必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.216.131.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5341
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.216.131.46.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 04:47:25 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
46.131.216.94.in-addr.arpa domain name pointer dslb-094-216-131-046.094.216.pools.vodafone-ip.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
46.131.216.94.in-addr.arpa	name = dslb-094-216-131-046.094.216.pools.vodafone-ip.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
94.176.236.5 attack
Oct  7 18:40:47 our-server-hostname postfix/smtpd[7107]: connect from unknown[94.176.236.5]
Oct  7 18:40:48 our-server-hostname sqlgrey: grey: new: 94.176.236.5(94.176.236.5), x@x -> x@x
Oct  7 18:40:49 our-server-hostname postfix/policy-spf[20640]: : Policy action=PREPEND Received-SPF: none (secsuremail.com: No applicable sender policy available) receiver=x@x
Oct x@x
Oct  7 18:40:49 our-server-hostname postfix/smtpd[710
.... truncated .... 
3]: x@x
Oct  7 22:03:47 our-server-hostname postfix/smtpd[6563]: disconnect from unknown[94.176.236.5]
Oct  7 22:03:51 our-server-hostname postfix/smtpd[24638]: connect from unknown[94.176.236.5]
Oct  7 22:03:52 our-server-hostname postfix/smtpd[24733]: connect from unknown[94.176.236.5]
Oct  7 22:03:52 our-server-hostname sqlgrey: grey: throttling: 94.176.236.5(94.176.236.5), x@x -> x@x
Oct  7 22:03:52 our-server-hostname postfix/policy-spf[25724]: : Policy action=PREPEND Received-SPF: none (secsuremail.com: No applicable sender po........
-------------------------------
2019-10-08 19:47:29
111.122.181.250 attack
Automatic report - Banned IP Access
2019-10-08 19:48:00
117.156.119.39 attackbots
Oct  8 13:26:09 lnxmysql61 sshd[18739]: Failed password for root from 117.156.119.39 port 51410 ssh2
Oct  8 13:26:09 lnxmysql61 sshd[18739]: Failed password for root from 117.156.119.39 port 51410 ssh2
2019-10-08 19:44:52
59.25.154.75 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/59.25.154.75/ 
 KR - 1H : (101)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : KR 
 NAME ASN : ASN4766 
 
