必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.189.194.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18450
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.189.194.118.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 16:01:39 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 118.194.189.120.in-addr.arpa not found: 5(REFUSED)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 118.194.189.120.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.131.218.242 attackbotsspam
Dec 31 21:58:32 php1 sshd\[30131\]: Invalid user wierzba from 190.131.218.242
Dec 31 21:58:32 php1 sshd\[30131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.131.218.242
Dec 31 21:58:35 php1 sshd\[30131\]: Failed password for invalid user wierzba from 190.131.218.242 port 34173 ssh2
Dec 31 22:01:58 php1 sshd\[30512\]: Invalid user operator from 190.131.218.242
Dec 31 22:01:58 php1 sshd\[30512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.131.218.242
2020-01-01 18:18:01
42.123.96.135 attack
Portscan or hack attempt detected by psad/fwsnort
2020-01-01 18:18:15
213.6.172.134 attackbots
<6 unauthorized SSH connections
2020-01-01 18:19:07
93.149.12.2 attackspam
Jan  1 07:46:14 www_kotimaassa_fi sshd[28688]: Failed password for root from 93.149.12.2 port 37544 ssh2
...
2020-01-01 18:31:27
222.217.119.193 attack
Scanning
2020-01-01 18:38:16
212.156.17.218 attack
$f2bV_matches
2020-01-01 18:23:54
106.13.53.161 attack
Unauthorized connection attempt detected from IP address 106.13.53.161 to port 22
2020-01-01 18:45:09
35.160.48.160 attackbotsspam
01/01/2020-11:31:23.359005 35.160.48.160 Protocol: 6 SURICATA TLS invalid record/traffic
2020-01-01 18:37:30
113.4.139.252 attackbotsspam
Scanning
2020-01-01 18:10:10
85.133.220.134 attack
Web App Attack
2020-01-01 18:35:03
190.111.232.247 attackbotsspam
Unauthorized connection attempt detected from IP address 190.111.232.247 to port 445
2020-01-01 18:24:26
115.186.148.38 attackbotsspam
$f2bV_matches
2020-01-01 18:39:21
111.197.65.59 attack
Scanning
2020-01-01 18:27:35
181.221.27.74 attackbotsspam
Jan  1 08:17:01 XXX sshd[42311]: Invalid user joshua from 181.221.27.74 port 43092
2020-01-01 18:16:55
78.21.141.184 attack
Jan  1 09:10:20 ns381471 sshd[4962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.21.141.184
Jan  1 09:10:21 ns381471 sshd[4962]: Failed password for invalid user steur from 78.21.141.184 port 51343 ssh2
2020-01-01 18:41:56

最近上报的IP列表

207.162.19.213 166.179.54.59 211.61.120.254 177.192.193.101
86.191.178.58 148.163.179.185 34.174.74.221 27.106.111.172
222.215.172.9 215.34.45.205 139.238.164.18 19.82.220.18
163.26.219.203 36.203.18.191 114.76.25.25 72.119.151.168
241.221.111.180 54.234.125.215 205.200.1.120 171.99.7.71