必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 33.21.98.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3494
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;33.21.98.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 01:07:04 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 20.98.21.33.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 33.21.98.20.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
23.6.113.181 attackspambots
ICMP MP Probe, Scan -
2019-08-10 21:40:55
212.142.140.81 attack
Aug 10 15:15:26 ArkNodeAT sshd\[7485\]: Invalid user courier from 212.142.140.81
Aug 10 15:15:26 ArkNodeAT sshd\[7485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.142.140.81
Aug 10 15:15:29 ArkNodeAT sshd\[7485\]: Failed password for invalid user courier from 212.142.140.81 port 34856 ssh2
2019-08-10 21:39:24
177.11.116.238 attack
failed_logins
2019-08-10 21:48:11
52.177.129.153 attackspam
Aug 10 08:56:06 TORMINT sshd\[20700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.177.129.153  user=root
Aug 10 08:56:07 TORMINT sshd\[20700\]: Failed password for root from 52.177.129.153 port 34400 ssh2
Aug 10 09:02:51 TORMINT sshd\[21098\]: Invalid user administrateur from 52.177.129.153
Aug 10 09:02:51 TORMINT sshd\[21098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.177.129.153
...
2019-08-10 21:19:55
23.215.129.151 attackbotsspam
ICMP MP Probe, Scan -
2019-08-10 21:47:51
64.94.45.68 attack
ICMP MP Probe, Scan -
2019-08-10 21:13:42
64.94.45.63 attack
ICMP MP Probe, Scan -
2019-08-10 21:21:30
51.77.192.132 attackbots
Aug 10 15:08:55 server sshd[56347]: Failed password for invalid user ftp-user from 51.77.192.132 port 55182 ssh2
Aug 10 15:17:17 server sshd[57145]: Failed password for invalid user private from 51.77.192.132 port 58498 ssh2
Aug 10 15:21:12 server sshd[57474]: Failed password for root from 51.77.192.132 port 57796 ssh2
2019-08-10 21:55:38
80.11.146.165 attack
" "
2019-08-10 21:58:47
23.73.133.0 attackspambots
ICMP MP Probe, Scan -
2019-08-10 21:38:23
179.162.155.205 attackspambots
Automatic report - Port Scan Attack
2019-08-10 21:49:56
212.47.238.207 attackbots
Automatic report - Banned IP Access
2019-08-10 21:41:17
64.94.45.0 attackspam
ICMP MP Probe, Scan -
2019-08-10 21:24:37
198.108.67.51 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-10 21:18:12
209.17.97.58 attackspam
EventTime:Sat Aug 10 22:22:17 AEST 2019,EventName:Client denied: configuration,TargetDataNamespace:/,TargetDataContainer:srv/www/upperbay.info/site/,TargetDataName:E_NULL,SourceIP:209.17.97.58,VendorOutcomeCode:E_NULL,InitiatorServiceName:59356
2019-08-10 21:22:49

最近上报的IP列表

56.153.53.23 61.212.189.39 83.159.46.193 198.9.227.26
217.237.52.60 7.0.83.172 117.226.247.104 24.171.224.93
203.222.138.62 204.78.222.13 224.18.213.112 5.230.1.243
92.31.46.145 60.106.70.166 230.114.236.132 38.171.210.224
67.58.65.53 97.78.238.172 220.116.50.72 154.75.84.251