必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 92.224.21.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25249
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;92.224.21.7.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013101 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 04:37:39 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
7.21.224.92.in-addr.arpa domain name pointer dynamic-092-224-021-007.92.224.pool.telefonica.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
7.21.224.92.in-addr.arpa	name = dynamic-092-224-021-007.92.224.pool.telefonica.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
179.43.110.206 attackbotsspam
23/tcp
[2019-10-28]1pkt
2019-10-29 03:03:09
80.82.64.125 attack
Oct 28 16:04:43 unicornsoft sshd\[24860\]: User root from 80.82.64.125 not allowed because not listed in AllowUsers
Oct 28 16:04:44 unicornsoft sshd\[24860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.82.64.125  user=root
Oct 28 16:04:46 unicornsoft sshd\[24860\]: Failed password for invalid user root from 80.82.64.125 port 53620 ssh2
2019-10-29 03:11:15
115.213.133.195 attackspam
SSH Scan
2019-10-29 03:06:28
49.235.88.96 attack
Oct 28 19:24:32 srv206 sshd[16182]: Invalid user mlocate from 49.235.88.96
Oct 28 19:24:32 srv206 sshd[16182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.88.96
Oct 28 19:24:32 srv206 sshd[16182]: Invalid user mlocate from 49.235.88.96
Oct 28 19:24:33 srv206 sshd[16182]: Failed password for invalid user mlocate from 49.235.88.96 port 36836 ssh2
...
2019-10-29 03:12:26
167.99.90.28 attack
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-10-29 03:15:21
54.225.39.165 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/54.225.39.165/ 
 
 US - 1H : (324)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN14618 
 
 IP : 54.225.39.165 
 
 CIDR : 54.224.0.0/15 
 
 PREFIX COUNT : 433 
 
 UNIQUE IP COUNT : 19526400 
 
 
 ATTACKS DETECTED ASN14618 :  
  1H - 4 
  3H - 13 
  6H - 18 
 12H - 21 
 24H - 29 
 
 DateTime : 2019-10-28 12:47:35 
 
 INFO : Server 301 - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2019-10-29 03:11:55
49.234.42.79 attackspambots
Oct 28 07:56:29 TORMINT sshd\[22765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.42.79  user=root
Oct 28 07:56:31 TORMINT sshd\[22765\]: Failed password for root from 49.234.42.79 port 54970 ssh2
Oct 28 08:01:40 TORMINT sshd\[23066\]: Invalid user cpanelphpmyadmin from 49.234.42.79
Oct 28 08:01:40 TORMINT sshd\[23066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.42.79
...
2019-10-29 03:31:38
54.36.21.217 attackbotsspam
Oct 28 11:44:55 mxgate1 postfix/postscreen[21566]: CONNECT from [54.36.21.217]:60937 to [176.31.12.44]:25
Oct 28 11:44:55 mxgate1 postfix/dnsblog[21579]: addr 54.36.21.217 listed by domain zen.spamhaus.org as 127.0.0.3
Oct 28 11:44:55 mxgate1 postfix/dnsblog[21579]: addr 54.36.21.217 listed by domain zen.spamhaus.org as 127.0.0.4
Oct 28 11:44:55 mxgate1 postfix/dnsblog[21579]: addr 54.36.21.217 listed by domain zen.spamhaus.org as 127.0.0.2
Oct 28 11:44:55 mxgate1 postfix/dnsblog[21580]: addr 54.36.21.217 listed by domain cbl.abuseat.org as 127.0.0.2
Oct 28 11:45:01 mxgate1 postfix/postscreen[21566]: DNSBL rank 3 for [54.36.21.217]:60937
Oct 28 11:45:01 mxgate1 postfix/tlsproxy[21839]: CONNECT from [54.36.21.217]:60937
Oct x@x
Oct 28 11:45:01 mxgate1 postfix/postscreen[21566]: DISCONNECT [54.36.21.217]:60937
Oct 28 11:45:01 mxgate1 postfix/tlsproxy[21839]: DISCONNECT [54.36.21.217]:60937


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=54.36.21.217
2019-10-29 02:59:51
182.61.182.50 attackbotsspam
Oct 28 19:57:37 ArkNodeAT sshd\[11245\]: Invalid user svn from 182.61.182.50
Oct 28 19:57:37 ArkNodeAT sshd\[11245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.182.50
Oct 28 19:57:38 ArkNodeAT sshd\[11245\]: Failed password for invalid user svn from 182.61.182.50 port 44386 ssh2
2019-10-29 03:13:25
45.125.193.139 attack
445/tcp
[2019-10-28]1pkt
2019-10-29 03:27:14
176.107.133.97 attackspambots
Lines containing failures of 176.107.133.97
Oct 28 15:34:50 MAKserver06 sshd[25559]: Invalid user bavmk from 176.107.133.97 port 38252
Oct 28 15:34:50 MAKserver06 sshd[25559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.107.133.97 
Oct 28 15:34:53 MAKserver06 sshd[25559]: Failed password for invalid user bavmk from 176.107.133.97 port 38252 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=176.107.133.97
2019-10-29 03:09:40
168.232.188.78 attackspambots
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-10-29 03:07:45
206.189.38.104 attack
22/tcp 22/tcp
[2019-10-28]2pkt
2019-10-29 03:26:56
88.247.49.78 attackbotsspam
445/tcp
[2019-10-28]1pkt
2019-10-29 02:57:56
168.232.198.50 attack
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-10-29 03:04:29

最近上报的IP列表

231.109.8.161 223.179.97.146 219.188.253.164 122.106.175.90
190.9.170.251 215.66.238.221 74.72.169.9 170.26.142.114
76.229.59.13 175.182.243.129 100.31.193.31 63.244.15.221
78.155.144.217 125.189.42.171 180.37.251.181 192.48.58.169
201.208.254.177 50.74.153.19 141.73.135.79 132.219.213.136