必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Hangzhou

省份(region): Zhejiang

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.27.150.95
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32834
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.27.150.95.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025111501 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 16 08:30:31 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 95.150.27.120.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 95.150.27.120.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
201.17.146.80 attack
Feb 28 17:09:37 odroid64 sshd\[24587\]: Invalid user pablo from 201.17.146.80
Feb 28 17:09:37 odroid64 sshd\[24587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.146.80
Feb 28 17:09:40 odroid64 sshd\[24587\]: Failed password for invalid user pablo from 201.17.146.80 port 10463 ssh2
Mar  6 10:32:21 odroid64 sshd\[2714\]: User root from 201.17.146.80 not allowed because not listed in AllowUsers
Mar  6 10:32:21 odroid64 sshd\[2714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.146.80  user=root
Mar  6 10:32:23 odroid64 sshd\[2714\]: Failed password for invalid user root from 201.17.146.80 port 46146 ssh2
Mar  9 07:16:00 odroid64 sshd\[19038\]: Invalid user eazye from 201.17.146.80
Mar  9 07:16:00 odroid64 sshd\[19038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.146.80
Mar  9 07:16:02 odroid64 sshd\[19038\]: Failed password for 
...
2019-10-18 06:45:52
89.232.48.43 attackspambots
Oct 18 00:07:04 localhost sshd\[23573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.232.48.43  user=root
Oct 18 00:07:07 localhost sshd\[23573\]: Failed password for root from 89.232.48.43 port 50842 ssh2
Oct 18 00:10:22 localhost sshd\[23895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.232.48.43  user=root
2019-10-18 06:25:16
118.25.143.199 attackspam
Oct 17 22:01:43 ip-172-31-62-245 sshd\[8717\]: Failed password for root from 118.25.143.199 port 33458 ssh2\
Oct 17 22:05:37 ip-172-31-62-245 sshd\[8738\]: Invalid user leninha from 118.25.143.199\
Oct 17 22:05:38 ip-172-31-62-245 sshd\[8738\]: Failed password for invalid user leninha from 118.25.143.199 port 52942 ssh2\
Oct 17 22:09:30 ip-172-31-62-245 sshd\[8830\]: Invalid user mythic from 118.25.143.199\
Oct 17 22:09:32 ip-172-31-62-245 sshd\[8830\]: Failed password for invalid user mythic from 118.25.143.199 port 44203 ssh2\
2019-10-18 06:37:50
49.88.112.114 attack
Oct 17 12:40:54 hpm sshd\[5004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Oct 17 12:40:55 hpm sshd\[5004\]: Failed password for root from 49.88.112.114 port 37306 ssh2
Oct 17 12:40:57 hpm sshd\[5004\]: Failed password for root from 49.88.112.114 port 37306 ssh2
Oct 17 12:40:59 hpm sshd\[5004\]: Failed password for root from 49.88.112.114 port 37306 ssh2
Oct 17 12:41:48 hpm sshd\[5098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
2019-10-18 06:47:04
201.20.104.231 attack
Jan 20 16:51:25 odroid64 sshd\[30217\]: Invalid user newadmin from 201.20.104.231
Jan 20 16:51:25 odroid64 sshd\[30217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.20.104.231
Jan 20 16:51:27 odroid64 sshd\[30217\]: Failed password for invalid user newadmin from 201.20.104.231 port 33790 ssh2
Jan 23 00:55:59 odroid64 sshd\[4828\]: Invalid user sunny from 201.20.104.231
Jan 23 00:55:59 odroid64 sshd\[4828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.20.104.231
Jan 23 00:56:01 odroid64 sshd\[4828\]: Failed password for invalid user sunny from 201.20.104.231 port 39286 ssh2
...
2019-10-18 06:19:35
151.80.75.127 attack
Oct 17 22:25:13 mail postfix/smtpd\[20964\]: warning: unknown\[151.80.75.127\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 17 23:07:31 mail postfix/smtpd\[20975\]: warning: unknown\[151.80.75.127\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 17 23:16:20 mail postfix/smtpd\[22126\]: warning: unknown\[151.80.75.127\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 17 23:28:27 mail postfix/smtpd\[28864\]: warning: unknown\[151.80.75.127\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-10-18 06:09:26
106.12.215.130 attack
Oct 17 20:04:08 hcbbdb sshd\[9449\]: Invalid user a from 106.12.215.130
Oct 17 20:04:08 hcbbdb sshd\[9449\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.215.130
Oct 17 20:04:10 hcbbdb sshd\[9449\]: Failed password for invalid user a from 106.12.215.130 port 38586 ssh2
Oct 17 20:08:39 hcbbdb sshd\[9933\]: Invalid user fuwuqiXP\* from 106.12.215.130
Oct 17 20:08:39 hcbbdb sshd\[9933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.215.130
2019-10-18 06:27:47
2.141.66.247 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/2.141.66.247/ 
 ES - 1H : (52)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : ES 
 NAME ASN : ASN3352 
 
