必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.239.130.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15133
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.239.130.121.		IN	A

;; AUTHORITY SECTION:
.			27	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 05 03:16:30 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 121.130.239.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 121.130.239.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.29.160.194 attackspambots
Mar 20 14:05:31 sd-53420 sshd\[13172\]: Invalid user mm from 14.29.160.194
Mar 20 14:05:31 sd-53420 sshd\[13172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.160.194
Mar 20 14:05:32 sd-53420 sshd\[13172\]: Failed password for invalid user mm from 14.29.160.194 port 40822 ssh2
Mar 20 14:08:49 sd-53420 sshd\[14097\]: Invalid user ttttt from 14.29.160.194
Mar 20 14:08:49 sd-53420 sshd\[14097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.160.194
...
2020-03-21 02:49:42
209.211.200.38 attackspam
03/20/2020-09:36:14.892222 209.211.200.38 Protocol: 6 ET SCAN Potential SSH Scan
2020-03-21 02:12:06
51.75.202.218 attackbots
Invalid user prueba from 51.75.202.218 port 54984
2020-03-21 02:45:40
95.84.212.29 attackbots
leo_www
2020-03-21 02:08:39
200.54.11.243 attack
Port probing on unauthorized port 23
2020-03-21 02:09:22
109.61.2.166 attackspam
Sent mail to address hacked/leaked from Dailymotion
2020-03-21 02:15:57
178.62.107.141 attackbotsspam
Mar 20 19:08:54 legacy sshd[26519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.107.141
Mar 20 19:08:56 legacy sshd[26519]: Failed password for invalid user cosette from 178.62.107.141 port 52457 ssh2
Mar 20 19:13:05 legacy sshd[26617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.107.141
...
2020-03-21 02:15:01
164.177.42.33 attack
Mar 20 15:48:50 minden010 sshd[21012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.177.42.33
Mar 20 15:48:52 minden010 sshd[21012]: Failed password for invalid user etownsley from 164.177.42.33 port 57031 ssh2
Mar 20 15:53:44 minden010 sshd[22722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.177.42.33
...
2020-03-21 02:05:47
54.38.185.226 attackspambots
Mar 20 11:17:03 askasleikir sshd[74885]: Failed password for invalid user johnf from 54.38.185.226 port 52170 ssh2
2020-03-21 02:11:07
142.4.214.151 attack
2020-03-20T15:42:50.568007abusebot-8.cloudsearch.cf sshd[1339]: Invalid user guozp from 142.4.214.151 port 60344
2020-03-20T15:42:50.577544abusebot-8.cloudsearch.cf sshd[1339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns527892.ip-142-4-214.net
2020-03-20T15:42:50.568007abusebot-8.cloudsearch.cf sshd[1339]: Invalid user guozp from 142.4.214.151 port 60344
2020-03-20T15:42:52.966356abusebot-8.cloudsearch.cf sshd[1339]: Failed password for invalid user guozp from 142.4.214.151 port 60344 ssh2
2020-03-20T15:48:23.752581abusebot-8.cloudsearch.cf sshd[1797]: Invalid user kerry from 142.4.214.151 port 39054
2020-03-20T15:48:23.764233abusebot-8.cloudsearch.cf sshd[1797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns527892.ip-142-4-214.net
2020-03-20T15:48:23.752581abusebot-8.cloudsearch.cf sshd[1797]: Invalid user kerry from 142.4.214.151 port 39054
2020-03-20T15:48:25.535663abusebot-8.cloudsearch.cf ss
...
2020-03-21 02:36:18
107.170.57.221 attack
Mar 20 16:43:50 vps sshd[1306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.57.221 
Mar 20 16:43:53 vps sshd[1306]: Failed password for invalid user felix from 107.170.57.221 port 52094 ssh2
Mar 20 17:05:04 vps sshd[2681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.57.221 
...
2020-03-21 02:30:59
54.39.138.251 attack
5x Failed Password
2020-03-21 02:37:29
211.220.27.191 attackbots
Mar 20 19:11:59 localhost sshd\[28936\]: Invalid user dalia from 211.220.27.191 port 32850
Mar 20 19:11:59 localhost sshd\[28936\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.220.27.191
Mar 20 19:12:01 localhost sshd\[28936\]: Failed password for invalid user dalia from 211.220.27.191 port 32850 ssh2
2020-03-21 02:30:17
123.13.221.191 attackbotsspam
SIP/5060 Probe, BF, Hack -
2020-03-21 02:38:57
151.229.240.33 attackbots
ssh brute force
2020-03-21 02:25:09

最近上报的IP列表

114.239.127.91 115.216.57.241 114.239.132.121 114.239.132.122
114.239.132.131 114.239.132.139 114.239.132.152 114.239.132.158
114.239.132.204 114.239.132.247 114.239.132.25 114.239.132.254
114.239.132.38 114.239.132.42 115.216.57.244 114.239.132.53
114.239.132.62 114.239.132.68 114.239.140.136 114.239.140.23