必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.162.149.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23529
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.162.149.243.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012902 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 11:07:10 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
243.149.162.120.in-addr.arpa domain name pointer 120-162-149-243.resources.indosat.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
243.149.162.120.in-addr.arpa	name = 120-162-149-243.resources.indosat.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
202.131.68.52 attack
 TCP (SYN) 202.131.68.52:39198 -> port 23, len 44
2020-08-22 02:48:53
112.119.28.92 attack
Bad protocol version identification ''
2020-08-22 02:52:54
157.230.112.195 attackspambots
Unauthorized connection attempt detected from IP address 157.230.112.195 to port 8123 [T]
2020-08-22 03:09:27
64.227.125.204 attackspambots
2020-08-21T20:07:27.131266mail.standpoint.com.ua sshd[20107]: Invalid user maxima from 64.227.125.204 port 49616
2020-08-21T20:07:27.134340mail.standpoint.com.ua sshd[20107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.125.204
2020-08-21T20:07:27.131266mail.standpoint.com.ua sshd[20107]: Invalid user maxima from 64.227.125.204 port 49616
2020-08-21T20:07:29.312027mail.standpoint.com.ua sshd[20107]: Failed password for invalid user maxima from 64.227.125.204 port 49616 ssh2
2020-08-21T20:11:45.531280mail.standpoint.com.ua sshd[20814]: Invalid user ice from 64.227.125.204 port 43218
...
2020-08-22 03:16:39
123.206.108.50 attackspam
Aug 21 15:43:47 buvik sshd[16698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.108.50
Aug 21 15:43:49 buvik sshd[16698]: Failed password for invalid user user from 123.206.108.50 port 60350 ssh2
Aug 21 15:45:33 buvik sshd[16966]: Invalid user tg from 123.206.108.50
...
2020-08-22 03:01:54
81.0.90.251 attack
srvr1: (mod_security) mod_security (id:942100) triggered by 81.0.90.251 (HU/-/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/08/21 12:01:58 [error] 482759#0: *840088 [client 81.0.90.251] ModSecurity: Access denied with code 406 (phase 2).  [file "/etc/modsecurity.d/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"] [line "45"] [id "942100"] [rev ""] [msg ""] [redacted] [severity "0"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-sqli"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/152/248/66"] [tag "PCI/6.5.2"] [redacted] [uri "/forum/viewthread.php"] [unique_id "159801131815.157417"] [ref ""], client: 81.0.90.251, [redacted] request: "GET /forum/viewthread.php?thread_id=1122%29+OR+UPDATEXML%285947%2CCONCAT%280x2e%2C0x317167483543%2C%28SELECT+%28ELT%282836%3D2836%2C1%29%29%29%2C0x317167483543%29%2C5431%29--+YUZJ HTTP/1.1" [redacted]
2020-08-22 02:47:03
51.68.88.26 attack
Aug 21 20:13:28 inter-technics sshd[8099]: Invalid user emily from 51.68.88.26 port 39346
Aug 21 20:13:28 inter-technics sshd[8099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.88.26
Aug 21 20:13:28 inter-technics sshd[8099]: Invalid user emily from 51.68.88.26 port 39346
Aug 21 20:13:31 inter-technics sshd[8099]: Failed password for invalid user emily from 51.68.88.26 port 39346 ssh2
Aug 21 20:14:35 inter-technics sshd[8143]: Invalid user greatwall from 51.68.88.26 port 57106
...
2020-08-22 02:51:58
82.202.65.16 attackbotsspam
Fake_GoogleBot
2020-08-22 02:49:12
82.209.209.202 attackspambots
[ssh] SSH attack
2020-08-22 03:11:26
93.64.5.34 attackspambots
Aug 21 19:32:48 rotator sshd\[21545\]: Invalid user cmh from 93.64.5.34Aug 21 19:32:50 rotator sshd\[21545\]: Failed password for invalid user cmh from 93.64.5.34 port 36666 ssh2Aug 21 19:36:30 rotator sshd\[22313\]: Invalid user office from 93.64.5.34Aug 21 19:36:32 rotator sshd\[22313\]: Failed password for invalid user office from 93.64.5.34 port 43632 ssh2Aug 21 19:40:05 rotator sshd\[22462\]: Invalid user bob from 93.64.5.34Aug 21 19:40:07 rotator sshd\[22462\]: Failed password for invalid user bob from 93.64.5.34 port 34405 ssh2
...
2020-08-22 02:51:38
206.189.121.29 attackbots
206.189.121.29 - - [21/Aug/2020:20:28:52 +0200] "GET /wp-login.php HTTP/1.1" 200 8775 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
206.189.121.29 - - [21/Aug/2020:20:28:58 +0200] "POST /wp-login.php HTTP/1.1" 200 9026 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
206.189.121.29 - - [21/Aug/2020:20:28:59 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-22 03:05:02
78.209.198.56 attack
Automatic report - Port Scan Attack
2020-08-22 03:11:43
14.136.104.38 attack
Aug 21 18:21:33 ns392434 sshd[12313]: Invalid user admin from 14.136.104.38 port 24609
Aug 21 18:21:33 ns392434 sshd[12313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.136.104.38
Aug 21 18:21:33 ns392434 sshd[12313]: Invalid user admin from 14.136.104.38 port 24609
Aug 21 18:21:34 ns392434 sshd[12313]: Failed password for invalid user admin from 14.136.104.38 port 24609 ssh2
Aug 21 18:37:40 ns392434 sshd[12701]: Invalid user natalie from 14.136.104.38 port 43138
Aug 21 18:37:40 ns392434 sshd[12701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.136.104.38
Aug 21 18:37:40 ns392434 sshd[12701]: Invalid user natalie from 14.136.104.38 port 43138
Aug 21 18:37:42 ns392434 sshd[12701]: Failed password for invalid user natalie from 14.136.104.38 port 43138 ssh2
Aug 21 18:41:33 ns392434 sshd[12920]: Invalid user orauat from 14.136.104.38 port 54657
2020-08-22 03:04:23
45.175.175.28 attack
Unauthorized connection attempt from IP address 45.175.175.28 on Port 445(SMB)
2020-08-22 02:57:36
178.62.60.233 attack
" "
2020-08-22 03:15:49

最近上报的IP列表

80.227.40.11 230.99.98.194 101.15.204.251 58.204.188.147
203.200.3.5 235.87.59.166 238.243.79.151 241.131.60.15
79.179.22.87 128.65.243.227 165.175.10.65 63.74.140.18
146.123.55.77 204.232.108.55 248.196.40.139 12.40.169.187
180.172.242.125 59.26.78.7 129.133.174.29 163.15.49.138