 IP : 2.141.66.247 
 
 CIDR : 2.141.0.0/16 
 
 PREFIX COUNT : 662 
 
 UNIQUE IP COUNT : 10540800 
 
 
 WYKRYTE ATAKI Z ASN3352 :  
  1H - 1 
  3H - 4 
  6H - 6 
 12H - 11 
 24H - 21 
 
 DateTime : 2019-10-17 21:50:43 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-18 06:30:57
201.182.180.16 attackspam
Feb  2 15:55:48 odroid64 sshd\[30721\]: Invalid user jack from 201.182.180.16
Feb  2 15:55:48 odroid64 sshd\[30721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.182.180.16
Feb  2 15:55:50 odroid64 sshd\[30721\]: Failed password for invalid user jack from 201.182.180.16 port 43684 ssh2
...
2019-10-18 06:35:56
159.255.152.161 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/159.255.152.161/ 
 IT - 1H : (102)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : IT 
 NAME ASN : ASN47927 
 
 IP : 159.255.152.161 
 
 CIDR : 159.255.152.0/22 
 
 PREFIX COUNT : 5 
 
 UNIQUE IP COUNT : 8192 
 
 
 WYKRYTE ATAKI Z ASN47927 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 2 
 
 DateTime : 2019-10-17 21:50:22 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-10-18 06:45:14
217.182.172.204 attack
Oct 18 04:55:26 webhost01 sshd[11979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.172.204
Oct 18 04:55:28 webhost01 sshd[11979]: Failed password for invalid user aleksander from 217.182.172.204 port 47638 ssh2
...
2019-10-18 06:18:38
89.36.216.125 attackspambots
2019-10-17T22:02:17.635850hub.schaetter.us sshd\[4421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.36.216.125  user=root
2019-10-17T22:02:18.843749hub.schaetter.us sshd\[4421\]: Failed password for root from 89.36.216.125 port 44640 ssh2
2019-10-17T22:05:58.630416hub.schaetter.us sshd\[4464\]: Invalid user mb from 89.36.216.125 port 55142
2019-10-17T22:05:58.641595hub.schaetter.us sshd\[4464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.36.216.125
2019-10-17T22:06:01.189196hub.schaetter.us sshd\[4464\]: Failed password for invalid user mb from 89.36.216.125 port 55142 ssh2
...
2019-10-18 06:08:46
73.15.91.251 attackspam
2019-10-17T21:58:31.531587abusebot-4.cloudsearch.cf sshd\[7239\]: Invalid user qwerty from 73.15.91.251 port 59054
2019-10-18 06:32:09
201.20.83.96 attack
Jan 19 19:04:44 odroid64 sshd\[21346\]: Invalid user admin from 201.20.83.96
Jan 19 19:04:44 odroid64 sshd\[21346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.20.83.96
Jan 19 19:04:46 odroid64 sshd\[21346\]: Failed password for invalid user admin from 201.20.83.96 port 35816 ssh2
...
2019-10-18 06:11:29
64.17.42.154 attackbotsspam
Lines containing failures of 64.17.42.154
Oct 17 21:40:46 server01 postfix/smtpd[4735]: connect from emv30.eistnesieu.com[64.17.42.154]
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct 17 21:40:47 server01 postfix/smtpd[4735]: disconnect from emv30.eistnesieu.com[64.17.42.154]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=64.17.42.154
2019-10-18 06:18:20

最近上报的IP列表

43.225.142.236 38.71.119.200 47.250.208.152 121.199.172.10
104.131.124.141 159.65.179.156 37.202.219.156 152.42.246.103
113.95.137.38 205.210.31.252 147.185.133.202 103.62.1.89
34.78.140.118 176.65.148.172 103.10.124.68 164.92.175.224
1.71.13.3 110.192.168.100 188.170.66.76 178.177.13.173