必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Helmstedt

省份(region): Lower Saxony

国家(country): Germany

运营商(isp): Vodafone

主机名(hostname): unknown

机构(organization): Vodafone Kabel Deutschland GmbH

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 31.16.44.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7718
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;31.16.44.21.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071300 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 14 00:23:46 CST 2019
;; MSG SIZE  rcvd: 115

HOST信息:
Host 21.44.16.31.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.44.16.31.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
206.189.132.8 attackbots
$f2bV_matches
2020-04-16 16:14:40
82.202.247.120 attackbotsspam
Tried to find non-existing directory/file on the server
2020-04-16 16:10:53
145.239.91.88 attackspambots
Apr 16 06:13:13 ncomp sshd[14551]: Invalid user wtf from 145.239.91.88
Apr 16 06:13:13 ncomp sshd[14551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.91.88
Apr 16 06:13:13 ncomp sshd[14551]: Invalid user wtf from 145.239.91.88
Apr 16 06:13:16 ncomp sshd[14551]: Failed password for invalid user wtf from 145.239.91.88 port 53714 ssh2
2020-04-16 16:42:17
142.93.60.53 attackbotsspam
Invalid user marco from 142.93.60.53 port 33518
2020-04-16 16:16:59
178.128.81.60 attackspam
Apr 16 08:06:32 ws26vmsma01 sshd[219281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.81.60
Apr 16 08:06:34 ws26vmsma01 sshd[219281]: Failed password for invalid user oper from 178.128.81.60 port 35820 ssh2
...
2020-04-16 16:29:52
36.110.217.140 attack
DATE:2020-04-16 07:20:16,IP:36.110.217.140,MATCHES:10,PORT:ssh
2020-04-16 16:11:07
45.55.214.64 attack
Invalid user weblogic from 45.55.214.64 port 47758
2020-04-16 16:24:02
49.88.112.66 attackspam
2020-04-16T08:40:27.320568shield sshd\[16481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.66  user=root
2020-04-16T08:40:29.030549shield sshd\[16481\]: Failed password for root from 49.88.112.66 port 30886 ssh2
2020-04-16T08:40:31.243352shield sshd\[16481\]: Failed password for root from 49.88.112.66 port 30886 ssh2
2020-04-16T08:40:34.550296shield sshd\[16481\]: Failed password for root from 49.88.112.66 port 30886 ssh2
2020-04-16T08:42:16.787208shield sshd\[16689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.66  user=root
2020-04-16 16:52:17
117.95.177.32 attack
Email rejected due to spam filtering
2020-04-16 16:39:16
37.252.187.140 attack
Apr 16 04:04:24 NPSTNNYC01T sshd[8633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.252.187.140
Apr 16 04:04:26 NPSTNNYC01T sshd[8633]: Failed password for invalid user farid from 37.252.187.140 port 35010 ssh2
Apr 16 04:07:57 NPSTNNYC01T sshd[9064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.252.187.140
...
2020-04-16 16:21:27
194.26.29.212 attack
Apr 16 10:06:42 debian-2gb-nbg1-2 kernel: \[9283384.395908\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.212 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=18672 PROTO=TCP SPT=40957 DPT=54344 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-16 16:12:32
148.70.96.124 attack
Apr 16 07:56:10 *** sshd[5678]: Invalid user testwww1 from 148.70.96.124
2020-04-16 16:48:39
180.250.248.170 attackbots
$f2bV_matches
2020-04-16 16:36:44
222.186.173.238 attackspam
Apr 16 04:26:27 NPSTNNYC01T sshd[13490]: Failed password for root from 222.186.173.238 port 32066 ssh2
Apr 16 04:26:30 NPSTNNYC01T sshd[13490]: Failed password for root from 222.186.173.238 port 32066 ssh2
Apr 16 04:26:33 NPSTNNYC01T sshd[13490]: Failed password for root from 222.186.173.238 port 32066 ssh2
Apr 16 04:26:40 NPSTNNYC01T sshd[13490]: error: maximum authentication attempts exceeded for root from 222.186.173.238 port 32066 ssh2 [preauth]
...
2020-04-16 16:27:07
51.68.84.36 attack
(sshd) Failed SSH login from 51.68.84.36 (FR/France/ip-51-68-84.eu): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr 16 02:54:34 host sshd[38483]: Invalid user postgres from 51.68.84.36 port 42572
2020-04-16 16:44:39

最近上报的IP列表

111.154.69.71 51.67.35.179 54.39.20.23 116.246.255.111
92.128.219.245 62.238.135.24 2620:18c::168 136.219.174.6
70.160.149.65 78.15.99.37 97.178.145.224 58.20.174.180
96.218.240.81 54.100.2.4 182.150.62.74 132.151.245.144
2003:d2:1f0c:5136:1c22:5286:386d:47b0 178.216.140.158 133.220.224.96 135.246.133.25