必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
116.52.118.253 attack
Unauthorized connection attempt detected from IP address 116.52.118.253 to port 4712 [T]
2020-04-15 02:07:01
116.52.118.52 attackbots
The IP has triggered Cloudflare WAF. CF-Ray: 5435ea1e4817eb19 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: doku.skk.moe | User-Agent: Mozilla/5.084743666 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36 Edge/17.17134 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 05:13:51
116.52.118.239 attack
The IP has triggered Cloudflare WAF. CF-Ray: 5413a39aae84e7ad | WAF_Rule_ID: 1112824 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: blog.skk.moe | User-Agent: Mozilla/5.0 (Linux; U; Android 4.3; en-us; SM-N900T Build/JSS15J) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 03:35:34
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.52.118.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19092
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.52.118.12.			IN	A

;; AUTHORITY SECTION:
.			537	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 16:22:37 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 12.118.52.116.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 116.52.118.12.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
161.35.19.176 attackspambots
161.35.19.176 - - [29/Aug/2020:19:52:31 +0200] "GET /wp-login.php HTTP/1.1" 200 8691 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
161.35.19.176 - - [29/Aug/2020:19:52:31 +0200] "POST /wp-login.php HTTP/1.1" 200 8921 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
161.35.19.176 - - [29/Aug/2020:19:52:32 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-30 01:57:38
222.186.169.192 attack
2020-08-29T20:42:36.666851afi-git.jinr.ru sshd[30103]: Failed password for root from 222.186.169.192 port 16756 ssh2
2020-08-29T20:42:39.825806afi-git.jinr.ru sshd[30103]: Failed password for root from 222.186.169.192 port 16756 ssh2
2020-08-29T20:42:43.536986afi-git.jinr.ru sshd[30103]: Failed password for root from 222.186.169.192 port 16756 ssh2
2020-08-29T20:42:43.537129afi-git.jinr.ru sshd[30103]: error: maximum authentication attempts exceeded for root from 222.186.169.192 port 16756 ssh2 [preauth]
2020-08-29T20:42:43.537142afi-git.jinr.ru sshd[30103]: Disconnecting: Too many authentication failures [preauth]
...
2020-08-30 01:54:42
5.178.181.231 attackbotsspam
1598702787 - 08/29/2020 14:06:27 Host: 5.178.181.231/5.178.181.231 Port: 445 TCP Blocked
2020-08-30 01:41:54
140.143.248.32 attackspam
2020-08-29T14:06:40+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-08-30 01:35:46
188.166.39.19 attackbots
Aug 29 14:28:50 plex-server sshd[440350]: Invalid user lukas from 188.166.39.19 port 54332
Aug 29 14:28:50 plex-server sshd[440350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.39.19 
Aug 29 14:28:50 plex-server sshd[440350]: Invalid user lukas from 188.166.39.19 port 54332
Aug 29 14:28:52 plex-server sshd[440350]: Failed password for invalid user lukas from 188.166.39.19 port 54332 ssh2
Aug 29 14:33:01 plex-server sshd[442121]: Invalid user beatriz from 188.166.39.19 port 36460
...
2020-08-30 01:49:51
184.105.247.194 attackbotsspam
 TCP (SYN) 184.105.247.194:33405 -> port 21, len 40
2020-08-30 01:46:19
132.147.77.150 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-30 01:17:52
103.39.216.123 attack
SSH brute force attempt
2020-08-30 01:41:01
119.28.238.101 attack
$f2bV_matches
2020-08-30 01:29:10
51.15.214.21 attackbotsspam
Aug 29 18:22:44 dhoomketu sshd[2746650]: Invalid user testuser from 51.15.214.21 port 34270
Aug 29 18:22:44 dhoomketu sshd[2746650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.214.21 
Aug 29 18:22:44 dhoomketu sshd[2746650]: Invalid user testuser from 51.15.214.21 port 34270
Aug 29 18:22:47 dhoomketu sshd[2746650]: Failed password for invalid user testuser from 51.15.214.21 port 34270 ssh2
Aug 29 18:26:18 dhoomketu sshd[2746787]: Invalid user yyk from 51.15.214.21 port 40890
...
2020-08-30 01:36:45
134.119.207.105 attack
Unwanted checking 80 or 443 port
...
2020-08-30 01:55:49
192.3.247.10 attackspambots
$f2bV_matches
2020-08-30 01:55:29
122.155.212.171 attackbotsspam
2020-08-29T07:04:51.233874server.mjenks.net sshd[965668]: Failed password for invalid user git from 122.155.212.171 port 53754 ssh2
2020-08-29T07:06:10.394528server.mjenks.net sshd[965791]: Invalid user magna from 122.155.212.171 port 46164
2020-08-29T07:06:10.397226server.mjenks.net sshd[965791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.212.171
2020-08-29T07:06:10.394528server.mjenks.net sshd[965791]: Invalid user magna from 122.155.212.171 port 46164
2020-08-29T07:06:12.638180server.mjenks.net sshd[965791]: Failed password for invalid user magna from 122.155.212.171 port 46164 ssh2
...
2020-08-30 01:49:24
173.44.175.182 attackbotsspam
2020-08-29 07:17:17.736195-0500  localhost smtpd[51227]: NOQUEUE: reject: RCPT from unknown[173.44.175.182]: 554 5.7.1 Service unavailable; Client host [173.44.175.182] blocked using zen.spamhaus.org; shCSS; from= to= proto=ESMTP helo=
2020-08-30 01:24:13
23.97.180.45 attackbots
Aug 29 15:40:29 electroncash sshd[56805]: Failed password for root from 23.97.180.45 port 39361 ssh2
Aug 29 15:44:38 electroncash sshd[57856]: Invalid user toby from 23.97.180.45 port 43104
Aug 29 15:44:38 electroncash sshd[57856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.97.180.45 
Aug 29 15:44:38 electroncash sshd[57856]: Invalid user toby from 23.97.180.45 port 43104
Aug 29 15:44:40 electroncash sshd[57856]: Failed password for invalid user toby from 23.97.180.45 port 43104 ssh2
...
2020-08-30 01:43:26

最近上报的IP列表

116.52.118.135 116.52.118.173 116.52.118.208 116.52.118.28
116.52.118.29 116.52.118.82 116.52.118.35 116.52.118.164
116.52.118.37 116.52.118.92 116.52.207.159 116.52.207.161
116.52.207.17 116.52.207.206 116.52.17.61 116.52.207.22
116.52.207.132 116.52.207.80 116.52.39.210 116.52.95.171