必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.85.204.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60680
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;64.85.204.221.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 10:51:03 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
221.204.85.64.in-addr.arpa domain name pointer 64.85.204.221.reverse.socket.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
221.204.85.64.in-addr.arpa	name = 64.85.204.221.reverse.socket.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
81.12.32.244 attackbots
port scan and connect, tcp 80 (http)
2020-01-16 04:04:35
157.230.243.133 attack
Jan 14 07:35:36 pl3server sshd[19262]: Invalid user gaurav from 157.230.243.133
Jan 14 07:35:36 pl3server sshd[19262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.243.133
Jan 14 07:35:39 pl3server sshd[19262]: Failed password for invalid user gaurav from 157.230.243.133 port 45196 ssh2
Jan 14 07:35:39 pl3server sshd[19262]: Received disconnect from 157.230.243.133: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=157.230.243.133
2020-01-16 03:49:22
98.189.134.115 attackbotsspam
Unauthorized connection attempt detected from IP address 98.189.134.115 to port 2220 [J]
2020-01-16 04:00:10
110.34.81.53 attackbotsspam
Unauthorized connection attempt detected from IP address 110.34.81.53 to port 4567 [J]
2020-01-16 04:13:58
125.27.113.136 attack
Jan 15 20:55:07 dcd-gentoo sshd[9620]: Invalid user support from 125.27.113.136 port 55904
Jan 15 20:55:08 dcd-gentoo sshd[9624]: Invalid user support from 125.27.113.136 port 57097
Jan 15 20:55:09 dcd-gentoo sshd[9627]: Invalid user support from 125.27.113.136 port 58168
...
2020-01-16 04:00:30
77.42.87.237 attackspam
Unauthorized connection attempt detected from IP address 77.42.87.237 to port 23
2020-01-16 04:20:53
59.36.75.227 attack
Unauthorized connection attempt detected from IP address 59.36.75.227 to port 2220 [J]
2020-01-16 03:55:05
106.13.117.241 attack
Unauthorized connection attempt detected from IP address 106.13.117.241 to port 2220 [J]
2020-01-16 03:57:56
185.209.0.90 attackbots
Jan 15 20:45:44 debian-2gb-nbg1-2 kernel: \[1376841.821405\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.209.0.90 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=30853 PROTO=TCP SPT=45894 DPT=7200 WINDOW=1024 RES=0x00 SYN URGP=0
2020-01-16 03:56:49
218.92.0.158 attack
Jan 15 20:50:36 minden010 sshd[27310]: Failed password for root from 218.92.0.158 port 26788 ssh2
Jan 15 20:50:39 minden010 sshd[27310]: Failed password for root from 218.92.0.158 port 26788 ssh2
Jan 15 20:50:42 minden010 sshd[27310]: Failed password for root from 218.92.0.158 port 26788 ssh2
Jan 15 20:50:45 minden010 sshd[27310]: Failed password for root from 218.92.0.158 port 26788 ssh2
...
2020-01-16 03:53:39
102.186.76.45 attackbotsspam
Unauthorized connection attempt detected from IP address 102.186.76.45 to port 80
2020-01-16 04:14:47
58.211.250.189 attack
Unauthorized connection attempt detected from IP address 58.211.250.189 to port 23 [J]
2020-01-16 03:46:22
69.17.247.77 attack
Unauthorized connection attempt detected from IP address 69.17.247.77 to port 5555 [J]
2020-01-16 04:22:01
165.231.253.194 attackbotsspam
Jan 15 20:41:40 Ubuntu-1404-trusty-64-minimal sshd\[32141\]: Invalid user server from 165.231.253.194
Jan 15 20:41:40 Ubuntu-1404-trusty-64-minimal sshd\[32141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.231.253.194
Jan 15 20:41:42 Ubuntu-1404-trusty-64-minimal sshd\[32141\]: Failed password for invalid user server from 165.231.253.194 port 34914 ssh2
Jan 15 20:45:50 Ubuntu-1404-trusty-64-minimal sshd\[2923\]: Invalid user markd from 165.231.253.194
Jan 15 20:45:50 Ubuntu-1404-trusty-64-minimal sshd\[2923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.231.253.194
2020-01-16 04:03:39
181.31.222.94 attackbots
Unauthorized connection attempt detected from IP address 181.31.222.94 to port 23 [J]
2020-01-16 04:11:09

最近上报的IP列表

137.26.180.221 18.1.156.251 109.6.119.22 182.22.22.56
245.43.11.212 159.234.12.58 225.101.191.116 38.132.159.130
230.42.90.201 45.179.3.90 148.6.24.97 73.90.36.191
253.131.0.58 27.211.126.53 71.43.240.215 68.6.175.2
80.238.194.25 153.84.74.93 184.208.51.31 52.249.157.29