必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Hungary

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
80.99.102.254 attack
Automatic report - Banned IP Access
2020-02-22 05:32:00
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.99.102.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60417
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.99.102.193.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 22:04:10 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
193.102.99.80.in-addr.arpa domain name pointer catv-80-99-102-193.catv.fixed.one.hu.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
193.102.99.80.in-addr.arpa	name = catv-80-99-102-193.catv.fixed.one.hu.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
113.89.0.55 bots
113.89.0.55 - - [22/Apr/2019:14:01:01 +0800] "HEAD / HTTP/1.1" 200 0 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
113.89.0.55 - - [22/Apr/2019:14:01:01 +0800] "GET / HTTP/1.1" 200 10286 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
113.89.0.55 - - [22/Apr/2019:14:01:03 +0800] "HEAD /aboutus HTTP/1.1" 301 0 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
113.89.0.55 - - [22/Apr/2019:14:01:03 +0800] "GET /aboutus HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
113.89.0.55 - - [22/Apr/2019:14:01:03 +0800] "HEAD / HTTP/1.1" 301 0 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
113.89.0.55 - - [22/Apr/2019:14:01:04 +0800] "GET / HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
2019-04-22 14:01:42
41.242.165.217 bots
41.242.165.217 - - [24/Apr/2019:10:15:02 +0800] "GET /check-ip/66.214.40.126 HTTP/1.1" 200 8571 "https://ipinfo.asytech.cn" "acebookexternalhit/1.0 (+http://www.facebook.com/externalhit_uatext.php)"
41.242.165.217 - - [24/Apr/2019:10:15:14 +0800] "GET /check-ip/35.143.225.32 HTTP/1.1" 200 8472 "https://ipinfo.asytech.cn" "acebookexternalhit/1.0 (+http://www.facebook.com/externalhit_uatext.php)"
2019-04-24 10:16:08
122.152.211.94 botsattack
122.152.211.94 - - [18/Apr/2019:12:23:08 +0800] "GET /login HTTP/1.1" 301 194 "-" "-"
122.152.211.94 - - [18/Apr/2019:12:23:08 +0800] "GET /customers/1 HTTP/1.1" 301 194 "-" "-"
122.152.211.94 - - [18/Apr/2019:12:23:08 +0800] "GET /gs-guide-websocket/803/a8vbaovq/htmlfile?c=_jp.local HTTP/1.1" 301 194 "-" "-"
122.152.211.94 - - [18/Apr/2019:12:23:08 +0800] "GET /console/login/LoginForm.jsp HTTP/1.1" 301 194 "-" "-"
122.152.211.94 - - [18/Apr/2019:12:23:08 +0800] "POST /index.php?s=captcha HTTP/1.1" 301 194 "-" "-"
122.152.211.94 - - [18/Apr/2019:12:23:08 +0800] "GET /index.php?s=/Index/\\x5Cthink\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=md5&vars[1][]=abc HTTP/1.1" 301 194 "-" "-"
122.152.211.94 - - [18/Apr/2019:12:23:08 +0800] "POST /website/blog/ HTTP/1.1" 301 194 "-" "-"
2019-04-18 12:23:38
1.10.189.153 attack
1.10.189.153 - - [23/Apr/2019:15:23:39 +0800] "POST https://www.eznewstoday.com/wp-login.php HTTP/1.1" 200 5729 "https://www.eznewstoday.com/wp-login.php" "Mozilla/5.0 (Windows NT 5.2; WOW64; x64) AppleWebKit/532.89.36 (KHTML, like Gecko) Version/5.2.7 Safari/530.61"
2019-04-23 15:33:26
37.59.1.165 bots
37.59.1.165 - - [24/Apr/2019:08:38:38 +0800] "GET //CHANGELOG.txt HTTP/1.1" 301 194 "-" "libwww-perl/6.04"
37.59.1.165 - - [24/Apr/2019:08:38:40 +0800] "GET //CHANGELOG.txt HTTP/1.1" 308 257 "-" "libwww-perl/6.04"
37.59.1.165 - - [24/Apr/2019:08:38:41 +0800] "GET /check-ip//CHANGELOG.txt HTTP/1.1" 301 194 "-" "libwww-perl/6.04"
37.59.1.165 - - [24/Apr/2019:08:38:42 +0800] "GET /check-ip//CHANGELOG.txt HTTP/1.1" 404 232 "-" "libwww-perl/6.04"
2019-04-24 08:57:21
