必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.67.212.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36986
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.67.212.249.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 23:12:40 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
249.212.67.99.in-addr.arpa domain name pointer adsl-99-67-212-249.dsl.pltn13.sbcglobal.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
249.212.67.99.in-addr.arpa	name = adsl-99-67-212-249.dsl.pltn13.sbcglobal.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.13.98.132 attack
sshd jail - ssh hack attempt
2020-06-12 22:08:23
113.181.206.252 attackspambots
12-6-2020 14:06:47	Unauthorized connection attempt (Brute-Force).
12-6-2020 14:06:47	Connection from IP address: 113.181.206.252 on port: 587


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.181.206.252
2020-06-12 22:44:37
77.42.73.117 attackbots
Automatic report - Port Scan Attack
2020-06-12 22:37:23
161.35.125.159 attackspambots
Jun 11 06:36:17 ntop sshd[17183]: Invalid user nigga from 161.35.125.159 port 47166
Jun 11 06:36:17 ntop sshd[17183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.125.159 
Jun 11 06:36:18 ntop sshd[17183]: Failed password for invalid user nigga from 161.35.125.159 port 47166 ssh2
Jun 11 06:36:19 ntop sshd[17183]: Received disconnect from 161.35.125.159 port 47166:11: Bye Bye [preauth]
Jun 11 06:36:19 ntop sshd[17183]: Disconnected from invalid user nigga 161.35.125.159 port 47166 [preauth]
Jun 11 06:45:47 ntop sshd[18179]: Invalid user mjyang from 161.35.125.159 port 49076
Jun 11 06:45:47 ntop sshd[18179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.125.159 
Jun 11 06:45:49 ntop sshd[18179]: Failed password for invalid user mjyang from 161.35.125.159 port 49076 ssh2
Jun 11 06:45:51 ntop sshd[18179]: Received disconnect from 161.35.125.159 port 49076:11: Bye Bye [preauth]........
-------------------------------
2020-06-12 22:19:45
183.89.215.238 attackspam
12-6-2020 14:06:55	Unauthorized connection attempt (Brute-Force).
12-6-2020 14:06:55	Connection from IP address: 183.89.215.238 on port: 587


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=183.89.215.238
2020-06-12 22:38:08
45.227.254.18 attackspam
Here more information about 45.227.254.18 
info: [Panama] 51852 Private Layer INC 
rDNS: hostby.xwinnet.biz 
Connected: 12 servere(s) 
Reason: ssh 
Portscan/portflood
Ports: 20,22,23,81,110,135,143,993 
Services: imaps,ftp-data,pop3,telnet,loc-srv,hosts2-ns,ssh,imap 
servere: Europe/Moscow (UTC+3) 
Found at blocklist: zen.spamhaus.org, spfbl.net, abuseIPDB.com
myIP:89.179.244.250 
 
[2020-06-10 02:23:10] (tcp) myIP:993 <- 45.227.254.18:48363
[2020-06-10 04:05:15] (tcp) myIP:20 <- 45.227.254.18:48363
[2020-06-10 10:56:14] (tcp) myIP:110 <- 45.227.254.18:52766
[2020-06-10 15:39:39] (tcp) myIP:993 <- 45.227.254.18:52766
[2020-06-10 15:49:31] (tcp) myIP:20 <- 45.227.254.18:52766
[2020-06-10 16:13:00] (tcp) myIP:23 <- 45.227.254.18:52766
[2020-06-10 17:48:21] (tcp) myIP:135 <- 45.227.254.18:52766
[2020-06-10 20:02:25] (tcp) myIP:81 <- 45.227.254.18:52766
[2020-06-10 20:08:07] (tcp) myIP:22 <- 45.227.254.18:52766
[2020-06-10 21:26:56] (tcp) myIP:22 <- 45.227.254.18:52766
[2........
---------------------------------
2020-06-12 22:26:45
37.213.228.139 attackspam
12-6-2020 14:07:20	Unauthorized connection attempt (Brute-Force).
12-6-2020 14:07:20	Connection from IP address: 37.213.228.139 on port: 587


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=37.213.228.139
2020-06-12 22:17:26
103.200.23.81 attackspam
Jun 12 08:23:38 mail sshd\[42156\]: Invalid user test1 from 103.200.23.81
Jun 12 08:23:38 mail sshd\[42156\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.200.23.81
...
2020-06-12 22:28:21
51.254.205.6 attackspam
Jun 12 16:23:18 cosmoit sshd[22644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.205.6
2020-06-12 22:29:15
3.19.97.96 attackspambots
Jun 12 14:07:21 prox sshd[13888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.19.97.96 
Jun 12 14:07:23 prox sshd[13888]: Failed password for invalid user yui from 3.19.97.96 port 41412 ssh2
2020-06-12 22:13:25
112.85.42.188 attackbotsspam
06/12/2020-10:04:49.794559 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan
2020-06-12 22:06:21
61.72.255.26 attackspambots
Jun 12 15:08:03 santamaria sshd\[24593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.72.255.26  user=root
Jun 12 15:08:06 santamaria sshd\[24593\]: Failed password for root from 61.72.255.26 port 60296 ssh2
Jun 12 15:10:07 santamaria sshd\[24662\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.72.255.26  user=root
...
2020-06-12 22:13:44
40.97.130.101 attack
Brute forcing email accounts
2020-06-12 22:34:59
188.162.202.62 attackspam
1591963631 - 06/12/2020 14:07:11 Host: 188.162.202.62/188.162.202.62 Port: 445 TCP Blocked
2020-06-12 22:21:38
106.13.25.198 attack
Jun 12 08:07:01 Tower sshd[15951]: Connection from 106.13.25.198 port 32860 on 192.168.10.220 port 22 rdomain ""
Jun 12 08:07:04 Tower sshd[15951]: Invalid user wangzl from 106.13.25.198 port 32860
Jun 12 08:07:04 Tower sshd[15951]: error: Could not get shadow information for NOUSER
Jun 12 08:07:04 Tower sshd[15951]: Failed password for invalid user wangzl from 106.13.25.198 port 32860 ssh2
Jun 12 08:07:04 Tower sshd[15951]: Received disconnect from 106.13.25.198 port 32860:11: Bye Bye [preauth]
Jun 12 08:07:04 Tower sshd[15951]: Disconnected from invalid user wangzl 106.13.25.198 port 32860 [preauth]
2020-06-12 22:25:20

最近上报的IP列表

195.15.169.253 30.233.66.179 128.187.93.194 107.21.37.174
36.129.163.83 45.45.139.249 172.55.60.252 211.44.55.199
170.161.253.181 142.71.163.146 209.87.2.41 151.121.97.23
115.149.247.48 247.186.149.24 49.41.135.15 96.247.156.77
241.235.109.172 238.72.37.231 55.2.12.206 42.64.192.9