必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.21.192.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39986
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.21.192.70.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 06:51:16 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
70.192.21.118.in-addr.arpa domain name pointer i118-21-192-70.s99.a049.ap.plala.or.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
70.192.21.118.in-addr.arpa	name = i118-21-192-70.s99.a049.ap.plala.or.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.145.78.66 attackspam
Oct 17 11:43:14 wbs sshd\[3132\]: Invalid user rajkot from 190.145.78.66
Oct 17 11:43:14 wbs sshd\[3132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.78.66
Oct 17 11:43:16 wbs sshd\[3132\]: Failed password for invalid user rajkot from 190.145.78.66 port 40904 ssh2
Oct 17 11:47:53 wbs sshd\[3513\]: Invalid user shao from 190.145.78.66
Oct 17 11:47:53 wbs sshd\[3513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.78.66
2019-10-18 05:59:54
115.159.237.70 attack
Oct 17 23:30:38 ns381471 sshd[13931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.237.70
Oct 17 23:30:40 ns381471 sshd[13931]: Failed password for invalid user postgres@1234 from 115.159.237.70 port 44232 ssh2
Oct 17 23:35:14 ns381471 sshd[14169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.237.70
2019-10-18 06:24:25
201.212.17.192 attackspambots
Jan 31 23:33:48 odroid64 sshd\[26909\]: Invalid user test from 201.212.17.192
Jan 31 23:33:48 odroid64 sshd\[26909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.212.17.192
Jan 31 23:33:50 odroid64 sshd\[26909\]: Failed password for invalid user test from 201.212.17.192 port 55422 ssh2
Feb  5 02:46:39 odroid64 sshd\[21485\]: Invalid user minecraft from 201.212.17.192
Feb  5 02:46:39 odroid64 sshd\[21485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.212.17.192
Feb  5 02:46:40 odroid64 sshd\[21485\]: Failed password for invalid user minecraft from 201.212.17.192 port 41316 ssh2
Feb 28 19:51:39 odroid64 sshd\[32080\]: Invalid user mou from 201.212.17.192
Feb 28 19:51:39 odroid64 sshd\[32080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.212.17.192
Feb 28 19:51:41 odroid64 sshd\[32080\]: Failed password for invalid user mou from 201.212.1
...
2019-10-18 05:58:36
178.242.57.245 attackspam
Automatic report - Port Scan Attack
2019-10-18 06:35:06
64.88.145.152 attack
Lines containing failures of 64.88.145.152
Oct 17 21:40:48 server01 postfix/smtpd[4735]: connect from emv13.ilifinousy.com[64.88.145.152]
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct 17 21:40:49 server01 postfix/smtpd[4735]: disconnect from emv13.ilifinousy.com[64.88.145.152]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=64.88.145.152
2019-10-18 06:36:17
201.20.119.226 attackbotsspam
Feb  8 10:47:47 odroid64 sshd\[12042\]: Invalid user admin from 201.20.119.226
Feb  8 10:47:47 odroid64 sshd\[12042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.20.119.226
Feb  8 10:47:49 odroid64 sshd\[12042\]: Failed password for invalid user admin from 201.20.119.226 port 39815 ssh2
...
2019-10-18 06:17:55
27.254.63.38 attackspambots
Oct 17 23:58:30 * sshd[28708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.63.38
Oct 17 23:58:31 * sshd[28708]: Failed password for invalid user ubuntu5 from 27.254.63.38 port 50642 ssh2
2019-10-18 06:12:52
23.94.46.192 attackspambots
SSH Brute-Force reported by Fail2Ban
2019-10-18 06:10:18
222.186.42.4 attackspam
Oct 17 19:31:49 firewall sshd[13494]: Failed password for root from 222.186.42.4 port 10982 ssh2
Oct 17 19:31:54 firewall sshd[13494]: Failed password for root from 222.186.42.4 port 10982 ssh2
Oct 17 19:31:58 firewall sshd[13494]: Failed password for root from 222.186.42.4 port 10982 ssh2
...
