必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 33.12.130.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35339
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;33.12.130.85.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 22:44:02 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
b'Host 85.130.12.33.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 33.12.130.85.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.77.201.36 attackbotsspam
2019-10-09T20:15:35.920502abusebot-3.cloudsearch.cf sshd\[23164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.ip-51-77-201.eu  user=root
2019-10-10 05:51:25
51.75.249.28 attackbotsspam
Oct  9 23:28:44 SilenceServices sshd[25887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.249.28
Oct  9 23:28:46 SilenceServices sshd[25887]: Failed password for invalid user !@#qwe123 from 51.75.249.28 port 59786 ssh2
Oct  9 23:32:36 SilenceServices sshd[27562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.249.28
2019-10-10 05:43:22
188.166.54.199 attackspambots
Oct  9 10:42:02 hanapaa sshd\[22833\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.54.199  user=root
Oct  9 10:42:04 hanapaa sshd\[22833\]: Failed password for root from 188.166.54.199 port 35535 ssh2
Oct  9 10:46:31 hanapaa sshd\[23193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.54.199  user=root
Oct  9 10:46:32 hanapaa sshd\[23193\]: Failed password for root from 188.166.54.199 port 55948 ssh2
Oct  9 10:50:56 hanapaa sshd\[23582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.54.199  user=root
2019-10-10 05:32:53
209.17.96.66 attack
Automatic report - Banned IP Access
2019-10-10 05:50:44
117.92.165.241 attackbots
Oct  9 21:38:41 mxgate1 postfix/postscreen[1818]: CONNECT from [117.92.165.241]:3603 to [176.31.12.44]:25
Oct  9 21:38:41 mxgate1 postfix/dnsblog[1823]: addr 117.92.165.241 listed by domain zen.spamhaus.org as 127.0.0.3
Oct  9 21:38:41 mxgate1 postfix/dnsblog[1819]: addr 117.92.165.241 listed by domain cbl.abuseat.org as 127.0.0.2
Oct  9 21:38:41 mxgate1 postfix/dnsblog[1823]: addr 117.92.165.241 listed by domain zen.spamhaus.org as 127.0.0.4
Oct  9 21:38:41 mxgate1 postfix/dnsblog[1823]: addr 117.92.165.241 listed by domain zen.spamhaus.org as 127.0.0.11
Oct  9 21:38:41 mxgate1 postfix/dnsblog[1821]: addr 117.92.165.241 listed by domain b.barracudacentral.org as 127.0.0.2
Oct  9 21:38:47 mxgate1 postfix/postscreen[1818]: DNSBL rank 4 for [117.92.165.241]:3603
Oct x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=117.92.165.241
2019-10-10 05:40:35
58.87.67.226 attackbots
Oct  9 17:38:18 plusreed sshd[16336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.67.226  user=root
Oct  9 17:38:20 plusreed sshd[16336]: Failed password for root from 58.87.67.226 port 51764 ssh2
...
2019-10-10 05:41:29
194.36.174.15 attackspam
2019-10-09T21:35:06.370843lon01.zurich-datacenter.net sshd\[31126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.36.174.15  user=root
2019-10-09T21:35:08.516898lon01.zurich-datacenter.net sshd\[31126\]: Failed password for root from 194.36.174.15 port 59644 ssh2
2019-10-09T21:39:50.196696lon01.zurich-datacenter.net sshd\[31220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.36.174.15  user=root
2019-10-09T21:39:51.996756lon01.zurich-datacenter.net sshd\[31220\]: Failed password for root from 194.36.174.15 port 42760 ssh2
2019-10-09T21:44:28.253184lon01.zurich-datacenter.net sshd\[31312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.36.174.15  user=root
...
2019-10-10 05:52:27
180.97.220.3 attack
" "
2019-10-10 05:37:24
24.48.174.245 attack
port scan and connect, tcp 23 (telnet)
2019-10-10 05:37:13
83.25.25.222 attack
Oct  9 22:53:30 arianus sshd\[23616\]: Invalid user admin from 83.25.25.222 port 60596
...
2019-10-10 05:33:14
154.8.185.122 attack
Oct  9 22:52:31 SilenceServices sshd[12631]: Failed password for root from 154.8.185.122 port 53020 ssh2
Oct  9 22:56:39 SilenceServices sshd[13752]: Failed password for root from 154.8.185.122 port 59600 ssh2
2019-10-10 05:24:19
60.21.73.88 attackbots
CN China - Hits: 11
2019-10-10 05:38:11
183.154.91.109 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-10-10 05:46:39
52.173.250.85 attack
$f2bV_matches
2019-10-10 05:15:52
123.148.145.147 attackbots
WordPress brute force
2019-10-10 05:30:56

最近上报的IP列表

224.172.158.246 187.31.230.104 166.52.79.216 173.117.114.230
219.140.8.229 188.29.228.63 114.125.197.202 56.208.206.49
132.159.161.234 234.15.109.159 208.32.66.177 82.197.5.172
36.246.156.15 201.124.145.87 13.16.125.249 138.96.99.220
56.214.32.174 118.225.31.178 203.121.158.16 127.188.43.15