必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.13.204.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36671
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;89.13.204.41.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 06:04:32 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
41.204.13.89.in-addr.arpa domain name pointer dynamic-089-013-204-041.89.13.pool.telefonica.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
41.204.13.89.in-addr.arpa	name = dynamic-089-013-204-041.89.13.pool.telefonica.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.68.71.129 attackbotsspam
Automatic report - Banned IP Access
2020-05-04 19:44:07
118.99.104.137 attackbotsspam
May  4 13:29:50 meumeu sshd[17792]: Failed password for root from 118.99.104.137 port 53898 ssh2
May  4 13:33:03 meumeu sshd[18309]: Failed password for root from 118.99.104.137 port 38910 ssh2
...
2020-05-04 19:46:42
193.148.69.157 attackbots
frenzy
2020-05-04 19:16:31
139.170.150.252 attack
May  4 06:22:26 ip-172-31-62-245 sshd\[327\]: Invalid user mos from 139.170.150.252\
May  4 06:22:29 ip-172-31-62-245 sshd\[327\]: Failed password for invalid user mos from 139.170.150.252 port 18646 ssh2\
May  4 06:24:09 ip-172-31-62-245 sshd\[357\]: Invalid user dealer from 139.170.150.252\
May  4 06:24:11 ip-172-31-62-245 sshd\[357\]: Failed password for invalid user dealer from 139.170.150.252 port 21098 ssh2\
May  4 06:25:01 ip-172-31-62-245 sshd\[366\]: Invalid user maria from 139.170.150.252\
2020-05-04 19:19:52
93.39.230.232 attackspambots
May  4 11:57:20 debian-2gb-nbg1-2 kernel: \[10845139.761041\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=93.39.230.232 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=38760 PROTO=TCP SPT=51483 DPT=1433 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-04 19:30:36
206.214.2.70 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-05-04 19:52:06
66.70.173.63 attack
invalid login attempt (ubuntu)
2020-05-04 19:22:16
115.146.121.82 attackspambots
SpamScore above: 10.0
2020-05-04 19:24:44
2.232.250.91 attackspam
May  4 04:05:07 server1 sshd\[31957\]: Failed password for root from 2.232.250.91 port 34714 ssh2
May  4 04:09:09 server1 sshd\[1628\]: Invalid user cq from 2.232.250.91
May  4 04:09:09 server1 sshd\[1628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.232.250.91 
May  4 04:09:12 server1 sshd\[1628\]: Failed password for invalid user cq from 2.232.250.91 port 45208 ssh2
May  4 04:13:12 server1 sshd\[3402\]: Invalid user user from 2.232.250.91
...
2020-05-04 19:26:15
139.198.18.184 attack
SSH Brute-Force Attack
2020-05-04 19:33:30
198.211.110.178 attackspam
Automatic report - XMLRPC Attack
2020-05-04 19:18:12
211.248.18.249 attackspambots
Unauthorized connection attempt detected from IP address 211.248.18.249 to port 81
2020-05-04 19:48:10
85.93.20.248 attackbots
firewall-block, port(s): 3392/tcp
2020-05-04 19:20:06
82.148.31.136 attackbots
May  4 08:25:51 host sshd[35989]: Invalid user alberto from 82.148.31.136 port 35038
...
2020-05-04 19:20:31
218.37.81.9 attackbots
Port probing on unauthorized port 81
2020-05-04 19:32:44

最近上报的IP列表

146.88.66.226 191.231.24.166 84.169.88.189 176.81.232.161
221.99.131.54 142.246.110.117 55.46.236.180 157.232.166.192
107.94.201.35 7.148.174.72 227.37.93.9 84.227.252.124
248.36.136.167 39.82.116.86 146.85.60.54 253.60.108.246
59.227.31.44 50.75.30.209 154.108.12.124 173.124.0.153