必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.1.210.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35997
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.1.210.136.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 05:25:24 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
136.210.1.121.in-addr.arpa domain name pointer w210136.dynamic.ppp.asahi-net.or.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
136.210.1.121.in-addr.arpa	name = w210136.dynamic.ppp.asahi-net.or.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.91.143.95 attackspambots
Email rejected due to spam filtering
2020-09-20 22:31:30
177.10.251.98 attack
Unauthorized connection attempt from IP address 177.10.251.98 on Port 445(SMB)
2020-09-20 22:17:45
116.72.194.167 attack
23/tcp
[2020-09-20]1pkt
2020-09-20 21:55:22
82.221.131.5 attackspambots
(sshd) Failed SSH login from 82.221.131.5 (IS/Iceland/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 20 06:14:58 rainbow sshd[3427271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.221.131.5  user=root
Sep 20 06:15:00 rainbow sshd[3427271]: Failed password for root from 82.221.131.5 port 33300 ssh2
Sep 20 06:15:03 rainbow sshd[3427271]: Failed password for root from 82.221.131.5 port 33300 ssh2
Sep 20 06:15:07 rainbow sshd[3427271]: Failed password for root from 82.221.131.5 port 33300 ssh2
Sep 20 06:15:11 rainbow sshd[3427271]: Failed password for root from 82.221.131.5 port 33300 ssh2
2020-09-20 21:59:59
212.70.149.20 attackspam
Sep 20 16:13:34 cho postfix/smtpd[3321985]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 20 16:13:59 cho postfix/smtpd[3321723]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 20 16:14:24 cho postfix/smtpd[3321985]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 20 16:14:49 cho postfix/smtpd[3321985]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 20 16:15:14 cho postfix/smtpd[3321985]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-20 22:16:14
27.73.198.209 attackspam
Unauthorized connection attempt from IP address 27.73.198.209 on Port 445(SMB)
2020-09-20 22:08:43
194.165.99.231 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-09-20 22:08:04
122.51.134.25 attack
Sep 20 14:10:23 h1745522 sshd[25522]: Invalid user ubuntu from 122.51.134.25 port 59558
Sep 20 14:10:23 h1745522 sshd[25522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.134.25
Sep 20 14:10:23 h1745522 sshd[25522]: Invalid user ubuntu from 122.51.134.25 port 59558
Sep 20 14:10:25 h1745522 sshd[25522]: Failed password for invalid user ubuntu from 122.51.134.25 port 59558 ssh2
Sep 20 14:14:54 h1745522 sshd[25748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.134.25  user=root
Sep 20 14:14:55 h1745522 sshd[25748]: Failed password for root from 122.51.134.25 port 33866 ssh2
Sep 20 14:19:35 h1745522 sshd[25961]: Invalid user admin from 122.51.134.25 port 36400
Sep 20 14:19:35 h1745522 sshd[25961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.134.25
Sep 20 14:19:35 h1745522 sshd[25961]: Invalid user admin from 122.51.134.25 port 36400
Sep 20 1
...
2020-09-20 22:10:24
64.227.77.206 attackspambots
Sep 20 13:19:41 vm2 sshd[2840]: Failed password for root from 64.227.77.206 port 52346 ssh2
...
2020-09-20 22:03:49
178.44.217.235 attack
Sep 20 14:00:09 scw-focused-cartwright sshd[19638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.44.217.235
Sep 20 14:00:11 scw-focused-cartwright sshd[19638]: Failed password for invalid user admin from 178.44.217.235 port 59951 ssh2
2020-09-20 22:20:40
112.216.39.234 attackbotsspam
Sep 20 13:57:48 vps-51d81928 sshd[227735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.216.39.234  user=root
Sep 20 13:57:50 vps-51d81928 sshd[227735]: Failed password for root from 112.216.39.234 port 43974 ssh2
Sep 20 13:59:04 vps-51d81928 sshd[227774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.216.39.234  user=root
Sep 20 13:59:06 vps-51d81928 sshd[227774]: Failed password for root from 112.216.39.234 port 60070 ssh2
Sep 20 14:00:18 vps-51d81928 sshd[227813]: Invalid user esuser from 112.216.39.234 port 47928
...
2020-09-20 22:03:06
218.92.0.158 attack
Sep 20 16:00:15 MainVPS sshd[5832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158  user=root
Sep 20 16:00:17 MainVPS sshd[5832]: Failed password for root from 218.92.0.158 port 14656 ssh2
Sep 20 16:00:30 MainVPS sshd[5832]: Failed password for root from 218.92.0.158 port 14656 ssh2
Sep 20 16:00:15 MainVPS sshd[5832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158  user=root
Sep 20 16:00:17 MainVPS sshd[5832]: Failed password for root from 218.92.0.158 port 14656 ssh2
Sep 20 16:00:30 MainVPS sshd[5832]: Failed password for root from 218.92.0.158 port 14656 ssh2
Sep 20 16:00:15 MainVPS sshd[5832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158  user=root
Sep 20 16:00:17 MainVPS sshd[5832]: Failed password for root from 218.92.0.158 port 14656 ssh2
Sep 20 16:00:30 MainVPS sshd[5832]: Failed password for root from 218.92.0.158 port 14656 ssh2
Sep 20 16:
2020-09-20 22:25:56
102.187.80.50 attackbots
Unauthorised access (Sep 19) SRC=102.187.80.50 LEN=52 TTL=119 ID=25591 DF TCP DPT=445 WINDOW=8192 SYN
2020-09-20 22:31:46
222.186.30.35 attackspambots
Sep 20 15:59:29 abendstille sshd\[4770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35  user=root
Sep 20 15:59:30 abendstille sshd\[4847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35  user=root
Sep 20 15:59:31 abendstille sshd\[4770\]: Failed password for root from 222.186.30.35 port 63152 ssh2
Sep 20 15:59:32 abendstille sshd\[4847\]: Failed password for root from 222.186.30.35 port 15716 ssh2
Sep 20 15:59:33 abendstille sshd\[4770\]: Failed password for root from 222.186.30.35 port 63152 ssh2
...
2020-09-20 22:09:19
159.20.100.35 attackbots
SSH/22 MH Probe, BF, Hack -
2020-09-20 22:00:38

最近上报的IP列表

139.98.73.100 174.56.72.181 29.38.17.183 162.46.189.36
124.141.30.63 236.84.10.96 3.175.158.27 177.230.21.99
126.239.101.64 163.206.252.152 211.18.114.192 29.237.0.184
9.225.148.136 201.203.6.104 150.34.211.112 128.36.24.50
156.98.86.197 47.227.105.126 160.37.212.37 251.124.59.200