必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 86.80.54.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19780
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;86.80.54.107.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 04:31:14 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
107.54.80.86.in-addr.arpa domain name pointer 86-80-54-107.fixed.kpn.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
107.54.80.86.in-addr.arpa	name = 86-80-54-107.fixed.kpn.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
153.36.236.35 attack
Aug 14 05:34:00 amit sshd\[22881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.35  user=root
Aug 14 05:34:02 amit sshd\[22881\]: Failed password for root from 153.36.236.35 port 55879 ssh2
Aug 14 05:34:11 amit sshd\[22883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.35  user=root
...
2019-08-14 11:44:53
14.139.231.130 attackbotsspam
$f2bV_matches
2019-08-14 11:43:59
50.225.211.250 attackbots
19/8/13@23:04:08: FAIL: Alarm-Intrusion address from=50.225.211.250
...
2019-08-14 11:18:10
223.223.202.102 attack
Unauthorized connection attempt from IP address 223.223.202.102 on Port 445(SMB)
2019-08-14 11:38:35
101.108.171.52 attack
Unauthorized connection attempt from IP address 101.108.171.52 on Port 445(SMB)
2019-08-14 11:55:37
159.192.107.112 attack
Unauthorized connection attempt from IP address 159.192.107.112 on Port 445(SMB)
2019-08-14 11:29:55
14.167.220.157 attack
Unauthorized connection attempt from IP address 14.167.220.157 on Port 445(SMB)
2019-08-14 11:53:15
125.227.233.103 attackbotsspam
Unauthorized connection attempt from IP address 125.227.233.103 on Port 445(SMB)
2019-08-14 11:27:36
96.74.118.158 attackspam
NAME : MICHIGAN-CCCS-38 CIDR : 96.85.96.0/19 SYN Flood DDoS Attack USA - New Jersey - block certain countries :) IP: 96.74.118.158  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-08-14 11:36:48
201.140.122.13 attackspam
Unauthorized connection attempt from IP address 201.140.122.13 on Port 445(SMB)
2019-08-14 11:54:00
36.85.120.223 attack
Unauthorized connection attempt from IP address 36.85.120.223 on Port 445(SMB)
2019-08-14 11:43:07
193.112.23.129 attack
Aug 14 04:04:00 mail sshd\[23793\]: Failed password for invalid user scaner from 193.112.23.129 port 58742 ssh2
Aug 14 04:19:15 mail sshd\[24229\]: Invalid user www from 193.112.23.129 port 38364
...
2019-08-14 11:24:19
220.133.51.4 attackbotsspam
Automatic report - Port Scan Attack
2019-08-14 11:26:02
18.191.217.168 attackbotsspam
2019-08-14T03:04:12.428629abusebot-8.cloudsearch.cf sshd\[6670\]: Invalid user suporte from 18.191.217.168 port 53594
2019-08-14 11:16:21
119.42.95.220 attack
Unauthorized connection attempt from IP address 119.42.95.220 on Port 445(SMB)
2019-08-14 11:59:21

最近上报的IP列表

100.55.241.180 225.82.96.21 180.202.63.223 142.29.104.50
228.88.25.251 7.95.191.199 45.249.194.126 26.237.241.111
59.220.123.181 34.50.36.239 192.116.189.146 171.207.49.111
245.233.53.55 220.90.236.62 201.82.160.46 243.103.130.124
86.72.165.33 67.29.22.237 82.245.40.155 29.68.208.197