61.110.125.144 attack
wordpress攻击 本身不是wordpress程序还搞了个wp-login
61.110.125.144 - - [18/Apr/2019:10:10:52 +0800] "GET /check-ip/5.9.61.232 HTTP/1.1" 200 8330 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.139 Safari/537.36"
61.110.125.144 - - [18/Apr/2019:10:10:52 +0800] "GET /wp-login.php?action=register HTTP/1.1" 404 209 "https://ipinfo.asytech.cn/" "Opera/9.80 (Windows NT 6.2; Win64; x64) Presto/2.12.388 Version/12.17"
61.110.125.144 - - [18/Apr/2019:10:10:53 +0800] "GET /wp-login.php?action=register HTTP/1.1" 404 209 "https://ipinfo.asytech.cn/wp-login.php?action=register" "Opera/9.80 (Windows NT 6.2; Win64; x64) Presto/2.12.388 Version/12.17"
2019-04-18 10:11:48
58.19.92.35 attackproxy
58.19.92.35 - - [24/Apr/2019:15:24:44 +0800] "CONNECT dnspod.qcloud.com:443 HTTP/1.1" 405 519 "-" "PycURL/7.43.0 libcurl/7.47.0 GnuTLS/3.4.10 zlib/1.2.8 libidn/1.32 librtmp/2.3"
123.163.114.53 - - [24/Apr/2019:15:24:44 +0800] "CONNECT dnspod.qcloud.com:443 HTTP/1.1" 405 519 "-" "PycURL/7.43.0 libcurl/7.47.0 GnuTLS/3.4.10 zlib/1.2.8 libidn/1.32 librtmp/2.3"
121.57.231.167 - - [24/Apr/2019:15:24:45 +0800] "GET http://www.123cha.com/ HTTP/1.1" 200 24638 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0"
58.248.201.244 - - [24/Apr/2019:15:24:45 +0800] "CONNECT cn.bing.com:443 HTTP/1.1" 405 513 "-" "PycURL/7.43.0 libcurl/7.47.0 GnuTLS/3.4.10 zlib/1.2.8 libidn/1.32 librtmp/2.3"
124.235.138.19 - - [24/Apr/2019:15:24:49 +0800] "CONNECT www.baidu.com:443 HTTP/1.1" 405 515 "-" "PycURL/7.43.0 libcurl/7.47.0 GnuTLS/3.4.10 zlib/1.2.8 libidn/1.32 librtmp/2.3"
113.24.80.163 - - [24/Apr/2019:15:24:49 +0800] "CONNECT dnspod.qcloud.com:443 HTTP/1.1" 405 519 "-" "PycURL/7.43.0 libcurl/7.47.0 GnuTLS/3.4.10 zlib/1.2.8 libidn/1.32 librtmp/2.3"
61.52.74.0 - - [24/Apr/2019:15:24:49 +0800] "CONNECT dnspod.qcloud.com:443 HTTP/1.1" 405 519 "-" "PycURL/7.43.0 libcurl/7.47.0 GnuTLS/3.4.10 zlib/1.2.8 libidn/1.32 librtmp/2.3"
175.42.0.75 - - [24/Apr/2019:15:24:50 +0800] "GET http://www.ip.cn/ HTTP/1.1" 200 24638 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0"
1.31.114.215 - - [24/Apr/2019:15:24:51 +0800] "CONNECT dnspod.qcloud.com:443 HTTP/1.1" 405 519 "-" "PycURL/7.43.0 libcurl/7.47.0 GnuTLS/3.4.10 zlib/1.2.8 libidn/1.32 librtmp/2.3"
123.144.25.34 - - [24/Apr/2019:15:24:52 +0800] "CONNECT www.voanews.com:443 HTTP/1.1" 405 517 "-" "PycURL/7.43.0 libcurl/7.47.0 GnuTLS/3.4.10 zlib/1.2.8 libidn/1.32 librtmp/2.3"
2019-04-24 15:32:43
134.175.20.103 attack
恶意攻击
134.175.20.103 - - [18/Apr/2019:20:51:46 +0800] "POST /sha.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.139 Safari/537.36"
134.175.20.103 - - [18/Apr/2019:20:51:46 +0800] "POST /ppx.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.139 Safari/537.36"
134.175.20.103 - - [18/Apr/2019:20:51:46 +0800] "POST /1.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.139 Safari/537.36"
134.175.20.103 - - [18/Apr/2019:20:51:46 +0800] "POST /confg.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.139 Safari/537.36"
134.175.20.103 - - [18/Apr/2019:20:51:46 +0800] "POST /conf1g.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.139 Safari/537.36"
134.175.20.103 - - [18/Apr/2019:20:51:46 +0800] "POST /confg.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.139 Safari/537.36"
2019-04-18 20:52:46
203.240.222.13 attack
登录检测攻击
203.240.222.13 - - [18/Apr/2019:14:30:13 +0800] "GET /wp-login.php?action=register& HTTP/1.1" 404 209 "https://ipinfo.asytech.cn/" "Opera/9.80 (Windows NT 6.2; Win64; x64) Presto/2.12.388 Version/12.17"
