd[22378]: Failed password for r.r from 221.202.195.40 port 34709 ssh2
Sep  7 12:41:25 web1 sshd[22378]: Failed password for r.r from 221.202.195.40 port 34709 ssh2
Sep  7 12:41:25 web1 sshd[22378]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.202.195.40  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=221.202.195.40
2019-09-08 05:27:48
54.37.136.87 attackspam
Sep  7 23:11:40 h2177944 sshd\[20837\]: Invalid user demo@123 from 54.37.136.87 port 40422
Sep  7 23:11:40 h2177944 sshd\[20837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.136.87
Sep  7 23:11:42 h2177944 sshd\[20837\]: Failed password for invalid user demo@123 from 54.37.136.87 port 40422 ssh2
Sep  7 23:15:47 h2177944 sshd\[20917\]: Invalid user deploy12345 from 54.37.136.87 port 55266
...
2019-09-08 05:25:07
203.190.131.4 attackspam
*Port Scan* detected from 203.190.131.4 (IN/India/-). 4 hits in the last 135 seconds
2019-09-08 05:02:31
157.55.39.50 attackbots
Automatic report - Banned IP Access
2019-09-08 04:58:48

最近上报的IP列表

205.198.168.207 235.131.183.56 65.79.56.68 164.136.217.159
36.16.159.96 144.244.56.14 153.106.108.34 135.241.133.249
49.231.123.46 136.239.231.219 108.10.135.197 73.249.195.83
205.50.224.79 81.206.132.214 198.234.242.7 100.93.174.82
103.74.31.131 93.142.91.187 213.139.214.46 146.223.119.54