必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
117.94.21.34 attackspambots
srvr2: (mod_security) mod_security (id:920350) triggered by 117.94.21.34 (CN/-/-): 1 in the last 600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/08/22 14:13:27 [error] 861202#0: *905407 [client 117.94.21.34] ModSecurity: Access denied with code 406 (phase 2). Matched "Operator `Rx' with parameter `^[\d.:]+$' against variable `REQUEST_HEADERS:Host'  [redacted] [file "/etc/modsecurity.d/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "718"] [id "920350"] [rev ""] [msg "Host header is a numeric IP address"] [redacted] [severity "4"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [redacted] [uri "/phpmyadmin/"] [unique_id "159809840790.964652"] [ref "o0,11v155,11"], client: 117.94.21.34, [redacted] request: "GET /phpmyadmin/ HTTP/1.1" [redacted]
2020-08-22 23:22:18
117.94.217.40 attackspambots
Honeypot attack, port: 5555, PTR: PTR record not found
2020-03-31 00:10:38
117.94.213.87 attackbots
Unauthorized connection attempt detected from IP address 117.94.213.87 to port 6656 [T]
2020-01-30 18:29:04
117.94.215.171 attackbotsspam
Unauthorized connection attempt detected from IP address 117.94.215.171 to port 6656 [T]
2020-01-30 17:27:02
117.94.213.93 attack
Unauthorized connection attempt detected from IP address 117.94.213.93 to port 6656 [T]
2020-01-30 16:59:00
117.94.215.167 attack
Unauthorized connection attempt detected from IP address 117.94.215.167 to port 6656 [T]
2020-01-30 14:44:07
117.94.215.170 attackspam
Unauthorized connection attempt detected from IP address 117.94.215.170 to port 6656 [T]
2020-01-30 14:16:03
117.94.214.121 attack
Unauthorized connection attempt detected from IP address 117.94.214.121 to port 6656 [T]
2020-01-29 19:26:59
117.94.215.164 attack
Unauthorized connection attempt detected from IP address 117.94.215.164 to port 6656 [T]
2020-01-29 19:03:36
117.94.214.235 attack
Unauthorized connection attempt detected from IP address 117.94.214.235 to port 6656 [T]
2020-01-29 17:02:22
117.94.214.64 attackbots
Unauthorized connection attempt detected from IP address 117.94.214.64 to port 6656 [T]
2020-01-27 06:16:18
117.94.214.152 attackbotsspam
Unauthorized connection attempt detected from IP address 117.94.214.152 to port 6656 [T]
2020-01-27 05:55:39
117.94.218.211 attackspam
Lines containing failures of 117.94.218.211
Nov  2 04:13:54 *** sshd[74751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.94.218.211  user=r.r
Nov  2 04:13:55 *** sshd[74751]: Failed password for r.r from 117.94.218.211 port 1486 ssh2
Nov  2 04:14:01 *** sshd[74751]: message repeated 3 serveres: [ Failed password for r.r from 117.94.218.211 port 1486 ssh2]
Nov  2 04:14:03 *** sshd[74751]: Failed password for r.r from 117.94.218.211 port 1486 ssh2
Nov  2 04:14:03 *** sshd[74751]: Connection reset by authenticating user r.r 117.94.218.211 port 1486 [preauth]
Nov  2 04:14:03 *** sshd[74751]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.94.218.211  user=r.r
Nov  2 04:14:05 *** sshd[74760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.94.218.211  user=r.r
Nov  2 04:14:06 *** sshd[74760]: Failed password for r.r from 117.94.218.211 port 2305 ssh2
........
------------------------------
2019-11-02 13:58:36
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.94.21.24
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.94.21.24.			IN	A

