必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): Beijing Guanghuan Xinwang Digital Technology Co.Ltd

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attack
Automatic report - Banned IP Access
2020-07-21 13:27:01
attack
WordPress vulnerability sniffing (looking for /wp-login.php)
2020-07-13 02:01:42
attackbotsspam
52.80.20.135 - - \[08/Jul/2020:03:25:12 +0200\] "POST /wp-login.php HTTP/1.0" 200 4409 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
52.80.20.135 - - \[08/Jul/2020:03:25:15 +0200\] "POST /wp-login.php HTTP/1.0" 200 4241 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
52.80.20.135 - - \[08/Jul/2020:03:25:17 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-07-08 10:21:17
attack
2020/06/24 00:53:29 [error] 2039889#2039889: *410103 open() "/usr/share/nginx/html/wp-login.php" failed (2: No such file or directory), client: 52.80.20.135, server: _, request: "GET /wp-login.php HTTP/1.1", host: "boersch-ibak-panoramo.de", referrer: "http://www.xn--mobiles-wc-brsch-xwb.de/wp-login.php"
2020/06/24 00:53:29 [error] 2039889#2039889: *410103 open() "/usr/share/nginx/html/wp-login.php" failed (2: No such file or directory), client: 52.80.20.135, server: _, request: "GET /wp-login.php HTTP/1.1", host: "boersch-ibak-panoramo.de", referrer: "http://www.xn--mobiles-wc-brsch-xwb.de/wp-login.php"
2020/06/24 00:53:29 [error] 2039889#2039889: *410103 open() "/usr/share/nginx/html/wp-login.php" failed (2: No such file or directory), client: 52.80.20.135, server: _, request: "GET /wp-login.php HTTP/1.1", host: "boersch-ibak-panoramo.de", referrer: "http://www.xn--mobiles-wc-brsch-xwb.de/wp-login.php"
2020-06-24 17:28:19
attack
xmlrpc attack
2020-06-22 15:42:05
attackspambots
Trolling for resource vulnerabilities
2020-06-16 14:43:18
attackspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-06-15 04:27:53
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.80.20.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47326
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.80.20.135.			IN	A

;; AUTHORITY SECTION:
.			582	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020061401 1800 900 604800 86400

;; Query time: 103 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 15 04:27:50 CST 2020
;; MSG SIZE  rcvd: 116
HOST信息:
135.20.80.52.in-addr.arpa domain name pointer ec2-52-80-20-135.cn-north-1.compute.amazonaws.com.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
135.20.80.52.in-addr.arpa	name = ec2-52-80-20-135.cn-north-1.compute.amazonaws.com.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
59.55.110.49 attackbotsspam
Unauthorized connection attempt detected from IP address 59.55.110.49 to port 445 [T]
2020-04-15 02:18:03
115.152.66.167 attackbots
Unauthorized connection attempt detected from IP address 115.152.66.167 to port 445 [T]
2020-04-15 02:08:06
119.165.48.49 attackspam
Unauthorized connection attempt detected from IP address 119.165.48.49 to port 2323
2020-04-15 02:04:44
111.76.18.123 attackbotsspam
Unauthorized connection attempt detected from IP address 111.76.18.123 to port 445 [T]
2020-04-15 02:10:19
116.10.132.19 attackbotsspam
Unauthorized connection attempt detected from IP address 116.10.132.19 to port 23 [T]
2020-04-15 02:07:30
222.135.116.240 attack
Unauthorized connection attempt detected from IP address 222.135.116.240 to port 23 [T]
2020-04-15 02:24:48
80.82.78.104 attackspambots
Scanning an empty webserver with deny all robots.txt
2020-04-15 02:13:53
36.88.37.172 attackbotsspam
Unauthorized connection attempt detected from IP address 36.88.37.172 to port 445 [T]
2020-04-15 02:21:16
218.200.5.178 attackbots
Unauthorized connection attempt detected from IP address 218.200.5.178 to port 1433 [T]
2020-04-15 02:26:56
162.243.128.29 attackspambots
Unauthorized connection attempt detected from IP address 162.243.128.29 to port 3351 [T]
2020-04-15 02:02:01
218.87.51.126 attackbotsspam
Unauthorized connection attempt detected from IP address 218.87.51.126 to port 445 [T]
2020-04-15 01:46:55
182.110.17.200 attackspambots
Unauthorized connection attempt detected from IP address 182.110.17.200 to port 445 [T]
2020-04-15 01:56:06
123.157.138.131 attack
Unauthorized connection attempt detected from IP address 123.157.138.131 to port 1433 [T]
2020-04-15 02:03:26
59.55.110.87 attackbots
Unauthorized connection attempt detected from IP address 59.55.110.87 to port 445 [T]
2020-04-15 02:17:33
218.87.49.40 attack
Unauthorized connection attempt detected from IP address 218.87.49.40 to port 445 [T]
2020-04-15 01:48:30

最近上报的IP列表

209.242.222.234 45.152.199.114 5.157.17.60 207.157.190.116
197.39.111.154 59.99.15.61 188.102.42.139 180.124.195.180
176.92.130.63 204.65.134.15 109.234.39.92 187.163.123.51
119.23.211.54 103.73.212.51 36.100.182.55 35.54.134.18
115.216.1.195 2a01:4f8:1c1c:230c::1 54.36.149.65 5.79.65.139