203.240.222.13 - - [18/Apr/2019:14:30:14 +0800] "GET /wp-login.php?action=register& HTTP/1.1" 404 209 "https://ipinfo.asytech.cn/wp-login.php?action=register&" "Opera/9.80 (Windows NT 6.2; Win64; x64) Presto/2.12.388 Version/12.17"
2019-04-18 14:31:20
139.59.23.231 botsattack
139.59.23.231 - - [24/Apr/2019:19:27:23 +0800] "GET /w00tw00t.at.blackhats.romanian.anti-sec:) HTTP/1.1" 301 194 "-" "ZmEu"
139.59.23.231 - - [24/Apr/2019:19:27:23 +0800] "GET  HTTP/1.1" 400 182 "-" "-"
139.59.23.231 - - [24/Apr/2019:19:27:23 +0800] "GET  HTTP/1.1" 400 182 "-" "-"
2019-04-24 19:28:05
185.132.133.23 proxy
可能是代理检测吧
185.132.133.23 - - [19/Apr/2019:18:21:50 +0800] "CONNECT mobile.chomikuj.pl:80 HTTP/1.1" 400 182 "-" "-"
2019-04-19 18:22:44
5.188.44.47 spam
5.188.44.47 - - [19/Apr/2019:13:11:26 +0800] "GET /index.php/2018/08/29/jack_ma_2018_08_29_en/ HTTP/1.1" 200 13881 "https://eznewstoday.com/index.php/2018/08/29/jack_ma_2018_08_29_en/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.88 Safari/537.36"
5.188.44.47 - - [19/Apr/2019:13:11:27 +0800] "GET /index.php/2018/08/29/jack_ma_2018_08_29_en/ HTTP/1.1" 200 13881 "https://eznewstoday.com/index.php/2018/08/29/jack_ma_2018_08_29_en/" "Opera/9.80 (Windows NT 6.2; Win64; x64) Presto/2.12.388 Version/12.17"
5.188.44.47 - - [19/Apr/2019:13:11:28 +0800] "GET /index.php/2018/08/29/jack_ma_2018_08_29_en/ HTTP/1.1" 200 13881 "https://eznewstoday.com/index.php/2018/08/29/jack_ma_2018_08_29_en/" "Opera/9.80 (Windows NT 6.2; Win64; x64) Presto/2.12.388 Version/12.17"
2019-04-19 14:01:19
196.22.201.51 attack
登录攻击
196.22.201.51 - - [22/Apr/2019:12:36:06 +0800] "POST https://www.eznewstoday.com/wp-login.php HTTP/1.1" 200 5534 "https://www.eznewstoday.com/wp-login.php" "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.60.13) Gecko/20172285 Firefox/45.60.13"
2019-04-22 12:37:16
139.59.23.231 attack
ZmEu是个phpMyAdmin脆弱性检查工具,可以发现phpMyAdmin的漏洞,从而进行攻击
139.59.23.231 - - [20/Apr/2019:10:24:06 +0800] "GET /w00tw00t.at.blackhats.romanian.anti-sec:) HTTP/1.1" 404 498 "-" "ZmEu"
139.59.23.231 - - [20/Apr/2019:10:24:07 +0800] "GET /phpMyAdmin/setup.php HTTP/1.1" 404 477 "-" "ZmEu"
139.59.23.231 - - [20/Apr/2019:10:24:08 +0800] "GET /phpmyadmin/setup.php HTTP/1.1" 404 477 "-" "ZmEu"
139.59.23.231 - - [20/Apr/2019:10:24:10 +0800] "GET /phpmy/scripts/setup.php HTTP/1.1" 404 480 "-" "ZmEu"
139.59.23.231 - - [20/Apr/2019:10:24:10 +0800] "GET /scripts/setup.php/index.php HTTP/1.1" 404 484 "-" "ZmEu"
139.59.23.231 - - [20/Apr/2019:10:24:11 +0800] "GET HTTP/1.1" 400 0 "-" "-"
139.59.23.231 - - [20/Apr/2019:10:24:12 +0800] "GET HTTP/1.1" 400 0 "-" "-"
2019-04-20 10:49:01
159.138.35.59 attack
159.138.35.59 - - [23/Apr/2019:21:23:50 +0800] "GET /.env HTTP/1.1" 404 209 "-" "Mozlila/5.0 (Linux; Android 7.0; SM-G892A Bulid/NRD90M; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/60.0.3112.107 Moblie Safari/537.36"
159.138.35.59 - - [23/Apr/2019:21:23:52 +0800] "GET /.env HTTP/1.1" 301 194 "-" "Mozlila/5.0 (Linux; Android 7.0; SM-G892A Bulid/NRD90M; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/60.0.3112.107 Moblie Safari/537.36"
159.138.35.59 - - [23/Apr/2019:21:23:59 +0800] "GET /.env HTTP/1.1" 404 209 "-" "Mozlila/5.0 (Linux; Android 7.0; SM-G892A Bulid/NRD90M; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/60.0.3112.107 Moblie Safari/537.36"
2019-04-23 21:25:16

最近上报的IP列表

60.96.218.113 121.6.223.186 141.61.221.86 75.198.169.243
226.235.106.157 21.65.46.76 174.219.124.58 32.168.211.66
104.13.227.214 239.122.137.250 202.10.182.85 180.23.223.129
56.38.206.76 138.200.106.28 155.74.17.71 218.42.176.114
141.219.27.187 140.94.253.66 89.242.94.48 89.105.24.178