必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
118.99.94.96 attack
Brute Force
2020-08-28 17:35:36
118.99.94.67 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-07-28 04:21:05
118.99.94.35 attackspam
Unauthorized connection attempt from IP address 118.99.94.35 on Port 445(SMB)
2020-07-01 13:51:26
118.99.94.85 attack
1586231646 - 04/07/2020 05:54:06 Host: 118.99.94.85/118.99.94.85 Port: 445 TCP Blocked
2020-04-07 13:11:24
118.99.94.219 attackspam
Invalid user sniffer from 118.99.94.219 port 26288
2020-04-04 03:49:45
118.99.94.196 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-10 13:32:30
118.99.94.24 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-07-06 15:08:17
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.99.94.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31943
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.99.94.212.			IN	A

;; AUTHORITY SECTION:
.			267	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 17:44:43 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 212.94.99.118.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 212.94.99.118.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
50.192.28.157 attackbotsspam
lfd: (smtpauth) Failed SMTP AUTH login from 50.192.28.157 (US/United States/50-192-28-157-static.hfc.comcastbusiness.net): 5 in the last 3600 secs - Sun Jun 17 23:58:46 2018
2020-02-07 06:22:43
114.67.225.210 attack
Feb  6 22:44:41 server sshd[49448]: Failed password for invalid user npo from 114.67.225.210 port 42619 ssh2
Feb  6 23:02:49 server sshd[49738]: Failed password for invalid user htx from 114.67.225.210 port 56732 ssh2
Feb  6 23:05:47 server sshd[49766]: Failed password for invalid user nyj from 114.67.225.210 port 39667 ssh2
2020-02-07 06:19:32
77.69.231.3 attackspambots
lfd: (smtpauth) Failed SMTP AUTH login from 77.69.231.3 (BH/Bahrain/-): 5 in the last 3600 secs - Sun Apr 22 18:52:23 2018
2020-02-07 06:52:16
115.204.29.207 attackspam
lfd: (smtpauth) Failed SMTP AUTH login from 115.204.29.207 (CN/China/-): 5 in the last 3600 secs - Fri May 25 19:31:42 2018
2020-02-07 06:27:54
104.248.71.7 attack
2020-02-06T23:07:20.163761  sshd[12421]: Invalid user bgw from 104.248.71.7 port 34904
2020-02-06T23:07:20.179668  sshd[12421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.71.7
2020-02-06T23:07:20.163761  sshd[12421]: Invalid user bgw from 104.248.71.7 port 34904
2020-02-06T23:07:22.755509  sshd[12421]: Failed password for invalid user bgw from 104.248.71.7 port 34904 ssh2
2020-02-06T23:25:51.671667  sshd[13134]: Invalid user qhw from 104.248.71.7 port 57496
...
2020-02-07 06:32:29
177.22.92.28 attackspambots
lfd: (smtpauth) Failed SMTP AUTH login from 177.22.92.28 (BR/Brazil/177-22-92-28.triway.net.br): 5 in the last 3600 secs - Thu May  3 16:39:58 2018
2020-02-07 06:45:53
49.234.12.123 attack
Feb  6 21:35:05 game-panel sshd[21350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.12.123
Feb  6 21:35:07 game-panel sshd[21350]: Failed password for invalid user pig from 49.234.12.123 port 55104 ssh2
Feb  6 21:36:56 game-panel sshd[21417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.12.123
2020-02-07 06:24:11
51.254.141.18 attack
$f2bV_matches
2020-02-07 06:33:21
14.187.139.166 attackspambots
lfd: (smtpauth) Failed SMTP AUTH login from 14.187.139.166 (VN/Vietnam/static.vnpt.vn): 5 in the last 3600 secs - Tue Apr 17 11:51:11 2018
2020-02-07 06:54:38
49.88.112.65 attackspambots
Feb  6 12:17:33 hanapaa sshd\[28742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
Feb  6 12:17:35 hanapaa sshd\[28742\]: Failed password for root from 49.88.112.65 port 35985 ssh2
Feb  6 12:18:33 hanapaa sshd\[28814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
Feb  6 12:18:35 hanapaa sshd\[28814\]: Failed password for root from 49.88.112.65 port 28161 ssh2
Feb  6 12:18:37 hanapaa sshd\[28814\]: Failed password for root from 49.88.112.65 port 28161 ssh2
2020-02-07 06:37:49
125.118.77.241 attackspam
lfd: (smtpauth) Failed SMTP AUTH login from 125.118.77.241 (CN/China/-): 5 in the last 3600 secs - Fri May 25 19:27:44 2018
2020-02-07 06:28:37
164.39.10.153 attack
lfd: (smtpauth) Failed SMTP AUTH login from 164.39.10.153 (GB/United Kingdom/no-reverse-dns.metronet-uk.com): 5 in the last 3600 secs - Sat Apr 28 11:41:57 2018
2020-02-07 06:47:41
177.44.26.230 attackspambots
lfd: (smtpauth) Failed SMTP AUTH login from 177.44.26.230 (BR/Brazil/177-44-26-230.vga-wr.mastercabo.com.br): 5 in the last 3600 secs - Tue Jun 19 17:14:38 2018
2020-02-07 06:21:48
183.89.212.76 attack
2020-02-0620:54:201iznEB-0004WB-Vl\<=info@whatsup2013.chH=hrw-35-132.ideay.net.ni\(localhost\)[186.1.35.132]:43642P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2124id=AAAF194A4195BB08D4D19820D4166C44@whatsup2013.chT="Iwantsomethingbeautiful"fordavidparziale65@gmail.com2020-02-0620:53:551iznDm-0004VU-Q5\<=info@whatsup2013.chH=\(localhost\)[123.24.5.233]:42064P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2081id=6F6ADC8F84507ECD11145DE511ED1113@whatsup2013.chT="lonelinessisnothappy"forsanchez.bryanlee2018@gmail.com2020-02-0620:55:231iznFC-0004YG-Nn\<=info@whatsup2013.chH=\(localhost\)[41.40.7.41]:48080P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2251id=E1E452010ADEF0439F9AD36B9FF7D545@whatsup2013.chT="Iwantsomethingbeautiful"forblackraven2786@gmail.com2020-02-0620:54:511iznEg-0004X3-VL\<=info@whatsup2013.chH=\(localhost\)[183.89.212.76]:33694P=esmtpsaX=TLSv1.2:ECDHE-RSA
2020-02-07 06:21:30
41.100.137.109 attackspambots
lfd: (smtpauth) Failed SMTP AUTH login from 41.100.137.109 (DZ/Algeria/-): 5 in the last 3600 secs - Fri Jun 15 08:28:24 2018
2020-02-07 06:24:26

最近上报的IP列表

118.99.94.204 116.202.12.61 118.99.94.217 118.99.94.218
118.99.94.220 118.99.94.223 118.99.94.224 118.99.94.226
118.99.94.229 118.99.94.232 118.99.94.23 118.99.94.240
118.99.94.238 118.99.94.234 118.99.94.242 118.99.94.246
116.202.122.108 118.99.94.248 118.99.94.245 118.99.94.25