必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.206.172.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27077
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.206.172.114.		IN	A

;; AUTHORITY SECTION:
.			9	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 00:18:11 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
114.172.206.120.in-addr.arpa domain name pointer localhost.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
114.172.206.120.in-addr.arpa	name = localhost.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
80.89.203.146 attackspambots
Unauthorized connection attempt from IP address 80.89.203.146 on Port 445(SMB)
2020-05-23 23:01:47
103.16.202.90 attack
Unauthorized connection attempt from IP address 103.16.202.90 on Port 445(SMB)
2020-05-23 23:04:30
192.116.212.90 attack
Unauthorized connection attempt from IP address 192.116.212.90 on Port 445(SMB)
2020-05-23 23:16:26
177.54.239.39 attackbots
Unauthorized connection attempt from IP address 177.54.239.39 on Port 445(SMB)
2020-05-23 23:02:00
114.67.169.68 attack
May 23 11:08:07 Host-KEWR-E sshd[2746]: Invalid user prb from 114.67.169.68 port 56963
...
2020-05-23 23:25:36
129.204.15.121 attack
May 23 15:14:39 mout sshd[16354]: Invalid user lxt from 129.204.15.121 port 35270
2020-05-23 23:01:09
80.255.130.197 attackspam
May 23 01:58:26 web1 sshd\[17504\]: Invalid user phg from 80.255.130.197
May 23 01:58:26 web1 sshd\[17504\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.255.130.197
May 23 01:58:28 web1 sshd\[17504\]: Failed password for invalid user phg from 80.255.130.197 port 39561 ssh2
May 23 02:00:46 web1 sshd\[17685\]: Invalid user gnd from 80.255.130.197
May 23 02:00:46 web1 sshd\[17685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.255.130.197
2020-05-23 23:11:04
159.89.148.68 attackspam
159.89.148.68 - - [23/May/2020:14:00:45 +0200] "GET /wp-login.php HTTP/1.1" 200 1900 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.89.148.68 - - [23/May/2020:14:00:51 +0200] "POST /wp-login.php HTTP/1.1" 200 2031 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.89.148.68 - - [23/May/2020:14:00:51 +0200] "GET /wp-login.php HTTP/1.1" 200 1900 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.89.148.68 - - [23/May/2020:14:00:52 +0200] "POST /wp-login.php HTTP/1.1" 200 2008 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.89.148.68 - - [23/May/2020:14:00:57 +0200] "GET /wp-login.php HTTP/1.1" 200 1900 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.89.148.68 - - [23/May/2020:14:00:57 +0200] "POST /wp-login.php HTTP/1.1" 200 2009 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Fir
...
2020-05-23 23:00:47
1.54.203.8 attackspam
Unauthorized connection attempt from IP address 1.54.203.8 on Port 445(SMB)
2020-05-23 23:34:20
54.37.136.87 attackspam
bruteforce detected
2020-05-23 23:14:20
37.59.98.179 attackspambots
37.59.98.179 - - \[23/May/2020:14:00:44 +0200\] "POST /wp-login.php HTTP/1.0" 200 4404 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
37.59.98.179 - - \[23/May/2020:14:00:45 +0200\] "POST /wp-login.php HTTP/1.0" 200 4236 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
37.59.98.179 - - \[23/May/2020:14:00:45 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-05-23 23:12:15
185.153.196.67 attackspambots
Port-scan: detected 103 distinct ports within a 24-hour window.
2020-05-23 23:17:53
186.95.239.62 attackbotsspam
Unauthorized connection attempt from IP address 186.95.239.62 on Port 445(SMB)
2020-05-23 23:05:32
42.101.43.186 attack
May 23 16:16:52 mout sshd[20906]: Invalid user acadmin from 42.101.43.186 port 47840
2020-05-23 23:04:46
222.186.30.35 attackspam
23.05.2020 15:05:46 SSH access blocked by firewall
2020-05-23 23:14:56

最近上报的IP列表

25.245.233.115 233.54.200.7 117.134.140.75 159.134.87.252
162.239.125.80 129.103.255.229 175.254.174.206 77.235.100.234
106.247.110.154 245.169.43.10 146.214.198.244 2.1.246.129
66.64.186.121 216.70.63.129 138.64.251.102 11.163.246.5
146.226.250.168 143.1.148.6 150.70.154.10 110.242.17.115