必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.117.49.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4116
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.117.49.21.			IN	A

;; AUTHORITY SECTION:
.			586	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030102 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 02 07:54:59 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 21.49.117.112.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 112.117.49.21.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
93.174.93.216 attackbotsspam
Apr 18 22:19:04 prod4 sshd\[27632\]: Address 93.174.93.216 maps to no-reverse-dns-configured.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Apr 18 22:19:04 prod4 sshd\[27632\]: Invalid user 111111 from 93.174.93.216
Apr 18 22:19:05 prod4 sshd\[27632\]: Failed password for invalid user 111111 from 93.174.93.216 port 52270 ssh2
...
2020-04-19 07:17:04
49.72.210.221 attackspam
Apr 19 01:14:25 meumeu sshd[26692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.72.210.221 
Apr 19 01:14:27 meumeu sshd[26692]: Failed password for invalid user bv from 49.72.210.221 port 53002 ssh2
Apr 19 01:22:54 meumeu sshd[27924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.72.210.221 
...
2020-04-19 07:28:34
142.4.16.20 attack
Invalid user wq from 142.4.16.20 port 30641
2020-04-19 07:19:22
141.255.220.157 attackbotsspam
SSH Invalid Login
2020-04-19 07:36:30
23.248.167.3 attackbotsspam
ICMP MH Probe, Scan /Distributed -
2020-04-19 07:09:02
162.243.133.168 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-04-19 07:09:19
120.188.79.128 attackbots
[Sun Apr 19 03:18:50.496911 2020] [:error] [pid 19632:tid 140407155414784] [client 120.188.79.128:46022] [client 120.188.79.128] ModSecurity: Access denied with code 403 (phase 4). Pattern match "^5\\\\d{2}$" at RESPONSE_STATUS. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/RESPONSE-950-DATA-LEAKAGES.conf"] [line "118"] [id "950100"] [msg "The Application Returned a 500-Level Status Code"] [data "Matched Data: 503 found within RESPONSE_STATUS: 503"] [severity "ERROR"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-disclosure"] [tag "WASCTC/WASC-13"] [tag "OWASP_TOP_10/A6"] [tag "PCI/6.5.6"] [tag "paranoia-level/2"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/index.php/prakiraan-iklim/prakiraan-musim/prakiraan-musim-kemarau/prakiraan-awal-musim-kemarau"] [unique_id "XptgqhYgdhWzbPQ8-ZAmjAAAAAE"], referer: https://www.google.com/
...
2020-04-19 07:34:36
162.243.133.185 attackbotsspam
Port scan: Attack repeated for 24 hours
2020-04-19 07:01:38
5.181.195.217 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-19 07:24:15
14.160.24.32 attackspam
Apr 18 23:24:38 h2829583 sshd[16992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.160.24.32
2020-04-19 07:06:38
132.232.49.143 attackbots
'Fail2Ban'
2020-04-19 07:16:03
162.243.133.13 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-04-19 07:15:20
85.105.36.139 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-19 07:27:38
140.143.150.8 attackspam
$f2bV_matches
2020-04-19 07:15:49
104.248.46.22 attackbots
SSH brutforce
2020-04-19 07:33:47

最近上报的IP列表

112.117.49.196 112.117.49.91 112.117.54.100 112.117.59.121
112.117.59.150 112.117.59.190 112.117.59.207 112.117.72.132
112.117.72.197 112.117.74.180 112.117.74.97 112.118.105.25
112.118.13.169 112.118.13.46 112.118.150.2 112.118.152.117
112.118.155.112 112.118.155.28 112.118.159.150 112.118.161.165