 IP : 59.25.154.75 
 
 CIDR : 59.25.128.0/17 
 
 PREFIX COUNT : 8136 
 
 UNIQUE IP COUNT : 44725248 
 
 
 WYKRYTE ATAKI Z ASN4766 :  
  1H - 8 
  3H - 20 
  6H - 25 
 12H - 51 
 24H - 81 
 
 DateTime : 2019-10-08 05:50:36 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-08 19:27:19
111.204.157.197 attackspam
Apr 14 22:19:57 ubuntu sshd[5373]: Failed password for invalid user albany from 111.204.157.197 port 47889 ssh2
Apr 14 22:23:04 ubuntu sshd[5727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.204.157.197
Apr 14 22:23:06 ubuntu sshd[5727]: Failed password for invalid user lr from 111.204.157.197 port 59730 ssh2
Apr 14 22:26:23 ubuntu sshd[5778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.204.157.197
2019-10-08 19:15:32
182.61.109.92 attackspambots
2019-10-08T11:15:17.678288shield sshd\[10118\]: Invalid user Qwerty_123 from 182.61.109.92 port 36676
2019-10-08T11:15:17.683389shield sshd\[10118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.109.92
2019-10-08T11:15:19.312081shield sshd\[10118\]: Failed password for invalid user Qwerty_123 from 182.61.109.92 port 36676 ssh2
2019-10-08T11:19:23.251560shield sshd\[10805\]: Invalid user !Qaz@Wsx\#Edc from 182.61.109.92 port 49308
2019-10-08T11:19:23.256179shield sshd\[10805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.109.92
2019-10-08 19:49:16
111.20.56.246 attackspam
Jul 15 08:37:47 dallas01 sshd[22422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.20.56.246
Jul 15 08:37:48 dallas01 sshd[22422]: Failed password for invalid user cn from 111.20.56.246 port 55891 ssh2
Jul 15 08:40:26 dallas01 sshd[23082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.20.56.246
2019-10-08 19:20:39
220.143.20.20 attack
" "
2019-10-08 19:06:24
1.186.40.2 attackbotsspam
Automatic report - Banned IP Access
2019-10-08 19:40:09
181.49.117.166 attackspambots
Aug 14 10:31:34 vtv3 sshd\[26169\]: Invalid user tomcat3 from 181.49.117.166 port 40324
Aug 14 10:31:34 vtv3 sshd\[26169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.117.166
Aug 14 10:31:35 vtv3 sshd\[26169\]: Failed password for invalid user tomcat3 from 181.49.117.166 port 40324 ssh2
Aug 14 10:41:28 vtv3 sshd\[31381\]: Invalid user valid from 181.49.117.166 port 58486
Aug 14 10:41:28 vtv3 sshd\[31381\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.117.166
Aug 14 10:59:09 vtv3 sshd\[7479\]: Invalid user crack from 181.49.117.166 port 38368
Aug 14 10:59:09 vtv3 sshd\[7479\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.117.166
Aug 14 10:59:11 vtv3 sshd\[7479\]: Failed password for invalid user crack from 181.49.117.166 port 38368 ssh2
Aug 14 11:07:40 vtv3 sshd\[11853\]: Invalid user unity from 181.49.117.166 port 56536
Aug 14 11:07:40 vtv3 sshd\[1185
2019-10-08 19:43:18
111.177.18.202 attack
Apr 15 14:52:39 ubuntu sshd[25570]: Failed password for invalid user ha from 111.177.18.202 port 33425 ssh2
Apr 15 14:55:00 ubuntu sshd[25640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.177.18.202
Apr 15 14:55:01 ubuntu sshd[25640]: Failed password for invalid user deluge from 111.177.18.202 port 44681 ssh2
Apr 15 14:57:25 ubuntu sshd[26024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.177.18.202
2019-10-08 19:38:41
198.108.67.51 attackbotsspam
firewall-block, port(s): 4242/tcp
2019-10-08 19:41:32
58.37.99.74 attackspam
SSH invalid-user multiple login try
2019-10-08 19:38:00
51.79.81.223 attackbotsspam
\[2019-10-08 02:14:56\] NOTICE\[1887\] chan_sip.c: Registration from '"705" \' failed for '51.79.81.223:5995' - Wrong password
\[2019-10-08 02:14:56\] SECURITY\[1898\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-08T02:14:56.934-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="705",SessionID="0x7fc3ac2ed548",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/51.79.81.223/5995",Challenge="321becce",ReceivedChallenge="321becce",ReceivedHash="7e7893c79607355203195e78a162d252"
\[2019-10-08 02:14:56\] NOTICE\[1887\] chan_sip.c: Registration from '"705" \' failed for '51.79.81.223:5995' - Wrong password
\[2019-10-08 02:14:56\] SECURITY\[1898\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-08T02:14:56.992-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="705",SessionID="0x7fc3ac00c388",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/51.79.8
2019-10-08 19:16:23
111.123.76.75 attack
Apr 16 20:24:46 ubuntu sshd[27085]: Failed password for root from 111.123.76.75 port 52997 ssh2
Apr 16 20:24:49 ubuntu sshd[27085]: Failed password for root from 111.123.76.75 port 52997 ssh2
Apr 16 20:24:51 ubuntu sshd[27085]: Failed password for root from 111.123.76.75 port 52997 ssh2
Apr 16 20:24:53 ubuntu sshd[27085]: Failed password for root from 111.123.76.75 port 52997 ssh2
2019-10-08 19:47:14

最近上报的IP列表

179.231.185.44 28.206.205.197 47.59.200.241 212.226.151.68
237.40.8.37 225.15.82.92 62.94.252.233 44.194.114.191
235.238.167.151 132.114.214.102 198.71.6.129 22.178.81.99
215.42.123.211 126.114.166.246 140.61.122.49 8.253.182.127
186.212.14.202 107.47.30.131 140.225.255.162 18.192.98.74