必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Sweden

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '85.30.178.0 - 85.30.178.255'

% Abuse contact for '85.30.178.0 - 85.30.178.255' is 'abuse@teleservice.net'

inetnum:        85.30.178.0 - 85.30.178.255
netname:        TELESERVICE-SE
descr:          TOM-FTTH-HSI
remarks:        INFRA-AW
country:        SE
admin-c:        TR1369-RIPE
tech-c:         TR1369-RIPE
status:         ASSIGNED PA
mnt-by:         TELESERVICE-MNT
created:        2012-04-12T09:25:05Z
last-modified:  2012-04-12T09:25:05Z
source:         RIPE

role:           TELESERVICE ROLE
address:        Teleservice Bredband Skane AB
address:        Vastergatan 14 S-275 23 SJOBO Sweden
phone:          +46 416-585000
fax-no:         +46 416-585010
abuse-mailbox:  abuse@teleservice.net
admin-c:        JA838-RIPE
tech-c:         JA838-RIPE
mnt-by:         TELESERVICE-MNT
nic-hdl:        TR1369-RIPE
created:        2005-07-24T18:42:42Z
last-modified:  2011-07-26T08:34:38Z
source:         RIPE # Filtered

% Information related to '85.30.128.0/18AS34244'

route:          85.30.128.0/18
origin:         AS34244
mnt-by:         TELESERVICE-MNT
created:        2025-03-09T22:14:20Z
last-modified:  2025-03-09T22:14:20Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.30.178.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20673
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.30.178.162.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032401 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 25 12:42:18 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
162.178.30.85.in-addr.arpa domain name pointer host-85-30-178-162.sydskane.nu.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
162.178.30.85.in-addr.arpa	name = host-85-30-178-162.sydskane.nu.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.161.12.231 attackbotsspam
Jan  8 00:54:46 debian-2gb-nbg1-2 kernel: \[700603.071972\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=51.161.12.231 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=238 ID=10978 PROTO=TCP SPT=32767 DPT=8545 WINDOW=1024 RES=0x00 SYN URGP=0
2020-01-08 07:59:40
69.94.158.106 attackbotsspam
Jan  7 23:11:28 grey postfix/smtpd\[9955\]: NOQUEUE: reject: RCPT from brass.swingthelamp.com\[69.94.158.106\]: 554 5.7.1 Service unavailable\; Client host \[69.94.158.106\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[69.94.158.106\]\; from=\ to=\ proto=ESMTP helo=\Jan  7 23:11:28 grey postfix/smtpd\[9956\]: NOQUEUE: reject: RCPT from brass.swingthelamp.com\[69.94.158.106\]: 554 5.7.1 Service unavailable\; Client host \[69.94.158.106\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[69.94.158.106\]\; from=\ to=\ proto=ESMTP helo=\Jan  7 23:11:28 grey postfix/smtpd\[9959\]: NOQUEUE: reject: RCPT from brass.swingthelamp.com\[69.94.158.106\]: 554 5.7.1 Service unavailable\; Client host \[69.94.158.106\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[69.94.1
...
2020-01-08 07:58:08
37.19.109.246 attackbots
Jan  7 22:17:40 icecube sshd[21866]: Invalid user RPM from 37.19.109.246 port 22757
Jan  7 22:17:40 icecube sshd[21866]: Failed password for invalid user RPM from 37.19.109.246 port 22757 ssh2
2020-01-08 07:50:35
203.210.239.146 attackspam
1578431820 - 01/07/2020 22:17:00 Host: 203.210.239.146/203.210.239.146 Port: 445 TCP Blocked
2020-01-08 08:13:13
121.162.60.159 attack
Jan  7 23:04:34 ns4 sshd[3484]: Invalid user service from 121.162.60.159
Jan  7 23:04:35 ns4 sshd[3484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.162.60.159 
Jan  7 23:04:37 ns4 sshd[3484]: Failed password for invalid user service from 121.162.60.159 port 51692 ssh2
Jan  7 23:17:28 ns4 sshd[5545]: Invalid user rev. from 121.162.60.159
Jan  7 23:17:28 ns4 sshd[5545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.162.60.159 
Jan  7 23:17:30 ns4 sshd[5545]: Failed password for invalid user rev. from 121.162.60.159 port 44282 ssh2
Jan  7 23:20:36 ns4 sshd[6122]: Invalid user fik from 121.162.60.159
Jan  7 23:20:36 ns4 sshd[6122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.162.60.159 
Jan  7 23:20:38 ns4 sshd[6122]: Failed password for invalid user fik from 121.162.60.159 port 45766 ssh2