;; AUTHORITY SECTION:
.			527	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 23:22:40 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 24.21.94.117.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 24.21.94.117.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
43.225.151.142 attack
Nov 17 15:29:59 ns382633 sshd\[25994\]: Invalid user refunds from 43.225.151.142 port 53773
Nov 17 15:29:59 ns382633 sshd\[25994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.225.151.142
Nov 17 15:30:01 ns382633 sshd\[25994\]: Failed password for invalid user refunds from 43.225.151.142 port 53773 ssh2
Nov 17 15:36:35 ns382633 sshd\[27560\]: Invalid user allah from 43.225.151.142 port 49525
Nov 17 15:36:35 ns382633 sshd\[27560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.225.151.142
2019-11-18 05:10:24
47.190.18.35 attackspambots
2019-11-17T14:37:36.504385hub.schaetter.us sshd\[2911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.190.18.35  user=root
2019-11-17T14:37:38.456335hub.schaetter.us sshd\[2913\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.190.18.35  user=root
2019-11-17T14:37:38.882459hub.schaetter.us sshd\[2911\]: Failed password for root from 47.190.18.35 port 47604 ssh2
2019-11-17T14:37:39.082835hub.schaetter.us sshd\[2915\]: Invalid user DUP from 47.190.18.35 port 48324
2019-11-17T14:37:39.092277hub.schaetter.us sshd\[2915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.190.18.35
...
2019-11-18 04:44:19
45.181.38.180 attack
Telnet/23 MH Probe, BF, Hack -
2019-11-18 04:51:24
14.215.165.131 attack
Nov 17 14:36:57 *** sshd[28812]: Invalid user ftp from 14.215.165.131
2019-11-18 05:02:05
118.27.9.229 attackspam
Invalid user lauritz from 118.27.9.229 port 50682
2019-11-18 05:07:41
45.55.182.232 attack
Nov 17 06:43:42 eddieflores sshd\[29705\]: Invalid user fx from 45.55.182.232
Nov 17 06:43:42 eddieflores sshd\[29705\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=www.koan.co.nz
Nov 17 06:43:44 eddieflores sshd\[29705\]: Failed password for invalid user fx from 45.55.182.232 port 54650 ssh2
Nov 17 06:46:58 eddieflores sshd\[29930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=www.koan.co.nz  user=root
Nov 17 06:47:00 eddieflores sshd\[29930\]: Failed password for root from 45.55.182.232 port 34358 ssh2
2019-11-18 05:11:34
51.38.186.244 attackbotsspam
Nov 17 11:53:58 ny01 sshd[29167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.244
Nov 17 11:53:59 ny01 sshd[29167]: Failed password for invalid user galea from 51.38.186.244 port 53550 ssh2
Nov 17 11:57:41 ny01 sshd[29860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.244
2019-11-18 05:09:15
202.191.200.227 attack
Nov 17 18:49:29 legacy sshd[24045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.191.200.227
Nov 17 18:49:30 legacy sshd[24045]: Failed password for invalid user disen from 202.191.200.227 port 36609 ssh2
Nov 17 18:53:54 legacy sshd[24131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.191.200.227
...
2019-11-18 04:36:47
118.89.35.251 attackbots
Nov 17 06:04:20 hpm sshd\[9129\]: Invalid user angel from 118.89.35.251
Nov 17 06:04:20 hpm sshd\[9129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.35.251
Nov 17 06:04:22 hpm sshd\[9129\]: Failed password for invalid user angel from 118.89.35.251 port 35742 ssh2
Nov 17 06:08:39 hpm sshd\[9477\]: Invalid user lukshun from 118.89.35.251
Nov 17 06:08:39 hpm sshd\[9477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.35.251
2019-11-18 04:56:39
210.72.24.20 attackbotsspam
Nov 17 18:26:44 dedicated sshd[20486]: Invalid user best from 210.72.24.20 port 42046
2019-11-18 04:39:37
190.107.240.237 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2019-11-18 04:36:18
187.49.84.61 attackspambots
Telnet/23 MH Probe, BF, Hack -
2019-11-18 04:40:17
139.59.4.63 attack
Nov 17 15:59:53 localhost sshd\[1047\]: Invalid user adfelipe from 139.59.4.63 port 57131
Nov 17 15:59:53 localhost sshd\[1047\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.4.63
Nov 17 15:59:55 localhost sshd\[1047\]: Failed password for invalid user adfelipe from 139.59.4.63 port 57131 ssh2
Nov 17 16:04:16 localhost sshd\[1154\]: Invalid user yaakob from 139.59.4.63 port 47371
Nov 17 16:04:16 localhost sshd\[1154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.4.63
...
2019-11-18 04:42:04
167.179.112.205 attack
[munged]::443 167.179.112.205 - - [17/Nov/2019:21:25:51 +0100] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 167.179.112.205 - - [17/Nov/2019:21:25:53 +0100] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 167.179.112.205 - - [17/Nov/2019:21:25:53 +0100] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 167.179.112.205 - - [17/Nov/2019:21:25:56 +0100] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 167.179.112.205 - - [17/Nov/2019:21:25:56 +0100] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 167.179.112.205 - - [17/Nov/2019:21:25:59 +0100] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.
2019-11-18 05:11:18
42.225.232.234 attackspambots
scan z
2019-11-18 05:11:53

最近上报的IP列表

117.94.21.71 114.235.23.140 117.94.21.16 114.235.23.144
114.235.23.146 114.235.23.148 114.235.23.149 114.235.23.150
117.94.222.75 117.94.222.80 117.94.222.82 117.94.222.98
117.94.222.94 117.94.222.93 117.94.222.84 117.94.222.88
117.94.222.66 114.235.23.154 117.94.223.195 117.94.223.251