必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Zürich

省份(region): Zurich

国家(country): Switzerland

运营商(isp): Swisscom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.5.116.33
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50481
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.5.116.33.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 10:49:37 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
33.116.5.85.in-addr.arpa domain name pointer 33.116.5.85.dynamic.cust.swisscom.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
33.116.5.85.in-addr.arpa	name = 33.116.5.85.dynamic.cust.swisscom.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
35.204.228.166 attackbots
Attempted WordPress login: "GET /wp-login.php"
2020-06-02 04:55:27
123.132.200.30 attack
firewall-block, port(s): 23/tcp
2020-06-02 05:03:46
81.19.215.118 attackspambots
81.19.215.118 - - [02/Jun/2020:00:55:08 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2020-06-02 05:04:06
192.144.230.158 attackbotsspam
5x Failed Password
2020-06-02 05:08:53
49.233.13.182 attack
Jun  1 22:18:09 ns381471 sshd[27756]: Failed password for root from 49.233.13.182 port 43772 ssh2
2020-06-02 04:40:33
101.91.114.27 attack
2020-06-01T22:12:56.7282311240 sshd\[14214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.91.114.27  user=root
2020-06-01T22:12:58.2923541240 sshd\[14214\]: Failed password for root from 101.91.114.27 port 55582 ssh2
2020-06-01T22:20:51.8742011240 sshd\[14574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.91.114.27  user=root
...
2020-06-02 04:35:18
188.165.162.97 attackbotsspam
Jun  1 23:36:48 pkdns2 sshd\[27560\]: Address 188.165.162.97 maps to www.impresoras3d.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Jun  1 23:36:50 pkdns2 sshd\[27560\]: Failed password for root from 188.165.162.97 port 35542 ssh2Jun  1 23:40:00 pkdns2 sshd\[27688\]: Address 188.165.162.97 maps to www.impresoras3d.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Jun  1 23:40:02 pkdns2 sshd\[27688\]: Failed password for root from 188.165.162.97 port 40354 ssh2Jun  1 23:43:04 pkdns2 sshd\[27869\]: Address 188.165.162.97 maps to www.impresoras3d.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Jun  1 23:43:06 pkdns2 sshd\[27869\]: Failed password for root from 188.165.162.97 port 45100 ssh2
...
2020-06-02 04:59:56
206.189.108.32 attackspam
Jun  1 16:42:34 NPSTNNYC01T sshd[29020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.108.32
Jun  1 16:42:36 NPSTNNYC01T sshd[29020]: Failed password for invalid user linux9\r from 206.189.108.32 port 55084 ssh2
Jun  1 16:43:27 NPSTNNYC01T sshd[29085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.108.32
...
2020-06-02 04:46:48
95.163.74.40 attackspambots
Jun  1 22:58:46 home sshd[28218]: Failed password for root from 95.163.74.40 port 49420 ssh2
Jun  1 23:02:02 home sshd[28546]: Failed password for root from 95.163.74.40 port 52724 ssh2
...
2020-06-02 05:09:52
222.186.169.192 attackspam
2020-06-01T20:33:04.515916shield sshd\[26940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192  user=root
2020-06-01T20:33:06.917612shield sshd\[26940\]: Failed password for root from 222.186.169.192 port 28982 ssh2
2020-06-01T20:33:10.445359shield sshd\[26940\]: Failed password for root from 222.186.169.192 port 28982 ssh2
2020-06-01T20:33:14.384845shield sshd\[26940\]: Failed password for root from 222.186.169.192 port 28982 ssh2
2020-06-01T20:33:17.548852shield sshd\[26940\]: Failed password for root from 222.186.169.192 port 28982 ssh2
2020-06-02 04:37:57
31.184.199.114 attackspambots
Jun  1 22:20:36 srv2 sshd\[3722\]: Invalid user 0 from 31.184.199.114 port 44181
Jun  1 22:20:40 srv2 sshd\[3724\]: Invalid user 22 from 31.184.199.114 port 41693
Jun  1 22:20:49 srv2 sshd\[3726\]: Invalid user 101 from 31.184.199.114 port 50369
2020-06-02 04:36:24
54.38.65.55 attackspam
Jun  1 22:37:17 electroncash sshd[59945]: Failed password for root from 54.38.65.55 port 40749 ssh2
Jun  1 22:39:24 electroncash sshd[60495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.65.55  user=root
Jun  1 22:39:26 electroncash sshd[60495]: Failed password for root from 54.38.65.55 port 60490 ssh2
Jun  1 22:41:29 electroncash sshd[61037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.65.55  user=root
Jun  1 22:41:30 electroncash sshd[61037]: Failed password for root from 54.38.65.55 port 51875 ssh2
...
2020-06-02 04:48:11
218.4.164.86 attack
[ssh] SSH attack
2020-06-02 04:46:23
111.93.71.219 attackbotsspam
Jun  1 22:24:28 v22019038103785759 sshd\[20368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.71.219  user=root
Jun  1 22:24:30 v22019038103785759 sshd\[20368\]: Failed password for root from 111.93.71.219 port 56780 ssh2
Jun  1 22:28:22 v22019038103785759 sshd\[20589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.71.219  user=root
Jun  1 22:28:24 v22019038103785759 sshd\[20589\]: Failed password for root from 111.93.71.219 port 59043 ssh2
Jun  1 22:32:11 v22019038103785759 sshd\[20832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.71.219  user=root
...
2020-06-02 04:58:25
112.225.198.94 attackbotsspam
Port Scan detected!
...
2020-06-02 05:07:47

最近上报的IP列表

96.26.18.123 232.71.207.155 228.205.82.82 186.1.84.169
28.65.116.88 216.44.121.98 52.2.44.78 168.17.166.143
253.57.128.249 8.54.177.103 124.101.14.153 136.23.4.116
9.73.49.36 38.68.215.237 238.53.189.92 31.146.105.144
25.8.230.129 7.206.107.194 80.166.126.223 229.252.29.30