必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.136.14.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14003
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.136.14.20.			IN	A

;; AUTHORITY SECTION:
.			128	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 12:17:11 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
20.14.136.120.in-addr.arpa domain name pointer sv719.xserver.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.14.136.120.in-addr.arpa	name = sv719.xserver.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
124.78.156.57 attackspambots
May 30 01:00:13 v22019038103785759 sshd\[29567\]: Invalid user abuzar from 124.78.156.57 port 49320
May 30 01:00:13 v22019038103785759 sshd\[29567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.78.156.57
May 30 01:00:15 v22019038103785759 sshd\[29567\]: Failed password for invalid user abuzar from 124.78.156.57 port 49320 ssh2
May 30 01:03:52 v22019038103785759 sshd\[29725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.78.156.57  user=root
May 30 01:03:54 v22019038103785759 sshd\[29725\]: Failed password for root from 124.78.156.57 port 33370 ssh2
...
2020-05-30 08:17:03
111.161.74.117 attackspam
May 30 00:43:42 inter-technics sshd[30275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.161.74.117  user=root
May 30 00:43:44 inter-technics sshd[30275]: Failed password for root from 111.161.74.117 port 53962 ssh2
May 30 00:45:50 inter-technics sshd[30392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.161.74.117  user=root
May 30 00:45:52 inter-technics sshd[30392]: Failed password for root from 111.161.74.117 port 42472 ssh2
May 30 00:47:57 inter-technics sshd[30568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.161.74.117  user=root
May 30 00:47:59 inter-technics sshd[30568]: Failed password for root from 111.161.74.117 port 59219 ssh2
...
2020-05-30 08:05:13
128.199.103.239 attackspam
2020-05-29T22:00:35.108333abusebot-6.cloudsearch.cf sshd[13087]: Invalid user ghost from 128.199.103.239 port 56203
2020-05-29T22:00:35.115943abusebot-6.cloudsearch.cf sshd[13087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.103.239
2020-05-29T22:00:35.108333abusebot-6.cloudsearch.cf sshd[13087]: Invalid user ghost from 128.199.103.239 port 56203
2020-05-29T22:00:36.741214abusebot-6.cloudsearch.cf sshd[13087]: Failed password for invalid user ghost from 128.199.103.239 port 56203 ssh2
2020-05-29T22:07:42.782459abusebot-6.cloudsearch.cf sshd[13543]: Invalid user guest from 128.199.103.239 port 58781
2020-05-29T22:07:42.789593abusebot-6.cloudsearch.cf sshd[13543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.103.239
2020-05-29T22:07:42.782459abusebot-6.cloudsearch.cf sshd[13543]: Invalid user guest from 128.199.103.239 port 58781
2020-05-29T22:07:44.700816abusebot-6.cloudsearch.cf sshd[
...
2020-05-30 08:03:16
195.54.161.40 attackspambots
[H1.VM4] Blocked by UFW
2020-05-30 07:49:04
45.162.145.104 attackbots
Unauthorized connection attempt from IP address 45.162.145.104 on Port 445(SMB)
2020-05-30 08:14:00
89.252.155.19 attack
xmlrpc attack
2020-05-30 07:55:25
49.234.80.94 attackspam
May 30 01:38:29 vps687878 sshd\[28862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.80.94  user=root
May 30 01:38:31 vps687878 sshd\[28862\]: Failed password for root from 49.234.80.94 port 42830 ssh2
May 30 01:42:58 vps687878 sshd\[29381\]: Invalid user xguest from 49.234.80.94 port 36094
May 30 01:42:58 vps687878 sshd\[29381\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.80.94
May 30 01:43:00 vps687878 sshd\[29381\]: Failed password for invalid user xguest from 49.234.80.94 port 36094 ssh2
...
2020-05-30 07:45:43
14.231.245.125 attack
May 29 22:47:34 andromeda sshd\[3064\]: Invalid user admin from 14.231.245.125 port 49388
May 29 22:47:34 andromeda sshd\[3064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.231.245.125
May 29 22:47:36 andromeda sshd\[3064\]: Failed password for invalid user admin from 14.231.245.125 port 49388 ssh2
2020-05-30 07:49:51
142.93.165.102 attackspam
Invalid user alexandria from 142.93.165.102 port 55298
2020-05-30 08:11:29
59.188.2.19 attack
Invalid user support from 59.188.2.19 port 51821
2020-05-30 07:39:30
88.26.226.48 attackspam
Invalid user service from 88.26.226.48 port 33128
2020-05-30 07:57:20
61.189.159.185 attackbotsspam
May 29 22:47:35 debian-2gb-nbg1-2 kernel: \[13044038.849129\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=61.189.159.185 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=235 ID=51561 PROTO=TCP SPT=55455 DPT=1433 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-30 07:51:55
139.162.75.112 attackspambots
port scan and connect, tcp 22 (ssh)
2020-05-30 07:43:44
202.72.215.58 attackbotsspam
Unauthorized connection attempt from IP address 202.72.215.58 on Port 445(SMB)
2020-05-30 08:10:45
45.83.29.50 attackbots
May 30 01:00:36 debian-2gb-nbg1-2 kernel: \[13052019.664630\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.83.29.50 DST=195.201.40.59 LEN=438 TOS=0x00 PREC=0x00 TTL=48 ID=34758 DF PROTO=UDP SPT=5147 DPT=5060 LEN=418
2020-05-30 08:15:40

最近上报的IP列表

120.136.14.45 120.15.111.246 120.138.18.164 120.152.172.2
120.138.27.29 120.188.86.147 120.188.0.84 120.188.35.203
120.133.3.81 120.188.94.102 120.194.104.164 120.204.169.243
53.220.210.63 120.229.214.110 120.230.0.236 120.231.108.17
120.229.9.141 120.231.203.231 120.230.113.177 120.231.178.19