必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Korea

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Korea Telecom

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.145.201.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28412
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;121.145.201.116.		IN	A

;; AUTHORITY SECTION:
.			3465	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052600 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon May 27 00:20:26 CST 2019
;; MSG SIZE  rcvd: 119

HOST信息:
Host 116.201.145.121.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 116.201.145.121.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.51.44.6 attackbotsspam
2020-06-26T01:29:55.564860suse-nuc sshd[18556]: User root from 106.51.44.6 not allowed because listed in DenyUsers
...
2020-06-26 17:30:03
223.205.249.10 attackspambots
1593143485 - 06/26/2020 05:51:25 Host: 223.205.249.10/223.205.249.10 Port: 445 TCP Blocked
2020-06-26 17:11:31
209.141.59.184 attackbots
2020-06-26T10:57:49.843216hz01.yumiweb.com sshd\[21873\]: Invalid user 49.2.13.11 from 209.141.59.184 port 37720
2020-06-26T11:00:00.575576hz01.yumiweb.com sshd\[21879\]: Invalid user 173.244.210.29 from 209.141.59.184 port 60828
2020-06-26T11:02:14.959366hz01.yumiweb.com sshd\[21910\]: Invalid user 35.247.143.121 from 209.141.59.184 port 55716
...
2020-06-26 17:12:50
68.183.104.88 attack
$f2bV_matches
2020-06-26 17:35:31
182.151.3.137 attackspam
Jun 26 19:02:28 NG-HHDC-SVS-001 sshd[10845]: Invalid user qxj from 182.151.3.137
...
2020-06-26 17:45:47
66.70.160.187 attackspambots
66.70.160.187 - - [26/Jun/2020:10:16:35 +0100] "POST /wp-login.php HTTP/1.1" 200 2013 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
66.70.160.187 - - [26/Jun/2020:10:16:36 +0100] "POST /wp-login.php HTTP/1.1" 200 1951 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
66.70.160.187 - - [26/Jun/2020:10:16:38 +0100] "POST /wp-login.php HTTP/1.1" 200 1993 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-26 17:46:33
202.77.105.100 attackspam
Jun 26 10:06:47 sshgateway sshd\[26218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.77.105.100  user=root
Jun 26 10:06:49 sshgateway sshd\[26218\]: Failed password for root from 202.77.105.100 port 42068 ssh2
Jun 26 10:08:21 sshgateway sshd\[26238\]: Invalid user 3 from 202.77.105.100
2020-06-26 17:27:37
162.144.141.141 attack
162.144.141.141 - - [26/Jun/2020:05:41:53 +0200] "POST /xmlrpc.php HTTP/1.1" 403 31 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
162.144.141.141 - - [26/Jun/2020:05:51:12 +0200] "POST /xmlrpc.php HTTP/1.1" 403 31 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-26 17:22:54
187.0.165.229 attack
port 23
2020-06-26 17:48:46
195.158.26.238 attackspambots
Port scan denied
2020-06-26 17:09:32
79.137.39.102 attackbotsspam
79.137.39.102 - - [26/Jun/2020:05:34:20 +0200] "POST /wp-login.php HTTP/1.1" 200 5281 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
79.137.39.102 - - [26/Jun/2020:05:57:03 +0200] "POST /wp-login.php HTTP/1.1" 200 5180 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
79.137.39.102 - - [26/Jun/2020:05:57:04 +0200] "POST /wp-login.php HTTP/1.1" 200 5180 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
79.137.39.102 - - [26/Jun/2020:05:57:04 +0200] "POST /wp-login.php HTTP/1.1" 200 5177 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
79.137.39.102 - - [26/Jun/2020:05:57:05 +0200] "POST /wp-login.php HTTP/1.1" 200 5173 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-26 17:25:19
165.22.69.147 attackspam
Jun 26 06:12:30 jumpserver sshd[222139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.69.147 
Jun 26 06:12:30 jumpserver sshd[222139]: Invalid user wzy from 165.22.69.147 port 44760
Jun 26 06:12:32 jumpserver sshd[222139]: Failed password for invalid user wzy from 165.22.69.147 port 44760 ssh2
...
2020-06-26 17:17:53
144.76.60.198 attackbotsspam
abuseConfidenceScore blocked for 12h
2020-06-26 17:20:02
51.68.198.75 attack
Invalid user git from 51.68.198.75 port 45632
2020-06-26 17:38:21
122.50.208.3 attackbotsspam
Brute forcing RDP port 3389
2020-06-26 17:26:45

最近上报的IP列表

156.177.238.11 45.240.19.127 42.230.98.191 149.20.114.80
70.96.220.253 23.233.14.57 93.158.161.161 159.2.128.39
178.237.192.2 178.106.21.101 70.128.147.249 161.109.19.52
34.219.231.145 51.15.224.119 205.102.15.36 97.57.93.162
220.184.237.216 202.32.243.25 188.75.223.11 221.178.129.221