........
-----------------------------------------------
https://www.blocklist.de/
2020-01-08 08:01:04
190.221.81.6 attack
Unauthorized connection attempt detected from IP address 190.221.81.6 to port 2220 [J]
2020-01-08 07:51:57
130.193.235.184 attackbotsspam
Unauthorized connection attempt detected from IP address 130.193.235.184 to port 22
2020-01-08 07:49:46
193.31.24.113 attack
01/08/2020-00:51:40.536282 193.31.24.113 Protocol: 6 ET CHAT IRC PONG response
2020-01-08 08:07:24
112.85.42.176 attackspam
Jan  7 20:53:18 firewall sshd[18413]: Failed password for root from 112.85.42.176 port 56613 ssh2
Jan  7 20:53:34 firewall sshd[18413]: error: maximum authentication attempts exceeded for root from 112.85.42.176 port 56613 ssh2 [preauth]
Jan  7 20:53:34 firewall sshd[18413]: Disconnecting: Too many authentication failures [preauth]
...
2020-01-08 08:19:11
177.144.184.178 attackbots
Unauthorized connection attempt detected from IP address 177.144.184.178 to port 2220 [J]
2020-01-08 08:15:35
137.74.80.36 attack
Jan  7 20:40:31 vps46666688 sshd[21588]: Failed password for root from 137.74.80.36 port 51192 ssh2
...
2020-01-08 08:09:48
222.186.180.223 attackspam
Jan  7 19:03:31 linuxvps sshd\[43592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223  user=root
Jan  7 19:03:33 linuxvps sshd\[43592\]: Failed password for root from 222.186.180.223 port 42660 ssh2
Jan  7 19:03:36 linuxvps sshd\[43592\]: Failed password for root from 222.186.180.223 port 42660 ssh2
Jan  7 19:03:49 linuxvps sshd\[43767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223  user=root
Jan  7 19:03:50 linuxvps sshd\[43767\]: Failed password for root from 222.186.180.223 port 57466 ssh2
2020-01-08 08:15:06
222.186.173.226 attackspam
Jan  7 21:00:33 firewall sshd[18574]: Failed password for root from 222.186.173.226 port 31865 ssh2
Jan  7 21:00:44 firewall sshd[18574]: error: maximum authentication attempts exceeded for root from 222.186.173.226 port 31865 ssh2 [preauth]
Jan  7 21:00:44 firewall sshd[18574]: Disconnecting: Too many authentication failures [preauth]
...
2020-01-08 08:02:57
80.211.63.23 attackspam
xmlrpc attack
2020-01-08 07:48:52
203.195.243.146 attack
Unauthorized connection attempt detected from IP address 203.195.243.146 to port 2220 [J]
2020-01-08 07:55:12

最近上报的IP列表

10.216.48.185 2606:4700:10::ac43:1452 2606:4700:10::6814:7585 2606:4700:10::6814:6643
2606:4700:10::6814:8334 188.92.243.218 170.130.204.74 2606:4700:10::6816:1131
2606:4700:10::6814:5551 110.78.138.213 2606:4700:10::ac43:1133 2606:4700:10::6816:3550
110.78.138.87 2606:4700:10::6814:7857 2606:4700:10::6816:4317 2606:4700:10::6816:160
2606:4700:10::ac43:1492 2606:4700:10::6816:3823 2606:4700:10::6816:3814 2606:4700:10::6814:5329