必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
118.81.119.21 attackbotsspam
 TCP (SYN) 118.81.119.21:59907 -> port 23, len 44
2020-06-13 08:17:48
118.81.11.197 attackbotsspam
Web Server Scan. RayID: 58d5feac8d54053c, UA: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.90 Safari/537.36, Country: CN
2020-05-21 03:27:18
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.81.11.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63974
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.81.11.99.			IN	A

;; AUTHORITY SECTION:
.			299	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 17:28:01 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
99.11.81.118.in-addr.arpa domain name pointer 99.11.81.118.adsl-pool.sx.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.11.81.118.in-addr.arpa	name = 99.11.81.118.adsl-pool.sx.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
184.105.139.126 attackbots
Oct 29 05:18:59 mercury kernel: [UFW ALLOW] IN=eth0 OUT= MAC=f2:3c:91:bc:4d:f8:84:78:ac:0d:8f:41:08:00 SRC=184.105.139.126 DST=109.74.200.221 LEN=40 TOS=0x00 PREC=0x00 TTL=57 ID=33221 DF PROTO=UDP SPT=34260 DPT=123 LEN=20 
...
2019-11-15 04:28:52
49.88.112.71 attack
2019-11-14T20:28:50.342344shield sshd\[16001\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.71  user=root
2019-11-14T20:28:52.169347shield sshd\[16001\]: Failed password for root from 49.88.112.71 port 21014 ssh2
2019-11-14T20:28:54.172188shield sshd\[16001\]: Failed password for root from 49.88.112.71 port 21014 ssh2
2019-11-14T20:28:56.120631shield sshd\[16001\]: Failed password for root from 49.88.112.71 port 21014 ssh2
2019-11-14T20:29:25.511200shield sshd\[16059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.71  user=root
2019-11-15 04:36:58
54.39.147.2 attack
Nov 14 18:13:32 SilenceServices sshd[26287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.147.2
Nov 14 18:13:35 SilenceServices sshd[26287]: Failed password for invalid user trela from 54.39.147.2 port 59160 ssh2
Nov 14 18:17:35 SilenceServices sshd[29235]: Failed password for www-data from 54.39.147.2 port 49863 ssh2
2019-11-15 04:50:02
113.114.32.112 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/113.114.32.112/ 
 
 CN - 1H : (1218)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4134 
 
 IP : 113.114.32.112 
 
 CIDR : 113.114.0.0/15 
 
 PREFIX COUNT : 5430 
 
 UNIQUE IP COUNT : 106919680 
 
 
 ATTACKS DETECTED ASN4134 :  
  1H - 18 
  3H - 85 
  6H - 155 
 12H - 311 
 24H - 569 
 
 DateTime : 2019-11-14 15:32:55 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-15 04:37:58
159.65.2.171 attackbots
Nov 12 21:15:10 srv sshd[17563]: Invalid user medisinsk from 159.65.2.171
Nov 12 21:15:10 srv sshd[17563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.2.171 
Nov 12 21:15:12 srv sshd[17563]: Failed password for invalid user medisinsk from 159.65.2.171 port 40096 ssh2
Nov 12 21:38:58 srv sshd[21929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.2.171  user=r.r
Nov 12 21:39:00 srv sshd[21929]: Failed password for r.r from 159.65.2.171 port 35246 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=159.65.2.171
2019-11-15 04:24:00
45.2.254.52 attackspambots
scan z
2019-11-15 04:54:32
134.209.197.58 attackbotsspam
Nov 13 12:51:59 sanyalnet-cloud-vps4 sshd[17623]: Connection from 134.209.197.58 port 58144 on 64.137.160.124 port 23
Nov 13 12:52:00 sanyalnet-cloud-vps4 sshd[17623]: User r.r from 134.209.197.58 not allowed because not listed in AllowUsers
Nov 13 12:52:00 sanyalnet-cloud-vps4 sshd[17623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.197.58  user=r.r
Nov 13 12:52:01 sanyalnet-cloud-vps4 sshd[17623]: Failed password for invalid user r.r from 134.209.197.58 port 58144 ssh2
Nov 13 12:52:01 sanyalnet-cloud-vps4 sshd[17623]: Received disconnect from 134.209.197.58: 11: Bye Bye [preauth]
Nov 13 13:00:19 sanyalnet-cloud-vps4 sshd[17729]: Connection from 134.209.197.58 port 36682 on 64.137.160.124 port 23
Nov 13 13:00:19 sanyalnet-cloud-vps4 sshd[17729]: Invalid user * from 134.209.197.58
Nov 13 13:00:19 sanyalnet-cloud-vps4 sshd[17729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13........
-------------------------------
2019-11-15 04:17:05
106.52.24.215 attackspam
Automatic report - Banned IP Access
2019-11-15 04:47:07
112.47.92.116 attackspam
Bad crawling causing excessive 404 errors
2019-11-15 04:26:44
180.180.171.6 attackbots
" "
2019-11-15 04:29:55
157.107.103.112 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/157.107.103.112/ 
 
 JP - 1H : (31)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : JP 
 NAME ASN : ASN4685 
 
 IP : 157.107.103.112 
 
 CIDR : 157.107.0.0/16 
 
 PREFIX COUNT : 34 
 
 UNIQUE IP COUNT : 905216 
 
 
 ATTACKS DETECTED ASN4685 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-14 15:33:26 
 
 INFO : Port SSH 22 Scan Detected and Blocked by ADMIN  - data recovery
2019-11-15 04:17:55
93.174.93.68 attackbots
93.174.93.68 was recorded 9 times by 1 hosts attempting to connect to the following ports: 15105,15117,15118,15104,15112,15111,15115,15101,15103. Incident counter (4h, 24h, all-time): 9, 906, 6929
2019-11-15 04:22:29
45.40.194.129 attackspambots
Nov 14 17:24:33 vps01 sshd[12600]: Failed password for root from 45.40.194.129 port 32768 ssh2
2019-11-15 04:34:55
116.248.41.55 attackbotsspam
ILLEGAL ACCESS imap
2019-11-15 04:48:07
175.180.247.147 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-11-15 04:20:02

最近上报的IP列表

118.81.11.212 118.81.11.124 115.63.187.66 118.81.11.31
118.81.12.208 118.81.12.236 118.81.12.241 118.81.12.72
118.81.12.224 118.81.124.111 115.63.21.82 118.81.12.9
118.81.13.186 118.81.12.34 118.81.13.223 118.81.129.224
118.81.13.234 118.81.13.100 118.81.13.245 118.81.13.39