必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Dickinson

省份(region): North Dakota

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 72.20.77.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64475
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;72.20.77.16.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 12:21:48 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
16.77.20.72.in-addr.arpa domain name pointer lefor-16.ctcinet.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
16.77.20.72.in-addr.arpa	name = lefor-16.ctcinet.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
119.29.247.187 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-10-05 14:23:35
188.166.229.193 attackbotsspam
$f2bV_matches
2020-10-05 14:22:12
139.198.191.217 attack
2020-10-04 16:37:34.540688-0500  localhost sshd[8115]: Failed password for root from 139.198.191.217 port 54384 ssh2
2020-10-05 14:10:26
103.90.190.54 attack
Oct  5 05:34:40 ift sshd\[29208\]: Failed password for root from 103.90.190.54 port 26824 ssh2Oct  5 05:36:00 ift sshd\[29571\]: Failed password for root from 103.90.190.54 port 36944 ssh2Oct  5 05:37:26 ift sshd\[29705\]: Failed password for root from 103.90.190.54 port 47068 ssh2Oct  5 05:38:57 ift sshd\[29784\]: Failed password for root from 103.90.190.54 port 57190 ssh2Oct  5 05:40:28 ift sshd\[30155\]: Failed password for root from 103.90.190.54 port 2799 ssh2
...
2020-10-05 14:11:14
94.180.25.139 attack
Port scan denied
2020-10-05 14:28:29
35.142.163.228 attack
22/tcp 22/tcp
[2020-10-04]2pkt
2020-10-05 14:39:28
154.126.36.108 attackspambots
SMB Server BruteForce Attack
2020-10-05 14:39:13
120.227.8.39 attackspambots
$f2bV_matches
2020-10-05 14:17:59
201.243.194.180 attackspambots
SMB Server BruteForce Attack
2020-10-05 14:30:27
182.176.167.172 attackspam
Unauthorised access (Oct  4) SRC=182.176.167.172 LEN=40 TOS=0x10 PREC=0x40 TTL=53 ID=3635 TCP DPT=23 WINDOW=1970 SYN
2020-10-05 14:04:04
178.128.98.193 attack
SSH login attempts.
2020-10-05 14:14:03
120.0.140.115 attackbots
Unauthorised access (Oct  5) SRC=120.0.140.115 LEN=40 TTL=46 ID=19220 TCP DPT=8080 WINDOW=21587 SYN 
Unauthorised access (Oct  4) SRC=120.0.140.115 LEN=40 TTL=46 ID=30505 TCP DPT=8080 WINDOW=21587 SYN 
Unauthorised access (Oct  4) SRC=120.0.140.115 LEN=40 TTL=46 ID=18196 TCP DPT=8080 WINDOW=21587 SYN 
Unauthorised access (Oct  4) SRC=120.0.140.115 LEN=40 TTL=46 ID=49887 TCP DPT=8080 WINDOW=21587 SYN
2020-10-05 13:59:47
212.70.149.83 attackspam
Rude login attack (2396 tries in 1d)
2020-10-05 14:05:23
45.148.122.102 attack
Oct  5 05:55:41 ip-172-31-42-142 sshd\[3921\]: Invalid user fake from 45.148.122.102\
Oct  5 05:55:43 ip-172-31-42-142 sshd\[3921\]: Failed password for invalid user fake from 45.148.122.102 port 58206 ssh2\
Oct  5 05:55:43 ip-172-31-42-142 sshd\[3923\]: Invalid user admin from 45.148.122.102\
Oct  5 05:55:45 ip-172-31-42-142 sshd\[3923\]: Failed password for invalid user admin from 45.148.122.102 port 34680 ssh2\
Oct  5 05:55:48 ip-172-31-42-142 sshd\[3925\]: Failed password for root from 45.148.122.102 port 39514 ssh2\
2020-10-05 14:08:42
5.165.91.67 attackspam
 TCP (SYN) 5.165.91.67:22295 -> port 23, len 44
2020-10-05 14:18:57

最近上报的IP列表

249.145.211.246 196.135.222.55 22.186.85.119 26.157.244.174
37.167.125.59 69.205.40.234 206.84.175.59 96.173.240.65
208.149.149.192 252.88.91.166 249.211.136.241 190.65.158.46
132.116.246.146 80.11.172.63 194.215.64.247 159.191.232.188
26.121.19.77 161.154.136.136 5.95.181.48 40.218.131.79