必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Taiwan, China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.124.204.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8488
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.124.204.4.			IN	A

;; AUTHORITY SECTION:
.			313	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051200 1800 900 604800 86400

;; Query time: 78 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 12 17:50:48 CST 2023
;; MSG SIZE  rcvd: 106
HOST信息:
4.204.124.120.in-addr.arpa domain name pointer ns2.knu.edu.tw.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
4.204.124.120.in-addr.arpa	name = ns2.knu.edu.tw.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
192.254.99.49 attackbots
3389BruteforceFW21
2019-06-21 18:53:04
189.115.41.172 attackspambots
Jun 18 21:38:24 www sshd[10721]: reveeclipse mapping checking getaddrinfo for 189.115.41.172.static.gvt.net.br [189.115.41.172] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 18 21:38:24 www sshd[10721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.115.41.172  user=r.r
Jun 18 21:38:26 www sshd[10721]: Failed password for r.r from 189.115.41.172 port 26043 ssh2
Jun 18 21:38:26 www sshd[10721]: Received disconnect from 189.115.41.172: 11: Bye Bye [preauth]
Jun 18 21:43:43 www sshd[10921]: reveeclipse mapping checking getaddrinfo for 189.115.41.172.static.gvt.net.br [189.115.41.172] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 18 21:43:43 www sshd[10921]: Invalid user tubenetwork from 189.115.41.172
Jun 18 21:43:43 www sshd[10921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.115.41.172 
Jun 18 21:43:45 www sshd[10921]: Failed password for invalid user tubenetwork from 189.115.41.172 port 361........
-------------------------------
2019-06-21 18:47:53
114.249.219.95 attackbotsspam
Jun 21 11:20:11 myhostname sshd[28965]: Invalid user tun from 114.249.219.95
Jun 21 11:20:11 myhostname sshd[28965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.249.219.95
Jun 21 11:20:13 myhostname sshd[28965]: Failed password for invalid user tun from 114.249.219.95 port 38656 ssh2
Jun 21 11:20:13 myhostname sshd[28965]: Received disconnect from 114.249.219.95 port 38656:11: Bye Bye [preauth]
Jun 21 11:20:13 myhostname sshd[28965]: Disconnected from 114.249.219.95 port 38656 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=114.249.219.95
2019-06-21 18:37:54
178.33.233.54 attackspambots
Jun 21 05:22:16 Tower sshd[1950]: Connection from 178.33.233.54 port 34902 on 192.168.10.220 port 22
Jun 21 05:22:17 Tower sshd[1950]: Invalid user wai from 178.33.233.54 port 34902
Jun 21 05:22:17 Tower sshd[1950]: error: Could not get shadow information for NOUSER
Jun 21 05:22:17 Tower sshd[1950]: Failed password for invalid user wai from 178.33.233.54 port 34902 ssh2
Jun 21 05:22:17 Tower sshd[1950]: Received disconnect from 178.33.233.54 port 34902:11: Bye Bye [preauth]
Jun 21 05:22:17 Tower sshd[1950]: Disconnected from invalid user wai 178.33.233.54 port 34902 [preauth]
2019-06-21 18:46:52
192.236.179.222 attackspambots
Lines containing failures of 192.236.179.222


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=192.236.179.222
2019-06-21 19:01:15
46.21.100.222 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-21 18:35:12
177.20.180.26 attack
Brute force attempt
2019-06-21 19:17:41
95.6.77.61 attackbotsspam
Unauthorised access (Jun 21) SRC=95.6.77.61 LEN=44 TTL=241 ID=12781 TCP DPT=139 WINDOW=1024 SYN 
Unauthorised access (Jun 20) SRC=95.6.77.61 LEN=44 TTL=241 ID=39488 TCP DPT=139 WINDOW=1024 SYN 
Unauthorised access (Jun 19) SRC=95.6.77.61 LEN=44 TTL=240 ID=61059 TCP DPT=139 WINDOW=1024 SYN 
Unauthorised access (Jun 18) SRC=95.6.77.61 LEN=44 TTL=240 ID=12984 TCP DPT=139 WINDOW=1024 SYN 
Unauthorised access (Jun 16) SRC=95.6.77.61 LEN=44 TTL=241 ID=47505 TCP DPT=139 WINDOW=1024 SYN
2019-06-21 19:18:41
103.99.113.89 attackspambots
Jun 21 11:23:24 vps65 sshd\[24819\]: Invalid user test from 103.99.113.89 port 33490
Jun 21 11:23:24 vps65 sshd\[24819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.99.113.89
...
2019-06-21 18:32:05
200.85.46.6 attackbotsspam
Jun 21 11:52:32 vps65 postfix/smtpd\[24952\]: warning: unknown\[200.85.46.6\]: SASL LOGIN authentication failed: authentication failure
Jun 21 11:52:35 vps65 postfix/smtpd\[24952\]: warning: unknown\[200.85.46.6\]: SASL LOGIN authentication failed: authentication failure
Jun 21 11:52:39 vps65 postfix/smtpd\[24952\]: warning: unknown\[200.85.46.6\]: SASL LOGIN authentication failed: authentication failure
...
2019-06-21 18:29:00
90.101.42.162 attackspambots
20 attempts against mh-ssh on grass.magehost.pro
2019-06-21 18:50:00
203.195.243.146 attackspam
Jun 21 12:23:05 localhost sshd\[14865\]: Invalid user shen from 203.195.243.146 port 41764
Jun 21 12:23:05 localhost sshd\[14865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.243.146
Jun 21 12:23:07 localhost sshd\[14865\]: Failed password for invalid user shen from 203.195.243.146 port 41764 ssh2
2019-06-21 18:37:28
41.47.104.100 attack
Jun 21 12:21:23 srv-4 sshd\[10413\]: Invalid user admin from 41.47.104.100
Jun 21 12:21:23 srv-4 sshd\[10413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.47.104.100
Jun 21 12:21:24 srv-4 sshd\[10413\]: Failed password for invalid user admin from 41.47.104.100 port 50292 ssh2
...
2019-06-21 19:12:28
218.26.163.125 attackbotsspam
Autoban   218.26.163.125 ABORTED AUTH
2019-06-21 18:38:56
196.52.43.123 attackbots
" "
2019-06-21 18:48:23

最近上报的IP列表

140.116.88.147 131.251.254.198 145.18.12.36 140.116.60.7
134.208.6.118 140.135.168.170 95.14.136.241 195.199.214.121
140.125.217.182 130.149.89.49 195.113.99.202 130.15.163.37
140.116.250.61 200.129.64.144 202.253.249.27 88.197.70.96
194.249.110.10 128.174.199.46 120.105.131.45 140.116.123.38