必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Republic of China (ROC)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.175.139.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52894
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.175.139.121.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022400 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 24 14:59:07 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
121.139.175.1.in-addr.arpa domain name pointer 1-175-139-121.dynamic-ip.hinet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
121.139.175.1.in-addr.arpa	name = 1-175-139-121.dynamic-ip.hinet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
212.64.19.123 attack
Oct  8 17:54:10 h2022099 sshd[4858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.19.123  user=r.r
Oct  8 17:54:12 h2022099 sshd[4858]: Failed password for r.r from 212.64.19.123 port 51300 ssh2
Oct  8 17:54:12 h2022099 sshd[4858]: Received disconnect from 212.64.19.123: 11: Bye Bye [preauth]
Oct  8 18:14:50 h2022099 sshd[7936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.19.123  user=r.r
Oct  8 18:14:53 h2022099 sshd[7936]: Failed password for r.r from 212.64.19.123 port 48684 ssh2
Oct  8 18:14:55 h2022099 sshd[7936]: Received disconnect from 212.64.19.123: 11: Bye Bye [preauth]
Oct  8 18:20:33 h2022099 sshd[9127]: Connection closed by 212.64.19.123 [preauth]
Oct  8 18:26:09 h2022099 sshd[11529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.19.123  user=r.r
Oct  8 18:26:11 h2022099 sshd[11529]: Failed password for r.r fr........
-------------------------------
2019-10-11 18:09:17
141.98.10.55 attack
Oct 11 09:03:30 mail postfix/smtpd\[18464\]: warning: unknown\[141.98.10.55\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 11 09:27:43 mail postfix/smtpd\[19376\]: warning: unknown\[141.98.10.55\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 11 09:52:12 mail postfix/smtpd\[19891\]: warning: unknown\[141.98.10.55\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 11 10:41:03 mail postfix/smtpd\[21132\]: warning: unknown\[141.98.10.55\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-10-11 17:56:40
164.132.209.242 attackspambots
Oct 10 17:45:50 sachi sshd\[17130\]: Invalid user \#edc\$rfv%tgb from 164.132.209.242
Oct 10 17:45:50 sachi sshd\[17130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip242.ip-164-132-209.eu
Oct 10 17:45:52 sachi sshd\[17130\]: Failed password for invalid user \#edc\$rfv%tgb from 164.132.209.242 port 48122 ssh2
Oct 10 17:49:38 sachi sshd\[17451\]: Invalid user Man2017 from 164.132.209.242
Oct 10 17:49:38 sachi sshd\[17451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip242.ip-164-132-209.eu
2019-10-11 17:51:48
52.143.142.210 attack
Oct 11 10:44:40 meumeu sshd[25594]: Failed password for root from 52.143.142.210 port 54124 ssh2
Oct 11 10:49:12 meumeu sshd[26183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.143.142.210 
Oct 11 10:49:14 meumeu sshd[26183]: Failed password for invalid user 123 from 52.143.142.210 port 38928 ssh2
...
2019-10-11 18:20:14
140.249.196.49 attackspambots
Oct  8 17:23:54 linuxrulz sshd[15320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.196.49  user=r.r
Oct  8 17:23:56 linuxrulz sshd[15320]: Failed password for r.r from 140.249.196.49 port 35166 ssh2
Oct  8 17:23:56 linuxrulz sshd[15320]: Received disconnect from 140.249.196.49 port 35166:11: Bye Bye [preauth]
Oct  8 17:23:56 linuxrulz sshd[15320]: Disconnected from 140.249.196.49 port 35166 [preauth]
Oct  8 17:31:41 linuxrulz sshd[16567]: Connection closed by 140.249.196.49 port 44384 [preauth]
Oct  8 17:44:29 linuxrulz sshd[18014]: Connection closed by 140.249.196.49 port 51650 [preauth]
Oct  8 17:49:43 linuxrulz sshd[18721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.196.49  user=r.r
Oct  8 17:49:45 linuxrulz sshd[18721]: Failed password for r.r from 140.249.196.49 port 55278 ssh2
Oct  8 17:49:45 linuxrulz sshd[18721]: Received disconnect from 140.249.196.49 port 5........
