必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.83.104.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37052
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.83.104.134.			IN	A

;; AUTHORITY SECTION:
.			193	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031102 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 12 12:58:09 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 134.104.83.120.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.104.83.120.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
200.37.95.43 attack
SSH-BruteForce
2019-08-11 07:10:33
27.254.82.249 attackbots
C1,WP GET /lappan/wp-login.php
2019-08-11 07:42:21
103.138.108.114 attackspambots
port scan/probe/communication attempt
2019-08-11 07:44:38
188.143.125.197 attack
SSH-BruteForce
2019-08-11 07:34:55
223.16.216.92 attackspam
Mar  5 00:38:54 motanud sshd\[26695\]: Invalid user ub from 223.16.216.92 port 60570
Mar  5 00:38:54 motanud sshd\[26695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.16.216.92
Mar  5 00:38:56 motanud sshd\[26695\]: Failed password for invalid user ub from 223.16.216.92 port 60570 ssh2
2019-08-11 07:19:26
188.166.163.92 attackbotsspam
SSH-BruteForce
2019-08-11 07:33:01
223.111.139.211 attackbotsspam
May  4 20:50:10 motanud sshd\[28065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.111.139.211  user=root
May  4 20:50:13 motanud sshd\[28065\]: Failed password for root from 223.111.139.211 port 51563 ssh2
May  4 20:50:15 motanud sshd\[28065\]: Failed password for root from 223.111.139.211 port 51563 ssh2
2019-08-11 07:24:40
223.197.175.171 attackspam
Apr 14 12:27:53 motanud sshd\[28953\]: Invalid user nagios from 223.197.175.171 port 60146
Apr 14 12:27:53 motanud sshd\[28953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.197.175.171
Apr 14 12:27:56 motanud sshd\[28953\]: Failed password for invalid user nagios from 223.197.175.171 port 60146 ssh2
2019-08-11 07:11:23
109.172.42.111 attackbots
port scan/probe/communication attempt
2019-08-11 07:42:53
177.209.86.39 attack
10.08.2019 23:06:45 Connection to port 53 blocked by firewall
2019-08-11 07:45:37
223.171.46.146 attack
Dec 20 20:10:51 motanud sshd\[21087\]: Invalid user git from 223.171.46.146 port 32869
Dec 20 20:10:51 motanud sshd\[21087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.171.46.146
Dec 20 20:10:53 motanud sshd\[21087\]: Failed password for invalid user git from 223.171.46.146 port 32869 ssh2
2019-08-11 07:13:11
77.42.74.19 attackspam
Automatic report - Port Scan Attack
2019-08-11 07:23:48
185.216.140.80 attack
port scan/probe/communication attempt
2019-08-11 07:38:16
197.253.6.249 attack
SSH-BruteForce
2019-08-11 07:12:53
222.92.37.85 attackbots
Jan 12 07:20:58 motanud sshd\[5463\]: Invalid user titan from 222.92.37.85 port 18850
Jan 12 07:20:58 motanud sshd\[5463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.92.37.85
Jan 12 07:21:00 motanud sshd\[5463\]: Failed password for invalid user titan from 222.92.37.85 port 18850 ssh2
2019-08-11 07:30:06

最近上报的IP列表

120.83.104.132 120.83.104.136 120.83.104.138 120.83.104.142
120.83.104.147 120.83.104.148 120.83.104.15 120.83.104.150
120.83.104.152 120.83.104.154 120.83.104.159 120.83.104.16
120.83.107.246 120.83.107.248 120.83.107.250 120.83.107.252
120.83.107.254 120.83.107.26 120.83.107.28 120.83.107.30