必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.136.14.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14003
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.136.14.20.			IN	A

;; AUTHORITY SECTION:
.			128	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 12:17:11 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
20.14.136.120.in-addr.arpa domain name pointer sv719.xserver.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.14.136.120.in-addr.arpa	name = sv719.xserver.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
80.82.65.90 attack
01/24/2020-15:46:49.512626 80.82.65.90 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-25 04:47:27
134.119.223.70 attackspam
[2020-01-24 15:17:19] NOTICE[1148][C-00001eec] chan_sip.c: Call from '' (134.119.223.70:56357) to extension '72010101148614236002' rejected because extension not found in context 'public'.
[2020-01-24 15:17:19] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-01-24T15:17:19.095-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="72010101148614236002",SessionID="0x7fd82c3e18a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/134.119.223.70/56357",ACLName="no_extension_match"
[2020-01-24 15:18:46] NOTICE[1148][C-00001ef2] chan_sip.c: Call from '' (134.119.223.70:57044) to extension '7310101148614236002' rejected because extension not found in context 'public'.
[2020-01-24 15:18:46] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-01-24T15:18:46.945-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="7310101148614236002",SessionID="0x7fd82c4a98b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",Rem
...
2020-01-25 04:31:47
112.85.42.227 attackbotsspam
Jan 24 15:10:24 NPSTNNYC01T sshd[13319]: Failed password for root from 112.85.42.227 port 16549 ssh2
Jan 24 15:11:39 NPSTNNYC01T sshd[13420]: Failed password for root from 112.85.42.227 port 41732 ssh2
...
2020-01-25 04:29:53
49.88.112.65 attack
Jan 24 10:09:23 hanapaa sshd\[4569\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
Jan 24 10:09:25 hanapaa sshd\[4569\]: Failed password for root from 49.88.112.65 port 61534 ssh2
Jan 24 10:10:24 hanapaa sshd\[4642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
Jan 24 10:10:26 hanapaa sshd\[4642\]: Failed password for root from 49.88.112.65 port 31154 ssh2
Jan 24 10:10:29 hanapaa sshd\[4642\]: Failed password for root from 49.88.112.65 port 31154 ssh2
2020-01-25 04:25:10
102.159.26.91 attackspam
Email rejected due to spam filtering
2020-01-25 04:56:43
18.233.131.167 attack
Unauthorized connection attempt detected from IP address 18.233.131.167 to port 2220 [J]
2020-01-25 04:34:54
132.148.129.180 attackspambots
Jan 24 20:45:20 marvibiene sshd[34535]: Invalid user ethos from 132.148.129.180 port 33560
Jan 24 20:45:20 marvibiene sshd[34535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.148.129.180
Jan 24 20:45:20 marvibiene sshd[34535]: Invalid user ethos from 132.148.129.180 port 33560
Jan 24 20:45:21 marvibiene sshd[34535]: Failed password for invalid user ethos from 132.148.129.180 port 33560 ssh2
...
2020-01-25 04:50:25
110.235.212.3 attackbotsspam
Unauthorized connection attempt from IP address 110.235.212.3 on Port 445(SMB)
2020-01-25 04:19:46
152.171.102.20 attackbotsspam
Spammer
2020-01-25 04:39:49
202.78.202.37 attack
Honeypot attack, port: 445, PTR: ip-78-202-37.dtp.net.id.
2020-01-25 04:53:21
182.61.54.213 attack
Automatic report - Banned IP Access
2020-01-25 04:49:01
212.0.73.71 attack
SSH Bruteforce attempt
2020-01-25 04:56:21
71.6.232.6 attackspam
Unauthorized connection attempt detected from IP address 71.6.232.6 to port 22 [J]
2020-01-25 04:33:26
86.238.30.51 attack
Unauthorized connection attempt detected from IP address 86.238.30.51 to port 2220 [J]
2020-01-25 04:37:44
72.94.181.219 attackbots
Unauthorized connection attempt detected from IP address 72.94.181.219 to port 2220 [J]
2020-01-25 04:45:12

最近上报的IP列表

120.136.14.45 120.15.111.246 120.138.18.164 120.152.172.2
120.138.27.29 120.188.86.147 120.188.0.84 120.188.35.203
120.133.3.81 120.188.94.102 120.194.104.164 120.204.169.243
53.220.210.63 120.229.214.110 120.230.0.236 120.231.108.17
120.229.9.141 120.231.203.231 120.230.113.177 120.231.178.19