-------------------------------
2019-10-11 18:02:52
180.76.174.87 attackspam
Oct 11 11:56:55 vps691689 sshd[18063]: Failed password for root from 180.76.174.87 port 4278 ssh2
Oct 11 11:57:00 vps691689 sshd[18063]: Failed password for root from 180.76.174.87 port 4278 ssh2
Oct 11 11:57:02 vps691689 sshd[18063]: Failed password for root from 180.76.174.87 port 4278 ssh2
...
2019-10-11 18:02:36
91.234.217.135 attackspam
Automated report (2019-10-11T03:49:10+00:00). Non-escaped characters in POST detected (bot indicator).
2019-10-11 18:10:58
91.211.246.250 attackbotsspam
Oct  9 03:34:30 nbi-636 sshd[4671]: User r.r from 91.211.246.250 not allowed because not listed in AllowUsers
Oct  9 03:34:30 nbi-636 sshd[4671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.211.246.250  user=r.r
Oct  9 03:34:32 nbi-636 sshd[4671]: Failed password for invalid user r.r from 91.211.246.250 port 55424 ssh2
Oct  9 03:34:32 nbi-636 sshd[4671]: Received disconnect from 91.211.246.250 port 55424:11: Bye Bye [preauth]
Oct  9 03:34:32 nbi-636 sshd[4671]: Disconnected from 91.211.246.250 port 55424 [preauth]
Oct  9 03:39:29 nbi-636 sshd[5418]: User r.r from 91.211.246.250 not allowed because not listed in AllowUsers
Oct  9 03:39:30 nbi-636 sshd[5418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.211.246.250  user=r.r
Oct  9 03:39:32 nbi-636 sshd[5418]: Failed password for invalid user r.r from 91.211.246.250 port 42838 ssh2
Oct  9 03:39:32 nbi-636 sshd[5418]: Received disc........
-------------------------------
2019-10-11 18:19:57
198.108.67.139 attackbotsspam
UTC: 2019-10-10 pkts: 2
ports(tcp): 22, 623
2019-10-11 17:39:36
192.241.249.19 attackspam
Oct 11 11:53:54 * sshd[16831]: Failed password for root from 192.241.249.19 port 41069 ssh2
2019-10-11 18:13:49
223.194.45.84 attackspam
2019-10-11T06:34:45.386846abusebot-7.cloudsearch.cf sshd\[3200\]: Invalid user Thierry123 from 223.194.45.84 port 51838
2019-10-11 17:54:58
50.28.105.21 attackspambots
abcdata-sys.de:80 50.28.105.21 - - \[11/Oct/2019:05:49:06 +0200\] "POST /xmlrpc.php HTTP/1.1" 301 441 "-" "Windows Live Writter"
www.goldgier.de 50.28.105.21 \[11/Oct/2019:05:49:07 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4484 "-" "Windows Live Writter"
2019-10-11 18:11:27
111.230.227.17 attackbots
Automatic report - Banned IP Access
2019-10-11 18:21:42
103.44.27.58 attackspam
2019-10-11T09:40:57.061307abusebot-5.cloudsearch.cf sshd\[8876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.44.27.58  user=root
2019-10-11 17:53:05
139.59.13.223 attackspam
Oct 11 03:37:45 localhost sshd\[11151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.13.223  user=root
Oct 11 03:37:47 localhost sshd\[11151\]: Failed password for root from 139.59.13.223 port 57812 ssh2
Oct 11 03:49:27 localhost sshd\[11359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.13.223  user=root
...
2019-10-11 17:59:58

最近上报的IP列表

1.175.139.112 1.175.139.201 1.175.139.203 1.175.139.21
1.175.139.231 1.175.139.24 1.175.139.50 1.175.139.65
1.175.139.77 1.175.139.9 1.175.139.96 1.175.14.174
1.175.140.100 1.175.140.12 1.175.140.122 1.175.140.141
1.175.140.155 1.175.140.168 1.175.140.182 1.175.140.203