必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.132.83.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24357
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.132.83.46.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 06:37:39 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 46.83.132.120.in-addr.arpa. not found: 3(NXDOMAIN)
'
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 46.83.132.120.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
36.67.248.206 attackspam
2020-04-14T18:22:23.0092841495-001 sshd[15486]: Invalid user Redistoor from 36.67.248.206 port 48926
2020-04-14T18:22:25.1953781495-001 sshd[15486]: Failed password for invalid user Redistoor from 36.67.248.206 port 48926 ssh2
2020-04-14T18:27:01.3039411495-001 sshd[15676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.67.248.206  user=root
2020-04-14T18:27:02.6426561495-001 sshd[15676]: Failed password for root from 36.67.248.206 port 55740 ssh2
2020-04-14T18:31:44.0927481495-001 sshd[15881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.67.248.206  user=root
2020-04-14T18:31:45.6174161495-001 sshd[15881]: Failed password for root from 36.67.248.206 port 34300 ssh2
...
2020-04-15 07:10:17
5.135.181.53 attack
Apr 14 22:42:01 localhost sshd\[20725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.181.53  user=root
Apr 14 22:42:03 localhost sshd\[20725\]: Failed password for root from 5.135.181.53 port 42662 ssh2
Apr 14 22:48:19 localhost sshd\[21123\]: Invalid user t3rr0r from 5.135.181.53
Apr 14 22:48:19 localhost sshd\[21123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.181.53
Apr 14 22:48:22 localhost sshd\[21123\]: Failed password for invalid user t3rr0r from 5.135.181.53 port 50362 ssh2
...
2020-04-15 07:04:02
106.54.86.242 attackspam
Invalid user guest from 106.54.86.242 port 33722
2020-04-15 07:04:27
49.232.51.149 attackspam
Apr 15 00:08:22 meumeu sshd[8310]: Failed password for root from 49.232.51.149 port 56778 ssh2
Apr 15 00:12:01 meumeu sshd[8813]: Failed password for root from 49.232.51.149 port 61859 ssh2
...
2020-04-15 06:56:12
106.52.119.91 attackbotsspam
Apr 15 02:08:29 Enigma sshd[22898]: Invalid user gpas from 106.52.119.91 port 33304
Apr 15 02:08:29 Enigma sshd[22898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.119.91
Apr 15 02:08:29 Enigma sshd[22898]: Invalid user gpas from 106.52.119.91 port 33304
Apr 15 02:08:31 Enigma sshd[22898]: Failed password for invalid user gpas from 106.52.119.91 port 33304 ssh2
Apr 15 02:10:17 Enigma sshd[23239]: Invalid user r from 106.52.119.91 port 35758
2020-04-15 07:13:48
103.140.152.142 attackspam
honeypot 22 port
2020-04-15 07:34:09
190.128.230.206 attack
Apr 14 22:22:55 sip sshd[15570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.230.206
Apr 14 22:22:56 sip sshd[15570]: Failed password for invalid user t3rr0r from 190.128.230.206 port 45527 ssh2
Apr 14 22:48:12 sip sshd[24869]: Failed password for root from 190.128.230.206 port 51267 ssh2
2020-04-15 07:13:31
68.183.22.85 attackspambots
Too many connections or unauthorized access detected from Arctic banned ip
2020-04-15 07:15:37
129.204.119.178 attackbotsspam
Apr 14 22:48:13 plex sshd[18911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.119.178  user=root
Apr 14 22:48:14 plex sshd[18911]: Failed password for root from 129.204.119.178 port 42050 ssh2
2020-04-15 07:11:40
80.82.70.239 attackbotsspam
04/14/2020-19:25:02.010924 80.82.70.239 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-04-15 07:33:23
45.14.151.246 attackbotsspam
Port Scan: Events[1] countPorts[1]: 80 ..
2020-04-15 07:22:46
43.226.49.116 attackspam
2020-04-14T16:51:10.901413xentho-1 sshd[304440]: Invalid user pdv from 43.226.49.116 port 41420
2020-04-14T16:51:10.908790xentho-1 sshd[304440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.49.116
2020-04-14T16:51:10.901413xentho-1 sshd[304440]: Invalid user pdv from 43.226.49.116 port 41420
2020-04-14T16:51:13.404433xentho-1 sshd[304440]: Failed password for invalid user pdv from 43.226.49.116 port 41420 ssh2
2020-04-14T16:52:55.451572xentho-1 sshd[304503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.49.116  user=root
2020-04-14T16:52:57.028847xentho-1 sshd[304503]: Failed password for root from 43.226.49.116 port 35572 ssh2
2020-04-14T16:54:44.669044xentho-1 sshd[304537]: Invalid user zxin10 from 43.226.49.116 port 57960
2020-04-14T16:54:44.675304xentho-1 sshd[304537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.49.116
2020-04-14T16:5
...
2020-04-15 07:19:57
187.0.160.130 attackbotsspam
Apr 14 23:27:49 cdc sshd[2457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.0.160.130  user=root
Apr 14 23:27:51 cdc sshd[2457]: Failed password for invalid user root from 187.0.160.130 port 47306 ssh2
2020-04-15 07:20:22
180.76.104.167 attackspam
Apr 15 00:40:03 h2779839 sshd[14752]: Invalid user R00T from 180.76.104.167 port 53560
Apr 15 00:40:03 h2779839 sshd[14752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.104.167
Apr 15 00:40:03 h2779839 sshd[14752]: Invalid user R00T from 180.76.104.167 port 53560
Apr 15 00:40:05 h2779839 sshd[14752]: Failed password for invalid user R00T from 180.76.104.167 port 53560 ssh2
Apr 15 00:42:27 h2779839 sshd[14775]: Invalid user zxin10 from 180.76.104.167 port 37224
Apr 15 00:42:27 h2779839 sshd[14775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.104.167
Apr 15 00:42:27 h2779839 sshd[14775]: Invalid user zxin10 from 180.76.104.167 port 37224
Apr 15 00:42:29 h2779839 sshd[14775]: Failed password for invalid user zxin10 from 180.76.104.167 port 37224 ssh2
Apr 15 00:48:28 h2779839 sshd[14827]: Invalid user apacher from 180.76.104.167 port 32802
...
2020-04-15 06:59:09
211.142.118.38 attack
Invalid user rzaleski from 211.142.118.38 port 41733
2020-04-15 07:01:06

最近上报的IP列表

120.132.8.88 120.132.99.13 120.133.129.151 120.133.132.34
120.133.17.148 120.133.140.151 120.133.2.151 120.133.2.88
120.133.28.165 120.133.28.156 120.133.2.152 120.133.28.236
120.133.3.159 120.133.33.17 120.133.40.245 120.133.51.65
120.133.60.61 120.133.57.59 120.133.64.174 120.136.10.25