必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 92.109.252.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10437
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;92.109.252.221.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013101 1800 900 604800 86400

;; Query time: 269 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 03:26:38 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
221.252.109.92.in-addr.arpa domain name pointer 92-109-252-221.cable.dynamic.v4.ziggo.nl.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
221.252.109.92.in-addr.arpa	name = 92-109-252-221.cable.dynamic.v4.ziggo.nl.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
67.216.209.77 attack
Aug  8 17:13:34 host sshd[18392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.216.209.77.16clouds.com  user=root
Aug  8 17:13:37 host sshd[18392]: Failed password for root from 67.216.209.77 port 43422 ssh2
...
2020-08-09 03:16:13
128.14.30.253 attackspambots
Unauthorized access detected from black listed ip!
2020-08-09 02:58:47
149.202.76.77 attackspam
[2020-08-08 14:43:00] NOTICE[1248] chan_sip.c: Registration from '' failed for '149.202.76.77:55525' - Wrong password
[2020-08-08 14:43:00] SECURITY[1275] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-08-08T14:43:00.898-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="4391",SessionID="0x7f27203df9b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/149.202.76.77/55525",Challenge="142e00ea",ReceivedChallenge="142e00ea",ReceivedHash="63ece3fb8403f2f93db2530df5dcbdd9"
[2020-08-08 14:43:35] NOTICE[1248] chan_sip.c: Registration from '' failed for '149.202.76.77:61248' - Wrong password
[2020-08-08 14:43:35] SECURITY[1275] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-08-08T14:43:35.682-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="4392",SessionID="0x7f27203df9b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/149.202.76.77
...
2020-08-09 03:02:09
103.221.224.98 attack
firewall-block, port(s): 445/tcp
2020-08-09 03:13:17
192.99.70.208 attackbots
2020-08-06 17:10:11 server sshd[86126]: Failed password for invalid user root from 192.99.70.208 port 58550 ssh2
2020-08-09 02:47:29
220.134.90.138 attackspam
firewall-block, port(s): 9530/tcp
2020-08-09 02:52:10
138.204.24.73 attackspambots
Aug  7 17:44:17 myhostname sshd[10446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.204.24.73  user=r.r
Aug  7 17:44:19 myhostname sshd[10446]: Failed password for r.r from 138.204.24.73 port 16138 ssh2
Aug  7 17:44:19 myhostname sshd[10446]: Received disconnect from 138.204.24.73 port 16138:11: Bye Bye [preauth]
Aug  7 17:44:19 myhostname sshd[10446]: Disconnected from 138.204.24.73 port 16138 [preauth]
Aug  7 17:47:02 myhostname sshd[12659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.204.24.73  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=138.204.24.73
2020-08-09 03:08:17
180.166.184.66 attackspambots
SSH invalid-user multiple login try
2020-08-09 03:15:00
152.67.12.90 attack
Aug  8 20:37:39 sticky sshd\[29744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.67.12.90  user=root
Aug  8 20:37:41 sticky sshd\[29744\]: Failed password for root from 152.67.12.90 port 39110 ssh2
Aug  8 20:41:48 sticky sshd\[29829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.67.12.90  user=root
Aug  8 20:41:50 sticky sshd\[29829\]: Failed password for root from 152.67.12.90 port 55536 ssh2
Aug  8 20:45:50 sticky sshd\[29847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.67.12.90  user=root
2020-08-09 02:49:09
114.80.94.228 attackbots
Aug  8 20:14:23 jane sshd[12548]: Failed password for root from 114.80.94.228 port 19726 ssh2
...
2020-08-09 03:17:57
219.101.192.141 attackbots
Automatic report BANNED IP
2020-08-09 03:21:53
94.102.59.107 attackbotsspam
Aug  8 15:12:48 web01.agentur-b-2.de postfix/submission/smtpd[2635861]: lost connection after EHLO from unknown[94.102.59.107]
Aug  8 15:17:35 web01.agentur-b-2.de postfix/submission/smtpd[2636833]: lost connection after EHLO from unknown[94.102.59.107]
Aug  8 15:17:43 web01.agentur-b-2.de postfix/submission/smtpd[2636833]: lost connection after EHLO from unknown[94.102.59.107]
Aug  8 15:17:46 web01.agentur-b-2.de postfix/submission/smtpd[2636833]: lost connection after EHLO from unknown[94.102.59.107]
Aug  8 15:17:47 web01.agentur-b-2.de postfix/submission/smtpd[2636833]: lost connection after EHLO from unknown[94.102.59.107]
2020-08-09 02:54:22
222.186.30.218 attackbots
Aug  8 18:43:15 localhost sshd[88662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.218  user=root
Aug  8 18:43:17 localhost sshd[88662]: Failed password for root from 222.186.30.218 port 36030 ssh2
Aug  8 18:43:19 localhost sshd[88662]: Failed password for root from 222.186.30.218 port 36030 ssh2
Aug  8 18:43:15 localhost sshd[88662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.218  user=root
Aug  8 18:43:17 localhost sshd[88662]: Failed password for root from 222.186.30.218 port 36030 ssh2
Aug  8 18:43:19 localhost sshd[88662]: Failed password for root from 222.186.30.218 port 36030 ssh2
Aug  8 18:43:15 localhost sshd[88662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.218  user=root
Aug  8 18:43:17 localhost sshd[88662]: Failed password for root from 222.186.30.218 port 36030 ssh2
Aug  8 18:43:19 localhost sshd[88662]: Fa
...
2020-08-09 02:44:42
142.93.195.15 attack
Aug  8 21:55:20 venus kernel: [104024.969658] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:66:8f:ed:d2:74:7f:6e:37:e3:08:00 SRC=142.93.195.15 DST=78.47.70.226 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=53263 PROTO=TCP SPT=52402 DPT=24162 WINDOW=1024 RES=0x00 SYN URGP=0
2020-08-09 03:02:30
64.227.62.250 attackspam
Aug  8 23:55:49 gw1 sshd[5190]: Failed password for root from 64.227.62.250 port 49474 ssh2
...
2020-08-09 03:23:38

最近上报的IP列表

136.240.120.15 165.36.81.170 13.48.46.23 58.129.172.115
249.92.6.122 222.163.242.194 82.175.164.163 202.153.132.207
74.11.178.5 234.183.134.64 209.102.18.154 141.40.220.213
125.164.18.177 38.157.159.70 202.90.20.151 252.56.245.113
59.1.50.225 182.118.48.38 192.234.219.74 181.132.143.98