必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Maiden Head

省份(region): England

国家(country): United Kingdom

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '31.58.214.0 - 31.58.214.255'

% Abuse contact for '31.58.214.0 - 31.58.214.255' is 'report@abuseradar.com'

inetnum:        31.58.214.0 - 31.58.214.255
netname:        NET-31-58-214-0-24
country:        GB
geofeed:        https://geofeed.ipxo.com/geofeed.txt
org:            ORG-SWSL7-RIPE
admin-c:        SWSL1-RIPE
tech-c:         SWSL1-RIPE
abuse-c:        SWSL1-RIPE
status:         ASSIGNED PA
remarks:        End User Organization
mnt-by:         netutils-mnt
created:        2025-09-30T19:33:59Z
last-modified:  2025-09-30T19:33:59Z
source:         RIPE

organisation:   ORG-SWSL7-RIPE
org-name:       Sapphire Web Services Limited
org-type:       OTHER
remarks:        End User Organization
address:        128 City Road
address:        EC1V 2NX
address:        London
country:        GB
abuse-c:        SWSL1-RIPE
mnt-ref:        IPXO-MNT
mnt-ref:        netutils-mnt
mnt-by:         IPXO-MNT
mnt-by:         netutils-mnt
created:        2024-07-19T17:05:37Z
last-modified:  2024-12-05T09:22:17Z
source:         RIPE # Filtered

role:           Sapphire Web Services Limited
address:        128 City Road
address:        EC1V 2NX
address:        London
address:        GB
nic-hdl:        SWSL1-RIPE
remarks:        End User Organization
abuse-mailbox:  report@abuseradar.com
mnt-by:         netutils-mnt
created:        2024-07-19T17:05:37Z
last-modified:  2024-12-05T09:42:22Z
source:         RIPE # Filtered

% Information related to '31.58.214.0/24AS20860'

route:          31.58.214.0/24
origin:         AS20860
mnt-by:         netutils-mnt
created:        2025-09-30T19:33:59Z
last-modified:  2025-09-30T19:33:59Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 31.58.214.23
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63961
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;31.58.214.23.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032201 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 05:00:20 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
Host 23.214.58.31.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 23.214.58.31.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
202.186.38.188 attackspambots
Invalid user db from 202.186.38.188 port 33074
2020-04-22 14:26:25
176.31.105.112 attackbotsspam
404 NOT FOUND
2020-04-22 14:59:10
51.77.210.216 attackspambots
Invalid user admin from 51.77.210.216 port 34686
2020-04-22 14:48:22
190.114.65.151 attackspam
Brute-force attempt banned
2020-04-22 14:39:08
177.69.130.195 attackspambots
$f2bV_matches
2020-04-22 14:50:28
128.199.118.27 attackbotsspam
(sshd) Failed SSH login from 128.199.118.27 (SG/Singapore/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 22 06:35:45 ubnt-55d23 sshd[22728]: Invalid user ou from 128.199.118.27 port 55308
Apr 22 06:35:47 ubnt-55d23 sshd[22728]: Failed password for invalid user ou from 128.199.118.27 port 55308 ssh2
2020-04-22 15:02:58
27.37.53.75 attackspam
Apr 21 22:12:57 liveconfig01 sshd[32754]: Invalid user admin from 27.37.53.75
Apr 21 22:12:57 liveconfig01 sshd[32754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.37.53.75
Apr 21 22:12:59 liveconfig01 sshd[32754]: Failed password for invalid user admin from 27.37.53.75 port 36680 ssh2
Apr 21 22:13:00 liveconfig01 sshd[32754]: Received disconnect from 27.37.53.75 port 36680:11: Bye Bye [preauth]
Apr 21 22:13:00 liveconfig01 sshd[32754]: Disconnected from 27.37.53.75 port 36680 [preauth]
Apr 21 22:20:45 liveconfig01 sshd[724]: Invalid user admin from 27.37.53.75
Apr 21 22:20:45 liveconfig01 sshd[724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.37.53.75
Apr 21 22:20:47 liveconfig01 sshd[724]: Failed password for invalid user admin from 27.37.53.75 port 56602 ssh2
Apr 21 22:20:47 liveconfig01 sshd[724]: Received disconnect from 27.37.53.75 port 56602:11: Bye Bye [preauth]
Apr 21 ........
-------------------------------
2020-04-22 14:28:51
46.219.116.22 attack
Invalid user admin1 from 46.219.116.22 port 57750
2020-04-22 15:04:49
118.174.90.250 attackbotsspam
Icarus honeypot on github
2020-04-22 14:56:46
124.105.173.17 attackbots
fail2ban -- 124.105.173.17
...
2020-04-22 14:52:46
115.53.186.199 attack
Automatic report - Brute Force attack using this IP address
2020-04-22 15:06:30
213.180.141.157 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/213.180.141.157/ 
 
