必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Gwanak-gu

省份(region): Seoul

国家(country): South Korea

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.140.240.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22670
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;121.140.240.193.		IN	A

;; AUTHORITY SECTION:
.			128	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090901 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 10 08:00:26 CST 2020
;; MSG SIZE  rcvd: 119
HOST信息:
Host 193.240.140.121.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 193.240.140.121.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
194.26.29.110 attackbots
Mar 27 10:13:24 debian-2gb-nbg1-2 kernel: \[7559476.138800\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.110 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=8092 PROTO=TCP SPT=49927 DPT=17771 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-27 18:05:45
198.108.66.236 attackbots
Mar 27 06:06:28 debian-2gb-nbg1-2 kernel: \[7544660.571387\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=198.108.66.236 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=32 ID=5549 PROTO=TCP SPT=36612 DPT=9843 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-27 18:01:40
185.176.27.30 attackbotsspam
Mar 27 11:25:14 debian-2gb-nbg1-2 kernel: \[7563785.647277\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.30 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=18568 PROTO=TCP SPT=56622 DPT=9383 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-27 18:48:00
164.132.73.220 attack
firewall-block, port(s): 16000/tcp
2020-03-27 17:41:05
45.143.220.98 attackspam
scans 2 times in preceeding hours on the ports (in chronological order) 50802 50804
2020-03-27 18:37:04
162.243.131.129 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-27 18:20:44
185.176.221.238 attackspambots
SIP/5060 Probe, BF, Hack -
2020-03-27 18:13:03
209.159.144.250 attackspambots
" "
2020-03-27 18:00:21
198.108.66.234 attackspambots
12203/tcp 12510/tcp 9052/tcp...
[2020-02-08/03-27]112pkt,107pt.(tcp),1tp.(icmp)
2020-03-27 18:41:35
71.6.232.2 attack
SIP/5060 Probe, BF, Hack -
2020-03-27 18:33:43
185.175.93.78 attackspam
Port-scan: detected 101 distinct ports within a 24-hour window.
2020-03-27 18:50:35
185.176.27.162 attack
scans 17 times in preceeding hours on the ports (in chronological order) 5863 8743 4200 3361 1405 3370 1400 1616 9835 10055 10012 8895 3325 10033 60711 6819 4111 resulting in total of 218 scans from 185.176.27.0/24 block.
2020-03-27 18:45:36
185.202.1.34 attackbots
22022/tcp 2022/tcp 2202/tcp...
[2020-02-13/03-26]238pkt,81pt.(tcp)
2020-03-27 18:12:39
185.151.242.186 attackbots
Unauthorized connection attempt detected from IP address 185.151.242.186 to port 1001
2020-03-27 18:14:43
179.96.62.29 attack
20/3/27@00:20:29: FAIL: Alarm-Network address from=179.96.62.29
...
2020-03-27 18:17:30

最近上报的IP列表

49.38.112.220 63.144.9.217 182.90.185.67 95.64.224.170
81.239.200.136 163.10.243.110 93.119.62.204 188.18.49.246
90.34.121.52 113.119.5.12 98.204.136.49 91.91.247.146
139.59.25.135 125.81.190.155 90.215.27.184 102.247.109.23
195.165.212.42 203.202.185.222 106.163.120.51 153.203.245.68