必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tokyo

省份(region): Tokyo

国家(country): Japan

运营商(isp): KDDI Corporation

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.156.21.98
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29757
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.156.21.98.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 08:20:00 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
98.21.156.118.in-addr.arpa domain name pointer KD118156021098.ppp-bb.dion.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
98.21.156.118.in-addr.arpa	name = KD118156021098.ppp-bb.dion.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
143.0.52.117 attackbots
2019-08-23 17:47:00,135 fail2ban.actions        [878]: NOTICE  [sshd] Ban 143.0.52.117
2019-08-23 20:52:01,668 fail2ban.actions        [878]: NOTICE  [sshd] Ban 143.0.52.117
2019-08-24 00:02:18,624 fail2ban.actions        [878]: NOTICE  [sshd] Ban 143.0.52.117
...
2019-10-03 13:09:29
116.254.102.161 attackspambots
445/tcp
[2019-10-03]1pkt
2019-10-03 13:06:25
171.244.0.81 attackbots
Invalid user oracle from 171.244.0.81 port 46723
2019-10-03 13:05:25
196.3.100.45 attack
2019-10-02 22:59:06 H=(wlan045.uem.mz) [196.3.100.45]:60880 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/query/ip/196.3.100.45)
2019-10-02 22:59:07 H=(wlan045.uem.mz) [196.3.100.45]:60880 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/query/ip/196.3.100.45)
2019-10-02 22:59:08 H=(wlan045.uem.mz) [196.3.100.45]:60880 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/query/ip/196.3.100.45)
...
2019-10-03 13:09:07
210.245.33.77 attackbotsspam
Sep 29 21:16:18 mail sshd[17602]: reveeclipse mapping checking getaddrinfo for 210-245-33-megaoff-static-ip.hcm.fpt.vn [210.245.33.77] failed - POSSIBLE BREAK-IN ATTEMPT!
Sep 29 21:16:20 mail sshd[17602]: Failed password for invalid user miroslav from 210.245.33.77 port 58963 ssh2
Sep 29 21:16:21 mail sshd[17602]: Received disconnect from 210.245.33.77: 11: Bye Bye [preauth]
Sep 29 21:29:45 mail sshd[17803]: reveeclipse mapping checking getaddrinfo for 210-245-33-megaoff-static-ip.hcm.fpt.vn [210.245.33.77] failed - POSSIBLE BREAK-IN ATTEMPT!


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=210.245.33.77
2019-10-03 12:55:52
183.2.247.74 attackspambots
60001/tcp 60001/tcp
[2019-09-15/10-03]3pkt
2019-10-03 13:43:58
14.153.53.255 attackbots
Automatic report - Port Scan Attack
2019-10-03 13:02:56
171.244.18.14 attackspambots
Oct  2 18:54:12 web9 sshd\[8750\]: Invalid user usuario1 from 171.244.18.14
Oct  2 18:54:12 web9 sshd\[8750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.18.14
Oct  2 18:54:14 web9 sshd\[8750\]: Failed password for invalid user usuario1 from 171.244.18.14 port 40542 ssh2
Oct  2 18:59:19 web9 sshd\[9545\]: Invalid user admin from 171.244.18.14
Oct  2 18:59:19 web9 sshd\[9545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.18.14
2019-10-03 13:03:54
142.93.151.152 attackbots
2019-09-20 21:20:54,536 fail2ban.actions        [800]: NOTICE  [sshd] Ban 142.93.151.152
2019-09-21 00:28:04,735 fail2ban.actions        [800]: NOTICE  [sshd] Ban 142.93.151.152
2019-09-21 03:32:25,381 fail2ban.actions        [800]: NOTICE  [sshd] Ban 142.93.151.152
...
2019-10-03 13:49:10
62.234.109.155 attack
Oct  3 07:14:26 vps01 sshd[2555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.109.155
Oct  3 07:14:29 vps01 sshd[2555]: Failed password for invalid user gking from 62.234.109.155 port 37438 ssh2
2019-10-03 13:24:56
110.4.72.34 attack
139/tcp 445/tcp
[2019-10-03]2pkt
2019-10-03 13:45:56
5.196.70.107 attack
Oct  3 05:38:29 web8 sshd\[32291\]: Invalid user sistemas from 5.196.70.107
Oct  3 05:38:29 web8 sshd\[32291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.70.107
Oct  3 05:38:31 web8 sshd\[32291\]: Failed password for invalid user sistemas from 5.196.70.107 port 42970 ssh2
Oct  3 05:42:56 web8 sshd\[2266\]: Invalid user temp from 5.196.70.107
Oct  3 05:42:56 web8 sshd\[2266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.70.107
2019-10-03 13:44:46
58.245.186.80 attackspambots
Unauthorised access (Oct  3) SRC=58.245.186.80 LEN=40 TTL=49 ID=16675 TCP DPT=8080 WINDOW=47803 SYN
2019-10-03 12:59:25
54.37.254.57 attackbots
Automatic report - Banned IP Access
2019-10-03 13:11:18
222.186.175.182 attackbots
Oct  3 07:43:43 srv206 sshd[28286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Oct  3 07:43:45 srv206 sshd[28286]: Failed password for root from 222.186.175.182 port 21110 ssh2
...
2019-10-03 13:47:36

最近上报的IP列表

89.37.85.13 2.198.234.100 174.213.190.198 14.158.26.80
206.209.128.252 6.104.164.1 192.87.39.204 137.189.1.168
195.193.195.0 167.173.92.161 37.143.127.27 108.55.95.117
100.23.218.59 243.193.109.25 154.182.246.161 232.232.149.126
86.186.224.54 203.2.173.159 145.70.94.247 86.88.154.15