必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Muan

省份(region): Jeollanam-do

国家(country): South Korea

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.149.78.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21337
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.149.78.16.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 15:40:27 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 16.78.149.121.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 16.78.149.121.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
62.234.61.180 attackspam
2696/tcp 6769/tcp 2958/tcp...
[2020-05-16/07-08]16pkt,15pt.(tcp)
2020-07-08 22:09:37
106.53.220.175 attackbotsspam
Jul  8 13:47:31 ns381471 sshd[24899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.220.175
Jul  8 13:47:32 ns381471 sshd[24899]: Failed password for invalid user zhuht from 106.53.220.175 port 57772 ssh2
2020-07-08 22:16:35
195.54.160.180 attackspambots
2020-07-08T16:19:33.118690vps773228.ovh.net sshd[29357]: Failed password for root from 195.54.160.180 port 57999 ssh2
2020-07-08T16:19:33.557128vps773228.ovh.net sshd[29359]: Invalid user admin from 195.54.160.180 port 5759
2020-07-08T16:19:33.606251vps773228.ovh.net sshd[29359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.54.160.180
2020-07-08T16:19:33.557128vps773228.ovh.net sshd[29359]: Invalid user admin from 195.54.160.180 port 5759
2020-07-08T16:19:35.328474vps773228.ovh.net sshd[29359]: Failed password for invalid user admin from 195.54.160.180 port 5759 ssh2
...
2020-07-08 22:31:04
107.6.169.250 attack
Unauthorized connection attempt detected from IP address 107.6.169.250 to port 2455
2020-07-08 22:24:48
51.255.199.33 attackspam
Jul  8 19:22:30 itv-usvr-01 sshd[21712]: Invalid user remote from 51.255.199.33
Jul  8 19:22:30 itv-usvr-01 sshd[21712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.199.33
Jul  8 19:22:30 itv-usvr-01 sshd[21712]: Invalid user remote from 51.255.199.33
Jul  8 19:22:32 itv-usvr-01 sshd[21712]: Failed password for invalid user remote from 51.255.199.33 port 54690 ssh2
2020-07-08 22:22:46
2.176.108.42 attackbots
07/08/2020-07:47:29.544735 2.176.108.42 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-07-08 22:24:36
46.172.64.13 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2020-06-14/07-08]4pkt,1pt.(tcp)
2020-07-08 22:46:37
185.143.73.58 attackspam
Jul  8 16:32:50 srv01 postfix/smtpd\[23302\]: warning: unknown\[185.143.73.58\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  8 16:33:30 srv01 postfix/smtpd\[16630\]: warning: unknown\[185.143.73.58\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  8 16:34:07 srv01 postfix/smtpd\[16630\]: warning: unknown\[185.143.73.58\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  8 16:34:47 srv01 postfix/smtpd\[26466\]: warning: unknown\[185.143.73.58\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  8 16:35:25 srv01 postfix/smtpd\[26466\]: warning: unknown\[185.143.73.58\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-08 22:39:19
129.146.46.134 attackbotsspam
Jul  8 15:11:03 [host] sshd[16145]: Invalid user p
Jul  8 15:11:03 [host] sshd[16145]: pam_unix(sshd:
Jul  8 15:11:05 [host] sshd[16145]: Failed passwor
2020-07-08 22:48:30
151.236.63.34 attack
Jul  8 07:24:53 mockhub sshd[5886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.236.63.34
Jul  8 07:24:55 mockhub sshd[5886]: Failed password for invalid user oreste from 151.236.63.34 port 52424 ssh2
...
2020-07-08 22:42:38
14.54.42.152 attackbots
Unauthorized connection attempt detected from IP address 14.54.42.152 to port 23
2020-07-08 22:30:09
162.243.139.150 attackspam
[Wed Jun 17 15:34:26 2020] - DDoS Attack From IP: 162.243.139.150 Port: 57028
2020-07-08 22:39:51
46.218.7.227 attackspam
Jul  8 13:47:23 sshgateway sshd\[6860\]: Invalid user user9 from 46.218.7.227
Jul  8 13:47:23 sshgateway sshd\[6860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.218.7.227
Jul  8 13:47:25 sshgateway sshd\[6860\]: Failed password for invalid user user9 from 46.218.7.227 port 34340 ssh2
2020-07-08 22:28:25
80.211.190.104 attackbotsspam
Jul  8 15:20:28 ncomp sshd[30797]: Invalid user www from 80.211.190.104
Jul  8 15:20:28 ncomp sshd[30797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.190.104
Jul  8 15:20:28 ncomp sshd[30797]: Invalid user www from 80.211.190.104
Jul  8 15:20:29 ncomp sshd[30797]: Failed password for invalid user www from 80.211.190.104 port 44174 ssh2
2020-07-08 22:21:12
45.144.65.49 attackspambots
Jul  8 14:41:49 ms-srv sshd[27020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.144.65.49
Jul  8 14:41:51 ms-srv sshd[27020]: Failed password for invalid user nieto from 45.144.65.49 port 36149 ssh2
2020-07-08 22:43:31

最近上报的IP列表

45.101.222.51 245.60.133.208 134.51.145.150 80.91.65.106
25.0.145.135 210.39.86.112 214.195.138.236 217.251.11.209
194.79.127.11 152.100.66.196 139.133.1.161 169.204.104.7
81.91.17.245 206.115.91.190 5.208.169.28 251.101.47.45
100.193.140.182 132.73.83.101 8.211.224.44 103.227.47.236