必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 33.189.55.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40285
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;33.189.55.252.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 00:07:41 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 252.55.189.33.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 33.189.55.252.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
107.170.239.108 attack
52122/tcp 119/tcp 7001/tcp...
[2019-04-22/06-22]58pkt,47pt.(tcp),6pt.(udp)
2019-06-23 00:12:05
84.246.231.100 attack
Probing for vulnerable PHP code /installer-backup.php
2019-06-22 23:42:52
71.6.232.5 attackspam
port scan and connect, tcp 3306 (mysql)
2019-06-23 00:05:55
124.57.190.28 attackbots
SSH Bruteforce
2019-06-22 23:15:58
45.32.83.203 attackbotsspam
NAME : NET-45-32-80-0-22 CIDR : 45.32.80.0/22 | STATUS : 200 ROBOT {Looking for resource vulnerabilities} DDoS Attack USA - California - block certain countries :) IP: 45.32.83.203  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-22 23:02:52
18.130.161.237 attackbotsspam
18.130.161.237 - - [22/Jun/2019:11:50:48 +0300] "POST /sys.php.php HTTP/1.1" 404 209 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.103 Safari/537.36"
2019-06-22 23:04:34
74.113.59.248 attack
445/tcp 445/tcp 445/tcp...
[2019-04-23/06-22]18pkt,1pt.(tcp)
2019-06-22 23:09:04
107.170.192.46 attack
4899/tcp 61069/tcp 41592/tcp...
[2019-04-23/06-22]61pkt,40pt.(tcp),6pt.(udp)
2019-06-23 00:02:53
124.89.164.73 attack
22/tcp 22/tcp
[2019-05-31/06-22]2pkt
2019-06-22 23:10:18
77.40.82.210 attack
IP: 77.40.82.210
ASN: AS12389 Rostelecom
Port: Message Submission 587
Found in one or more Blacklists
Date: 22/06/2019 2:46:31 PM UTC
2019-06-22 23:25:17
103.78.97.61 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-06-22 23:08:29
165.22.246.254 attack
" "
2019-06-22 23:34:07
168.197.152.5 attack
8080/tcp 23/tcp
[2019-05-07/06-22]2pkt
2019-06-22 23:26:38
186.115.44.50 attack
IP: 186.115.44.50
ASN: AS3816 COLOMBIA TELECOMUNICACIONES S.A. ESP
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 22/06/2019 2:45:55 PM UTC
2019-06-22 23:54:12
149.5.118.164 attackbotsspam
Brute forcing RDP port 3389
2019-06-22 22:57:04

最近上报的IP列表

181.228.58.4 95.32.42.30 141.160.147.163 145.206.236.185
115.203.211.144 245.141.122.161 33.64.169.214 163.49.50.70
180.43.43.75 146.239.4.224 127.50.197.89 128.13.222.191
135.121.111.237 219.210.190.146 54.57.232.83 160.200.206.158
202.245.239.71 21.183.104.147 138.168.194.195 0.215.128.52