必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.132.124.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51998
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.132.124.46.			IN	A

;; AUTHORITY SECTION:
.			196	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 11:58:15 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
46.124.132.112.in-addr.arpa domain name pointer 46.124.132.112.adsl-pool.ah.cnuninet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
46.124.132.112.in-addr.arpa	name = 46.124.132.112.adsl-pool.ah.cnuninet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
61.142.72.150 attack
proto=tcp  .  spt=58742  .  dpt=25  .     (listed on Blocklist de  Sep 22)     (541)
2019-09-24 04:23:53
31.135.182.92 attackspambots
Unauthorized connection attempt from IP address 31.135.182.92 on Port 445(SMB)
2019-09-24 04:52:31
188.165.210.176 attack
Sep 23 22:19:37 SilenceServices sshd[25157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.210.176
Sep 23 22:19:38 SilenceServices sshd[25157]: Failed password for invalid user minecraft from 188.165.210.176 port 41738 ssh2
Sep 23 22:23:11 SilenceServices sshd[26135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.210.176
2019-09-24 04:42:45
77.247.110.127 attackbotsspam
\[2019-09-23 16:24:24\] NOTICE\[2270\] chan_sip.c: Registration from '"1090" \' failed for '77.247.110.127:6086' - Wrong password
\[2019-09-23 16:24:24\] SECURITY\[2283\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-09-23T16:24:24.303-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="1090",SessionID="0x7fcd8d1544c8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.127/6086",Challenge="10d7c8a9",ReceivedChallenge="10d7c8a9",ReceivedHash="8fe586241ded352a518c37d07757f659"
\[2019-09-23 16:24:24\] NOTICE\[2270\] chan_sip.c: Registration from '"1090" \' failed for '77.247.110.127:6086' - Wrong password
\[2019-09-23 16:24:24\] SECURITY\[2283\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-09-23T16:24:24.400-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="1090",SessionID="0x7fcd8c57a408",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4
2019-09-24 04:51:43
1.170.82.41 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/1.170.82.41/ 
 TW - 1H : (2785)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 1.170.82.41 
 
 CIDR : 1.170.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 WYKRYTE ATAKI Z ASN3462 :  
  1H - 274 
  3H - 1110 
  6H - 2236 
 12H - 2688 
 24H - 2697 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-24 05:01:23
103.66.79.213 attackbotsspam
Unauthorized connection attempt from IP address 103.66.79.213 on Port 445(SMB)
2019-09-24 04:30:00
36.224.194.142 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/36.224.194.142/ 
 TW - 1H : (2786)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 36.224.194.142 
 
 CIDR : 36.224.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 WYKRYTE ATAKI Z ASN3462 :  
  1H - 273 
  3H - 1111 
  6H - 2237 
 12H - 2689 
 24H - 2698 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-24 04:56:29
194.190.54.247 attackbots
[portscan] Port scan
2019-09-24 04:45:02
134.17.145.104 attack
Unauthorized connection attempt from IP address 134.17.145.104 on Port 445(SMB)
2019-09-24 04:39:40
104.143.37.43 attack
Sep 23 15:24:05 hcbbdb sshd\[13243\]: Invalid user rails from 104.143.37.43
Sep 23 15:24:05 hcbbdb sshd\[13243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.143.37.43
Sep 23 15:24:06 hcbbdb sshd\[13243\]: Failed password for invalid user rails from 104.143.37.43 port 50554 ssh2
Sep 23 15:29:05 hcbbdb sshd\[13827\]: Invalid user musikbot from 104.143.37.43
Sep 23 15:29:05 hcbbdb sshd\[13827\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.143.37.43
2019-09-24 04:50:50
77.204.76.91 attack
Sep 23 14:00:21 XXX sshd[40913]: Invalid user ftptest from 77.204.76.91 port 54211
2019-09-24 04:42:31
98.156.148.239 attackbotsspam
Sep 23 16:54:10 server sshd\[14405\]: Invalid user atul from 98.156.148.239 port 52156
Sep 23 16:54:10 server sshd\[14405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.156.148.239
Sep 23 16:54:12 server sshd\[14405\]: Failed password for invalid user atul from 98.156.148.239 port 52156 ssh2
Sep 23 16:58:21 server sshd\[28782\]: Invalid user nagesh from 98.156.148.239 port 37534
Sep 23 16:58:21 server sshd\[28782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.156.148.239
2019-09-24 04:38:06
62.138.1.123 attack
ssh intrusion attempt
2019-09-24 04:26:30
92.247.201.112 attack
Sep 23 13:17:49 mail postfix/postscreen[11383]: PREGREET 36 after 0.84 from [92.247.201.112]:41268: EHLO 92-247-201-112.spectrumnet.bg

...
2019-09-24 04:47:56
185.52.2.165 attackbotsspam
Attempted WordPress login: "GET /wp-login.php"
2019-09-24 04:34:32

最近上报的IP列表

112.13.67.100 112.121.182.166 112.132.124.77 112.132.123.25
112.132.123.217 112.132.124.79 112.132.124.95 112.132.125.125
112.132.125.115 112.132.125.167 112.132.125.28 112.132.125.82
112.132.125.178 112.132.145.160 112.133.203.142 112.132.125.14
112.133.177.83 112.132.125.176 213.55.71.228 112.133.214.74