2019-10-18 06:32:56
201.20.73.195 attackbotsspam
Feb 28 17:14:31 odroid64 sshd\[24786\]: Invalid user tn from 201.20.73.195
Feb 28 17:14:31 odroid64 sshd\[24786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.20.73.195
Feb 28 17:14:34 odroid64 sshd\[24786\]: Failed password for invalid user tn from 201.20.73.195 port 45362 ssh2
Mar  9 17:35:01 odroid64 sshd\[18620\]: Invalid user miner from 201.20.73.195
Mar  9 17:35:01 odroid64 sshd\[18620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.20.73.195
Mar  9 17:35:03 odroid64 sshd\[18620\]: Failed password for invalid user miner from 201.20.73.195 port 36776 ssh2
Mar 15 15:06:00 odroid64 sshd\[7899\]: User root from 201.20.73.195 not allowed because not listed in AllowUsers
Mar 15 15:06:00 odroid64 sshd\[7899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.20.73.195  user=root
Mar 15 15:06:01 odroid64 sshd\[7899\]: Failed password for inval
...
2019-10-18 06:13:59
184.30.210.217 attackspam
10/17/2019-23:41:07.544742 184.30.210.217 Protocol: 6 SURICATA TLS invalid record/traffic
2019-10-18 06:02:50
201.203.21.241 attackspam
Feb 24 00:32:06 odroid64 sshd\[5964\]: Invalid user webadmin from 201.203.21.241
Feb 24 00:32:06 odroid64 sshd\[5964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.203.21.241
Feb 24 00:32:08 odroid64 sshd\[5964\]: Failed password for invalid user webadmin from 201.203.21.241 port 33678 ssh2
Mar  9 01:25:33 odroid64 sshd\[29061\]: Invalid user ann from 201.203.21.241
Mar  9 01:25:33 odroid64 sshd\[29061\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.203.21.241
Mar  9 01:25:35 odroid64 sshd\[29061\]: Failed password for invalid user ann from 201.203.21.241 port 42032 ssh2
...
2019-10-18 06:09:04
92.242.240.17 attack
Oct 17 21:50:47 vpn01 sshd[30484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.242.240.17
Oct 17 21:50:49 vpn01 sshd[30484]: Failed password for invalid user webdata from 92.242.240.17 port 51052 ssh2
...
2019-10-18 06:24:53
222.186.175.215 attackspambots
Oct 17 17:53:13 xtremcommunity sshd\[621718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215  user=root
Oct 17 17:53:15 xtremcommunity sshd\[621718\]: Failed password for root from 222.186.175.215 port 9130 ssh2
Oct 17 17:53:19 xtremcommunity sshd\[621718\]: Failed password for root from 222.186.175.215 port 9130 ssh2
Oct 17 17:53:24 xtremcommunity sshd\[621718\]: Failed password for root from 222.186.175.215 port 9130 ssh2
Oct 17 17:53:29 xtremcommunity sshd\[621718\]: Failed password for root from 222.186.175.215 port 9130 ssh2
...
2019-10-18 05:58:15
176.159.57.134 attack
Oct 17 11:46:00 sachi sshd\[26966\]: Invalid user sambaup from 176.159.57.134
Oct 17 11:46:00 sachi sshd\[26966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176-159-57-134.abo.bbox.fr
Oct 17 11:46:02 sachi sshd\[26966\]: Failed password for invalid user sambaup from 176.159.57.134 port 55328 ssh2
Oct 17 11:49:24 sachi sshd\[27206\]: Invalid user t from 176.159.57.134
Oct 17 11:49:24 sachi sshd\[27206\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176-159-57-134.abo.bbox.fr
2019-10-18 06:00:18

最近上报的IP列表

56.44.42.7 4.99.239.139 214.243.245.92 117.45.170.157
187.66.128.176 4.43.153.181 38.24.207.111 242.128.66.64
107.48.133.64 134.237.144.237 35.62.118.49 49.191.139.105
130.245.123.82 165.35.123.242 131.172.61.88 79.248.249.45
165.101.16.207 156.217.46.119 212.217.179.69 36.178.106.73