 PL - 1H : (73)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : PL 
 NAME ASN : ASN12990 
 
 IP : 213.180.141.157 
 
 CIDR : 213.180.141.0/24 
 
 PREFIX COUNT : 16 
 
 UNIQUE IP COUNT : 8960 
 
 
 ATTACKS DETECTED ASN12990 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 2 
 
 DateTime : 2020-04-22 05:54:39 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2020-04-22 14:41:38
190.156.238.155 attackspam
(sshd) Failed SSH login from 190.156.238.155 (CO/Colombia/static-ip-cr190156238155.cable.net.co): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 22 09:11:41 s1 sshd[29164]: Invalid user ubuntu from 190.156.238.155 port 43606
Apr 22 09:11:44 s1 sshd[29164]: Failed password for invalid user ubuntu from 190.156.238.155 port 43606 ssh2
Apr 22 09:16:56 s1 sshd[29392]: Invalid user hy from 190.156.238.155 port 60784
Apr 22 09:16:58 s1 sshd[29392]: Failed password for invalid user hy from 190.156.238.155 port 60784 ssh2
Apr 22 09:20:09 s1 sshd[29531]: Invalid user xt from 190.156.238.155 port 53806
2020-04-22 14:47:01
82.144.207.116 attackspam
spam
2020-04-22 14:47:59
153.246.16.154 attackspam
2020-04-22T03:58:20.509626abusebot-6.cloudsearch.cf sshd[15816]: Invalid user admin from 153.246.16.154 port 43240
2020-04-22T03:58:20.527526abusebot-6.cloudsearch.cf sshd[15816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.246.16.154
2020-04-22T03:58:20.509626abusebot-6.cloudsearch.cf sshd[15816]: Invalid user admin from 153.246.16.154 port 43240
2020-04-22T03:58:22.080590abusebot-6.cloudsearch.cf sshd[15816]: Failed password for invalid user admin from 153.246.16.154 port 43240 ssh2
2020-04-22T04:03:03.496074abusebot-6.cloudsearch.cf sshd[16278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.246.16.154  user=root
2020-04-22T04:03:05.566213abusebot-6.cloudsearch.cf sshd[16278]: Failed password for root from 153.246.16.154 port 56512 ssh2
2020-04-22T04:07:03.834697abusebot-6.cloudsearch.cf sshd[16853]: Invalid user test from 153.246.16.154 port 33480
...
2020-04-22 15:06:53

最近上报的IP列表

3.90.250.34 2606:4700:10::6816:4532 2606:4700:10::6816:3826 2606:4700:10::6814:4527
2606:4700:10::6814:6057 2606:4700:10::6816:3525 2606:4700:10::6816:3689 2606:4700:10::6816:426d
2606:4700:10::6816:3283 223.199.179.44 10.48.65.241 5.181.86.46
192.165.45.205 192.121.135.97 13.218.94.63 2606:4700:10::6814:6216
2606:4700:10::6814:8699 2606:4700:10::ac43:863 2606:4700:10::ac43:2347 2606:4700:10::6814:6801