必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Toride

省份(region): Ibaraki

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 121.104.130.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53172
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;121.104.130.14.			IN	A

;; Query time: 1 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Jun 26 18:02:32 CST 2021
;; MSG SIZE  rcvd: 43

'
HOST信息:
14.130.104.121.in-addr.arpa domain name pointer KD121104130014.ppp-bb.dion.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.130.104.121.in-addr.arpa	name = KD121104130014.ppp-bb.dion.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.128.51.253 attackbotsspam
SSH login attempts.
2020-10-07 16:11:31
139.186.67.94 attackbots
Oct  6 22:41:14 ns3164893 sshd[31962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.186.67.94  user=root
Oct  6 22:41:17 ns3164893 sshd[31962]: Failed password for root from 139.186.67.94 port 34528 ssh2
...
2020-10-07 16:20:45
118.232.97.232 attackspambots
Port probing on unauthorized port 2323
2020-10-07 16:17:28
193.228.91.123 attack
Port 22 Scan, PTR: None
2020-10-07 16:27:56
106.13.147.89 attackspambots
ssh brute force
2020-10-07 16:32:24
162.241.76.74 attackspam
Port scan: Attack repeated for 24 hours
2020-10-07 16:26:59
212.102.41.26 attackbotsspam
SSH Bruteforce attempt
2020-10-07 16:07:25
64.68.115.78 attackspam
recursive DNS query (.)
2020-10-07 16:21:37
194.61.27.245 attack
SIP/5060 Probe, BF, Hack -
2020-10-07 16:47:15
81.4.110.153 attackspambots
Oct  7 07:29:36 localhost sshd\[12692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.4.110.153  user=root
Oct  7 07:29:37 localhost sshd\[12692\]: Failed password for root from 81.4.110.153 port 37554 ssh2
Oct  7 07:33:05 localhost sshd\[12972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.4.110.153  user=root
Oct  7 07:33:07 localhost sshd\[12972\]: Failed password for root from 81.4.110.153 port 45314 ssh2
Oct  7 07:36:41 localhost sshd\[13242\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.4.110.153  user=root
...
2020-10-07 16:28:46
81.68.118.120 attackspambots
$f2bV_matches
2020-10-07 16:47:02
24.50.227.214 attack
xmlrpc attack
2020-10-07 16:45:46
110.54.153.155 attackbots
Unauthorized admin access - /admin/css/datepicker.css?v=913-new-social-icons34f0b7ad653faf15
2020-10-07 16:48:23
49.0.41.54 attackbotsspam
[f2b] sshd bruteforce, retries: 1
2020-10-07 16:51:08
101.255.65.138 attackspambots
5x Failed Password
2020-10-07 16:43:11

最近上报的IP列表

142.184.112.212 209.52.88.21 68.150.82.64 66.183.255.181
134.41.130.67 99.232.158.181 194.156.104.14 35.213.185.75
77.98.217.19 103.114.218.253 74.125.138.27 103.21.59.169
162.203.178.210 178.168.220.65 194.28.34.93 206.223.250.74
104.219.250.166 108.53.119.33 181.164.60.243 81.111.94.119