必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.220.133.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63131
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.220.133.213.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 04:38:11 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
213.133.220.94.in-addr.arpa domain name pointer dslb-094-220-133-213.094.220.pools.vodafone-ip.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
213.133.220.94.in-addr.arpa	name = dslb-094-220-133-213.094.220.pools.vodafone-ip.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
118.163.4.200 attackspambots
Attempted connection to port 81.
2020-08-01 13:51:47
142.93.34.237 attackspam
Unauthorized connection attempt detected from IP address 142.93.34.237 to port 7338
2020-08-01 13:54:50
95.78.251.116 attackbotsspam
[SID2] Fail2ban detected 5 failed SSH login attempts within 30 minutes. This report was submitted automatically.
2020-08-01 14:13:22
182.71.44.130 attack
Port Scan
...
2020-08-01 14:15:26
89.248.169.12 attackspam
Icarus honeypot on github
2020-08-01 14:16:24
100.11.215.126 attackbotsspam
Attempted connection to ports 80, 8080.
2020-08-01 14:16:02
103.124.44.252 attackbotsspam
Attempted connection to port 445.
2020-08-01 14:10:29
87.246.7.27 attackspam
(smtpauth) Failed SMTP AUTH login from 87.246.7.27 (BG/Bulgaria/27.0-255.7.246.87.in-addr.arpa): 5 in the last 3600 secs
2020-08-01 14:14:55
138.121.128.19 attack
Aug  1 07:48:38 buvik sshd[7773]: Failed password for root from 138.121.128.19 port 51614 ssh2
Aug  1 07:52:14 buvik sshd[8385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.128.19  user=root
Aug  1 07:52:16 buvik sshd[8385]: Failed password for root from 138.121.128.19 port 46428 ssh2
...
2020-08-01 13:53:51
175.45.10.101 attackspambots
Invalid user hkk from 175.45.10.101 port 33622
2020-08-01 14:12:04
113.31.108.14 attackbotsspam
Invalid user law from 113.31.108.14 port 54146
2020-08-01 14:28:48
106.12.100.206 attack
Aug  1 07:08:45 vps639187 sshd\[20596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.100.206  user=root
Aug  1 07:08:47 vps639187 sshd\[20596\]: Failed password for root from 106.12.100.206 port 32992 ssh2
Aug  1 07:14:40 vps639187 sshd\[20674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.100.206  user=root
...
2020-08-01 14:00:31
103.138.68.74 attackspambots
Unauthorized connection attempt from IP address 103.138.68.74 on Port 445(SMB)
2020-08-01 14:20:17
138.99.216.104 attack
SmallBizIT.US 7 packets to tcp(4444,4455,33333,33890,40000,43389,63389)
2020-08-01 14:07:36
87.251.74.79 attackspam
08/01/2020-01:58:18.357917 87.251.74.79 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-08-01 14:01:12

最近上报的IP列表

170.214.198.13 244.222.10.108 199.135.134.176 52.246.26.223
94.156.142.148 81.189.86.154 83.221.85.225 200.202.237.146
146.102.253.5 250.119.11.95 237.54.103.190 101.90.145.26
63.229.139.235 116.80.74.73 27.86.56.142 168.86.31.120
199.120.187.124 255.47.227.180 6.243.72.81 88.190.171.1