必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.198.242.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31975
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.198.242.11.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 01:46:56 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 11.242.198.121.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.242.198.121.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
115.97.230.150 attack
Oct  3 20:39:55 netserv300 sshd[9382]: Connection from 115.97.230.150 port 57119 on 178.63.236.17 port 22
Oct  3 20:39:55 netserv300 sshd[9383]: Connection from 115.97.230.150 port 57134 on 178.63.236.21 port 22
Oct  3 20:39:55 netserv300 sshd[9384]: Connection from 115.97.230.150 port 57153 on 178.63.236.22 port 22
Oct  3 20:39:55 netserv300 sshd[9385]: Connection from 115.97.230.150 port 57152 on 178.63.236.18 port 22
Oct  3 20:39:55 netserv300 sshd[9386]: Connection from 115.97.230.150 port 57168 on 178.63.236.20 port 22
Oct  3 20:39:55 netserv300 sshd[9387]: Connection from 115.97.230.150 port 57175 on 178.63.236.16 port 22
Oct  3 20:39:55 netserv300 sshd[9388]: Connection from 115.97.230.150 port 57189 on 178.63.236.19 port 22
Oct  3 20:39:57 netserv300 sshd[9390]: Connection from 115.97.230.150 port 57233 on 178.63.236.21 port 22
Oct  3 20:39:57 netserv300 sshd[9392]: Connection from 115.97.230.150 port 57239 on 178.63.236.17 port 22
Oct  3 20:39:57 netserv300 sshd........
------------------------------
2020-10-05 05:49:59
145.239.6.55 attack
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: ns3083002.ip-145-239-6.eu.
2020-10-05 05:47:15
123.136.128.13 attack
Invalid user adela from 123.136.128.13 port 59788
2020-10-05 06:03:16
188.166.251.87 attackbotsspam
Oct  4 23:41:40 router sshd[30486]: Failed password for root from 188.166.251.87 port 33216 ssh2
Oct  4 23:45:18 router sshd[30540]: Failed password for root from 188.166.251.87 port 35713 ssh2
...
2020-10-05 05:56:22
45.55.32.34 attackspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-10-05 06:13:54
52.231.92.23 attackbots
Oct  4 21:02:41 ns382633 sshd\[720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.231.92.23  user=root
Oct  4 21:02:42 ns382633 sshd\[720\]: Failed password for root from 52.231.92.23 port 35748 ssh2
Oct  4 21:11:18 ns382633 sshd\[2331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.231.92.23  user=root
Oct  4 21:11:20 ns382633 sshd\[2331\]: Failed password for root from 52.231.92.23 port 33004 ssh2
Oct  4 21:15:16 ns382633 sshd\[3152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.231.92.23  user=root
2020-10-05 06:16:48
111.72.193.182 attack
Oct  4 00:53:58 srv01 postfix/smtpd\[30998\]: warning: unknown\[111.72.193.182\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  4 00:54:10 srv01 postfix/smtpd\[30998\]: warning: unknown\[111.72.193.182\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  4 00:54:26 srv01 postfix/smtpd\[30998\]: warning: unknown\[111.72.193.182\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  4 00:54:45 srv01 postfix/smtpd\[30998\]: warning: unknown\[111.72.193.182\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  4 00:54:57 srv01 postfix/smtpd\[30998\]: warning: unknown\[111.72.193.182\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-10-05 05:49:10
116.72.87.105 attackspambots
Automatic report - Port Scan Attack
2020-10-05 06:15:51
139.59.83.179 attackspam
Oct  4 17:26:42 NPSTNNYC01T sshd[26897]: Failed password for root from 139.59.83.179 port 54556 ssh2
Oct  4 17:29:44 NPSTNNYC01T sshd[27299]: Failed password for root from 139.59.83.179 port 40056 ssh2
...
2020-10-05 06:10:19
112.85.42.81 attack
2020-10-05T00:41:20.193871lavrinenko.info sshd[17727]: Failed password for root from 112.85.42.81 port 25672 ssh2
2020-10-05T00:41:25.150897lavrinenko.info sshd[17727]: Failed password for root from 112.85.42.81 port 25672 ssh2
2020-10-05T00:41:28.823163lavrinenko.info sshd[17727]: Failed password for root from 112.85.42.81 port 25672 ssh2
2020-10-05T00:41:33.428586lavrinenko.info sshd[17727]: Failed password for root from 112.85.42.81 port 25672 ssh2
2020-10-05T00:41:37.586281lavrinenko.info sshd[17727]: Failed password for root from 112.85.42.81 port 25672 ssh2
...
2020-10-05 05:45:11
164.90.190.60 attackspam
 TCP (SYN) 164.90.190.60:43425 -> port 19477, len 44
2020-10-05 06:01:30
119.28.160.192 attackbots
[ssh] SSH attack
2020-10-05 05:47:43
192.3.255.139 attackbots
Oct  4 18:59:31 mx sshd[379]: Failed password for root from 192.3.255.139 port 47580 ssh2
2020-10-05 06:11:42
165.227.129.37 attackbots
Automatic report - Banned IP Access
2020-10-05 06:02:51
92.204.164.42 attackspam
1601805098 - 10/04/2020 11:51:38 Host: 92.204.164.42/92.204.164.42 Port: 22 TCP Blocked
2020-10-05 05:46:31

最近上报的IP列表

176.46.80.27 250.249.161.4 69.60.213.97 133.195.127.15
20.233.132.51 7.43.16.183 250.248.84.193 228.237.47.221
157.172.158.166 90.147.219.43 210.200.135.22 8.151.177.168
253.50.81.149 226.62.155.24 133.34.83.67 161.33.185.75
150.141.213.139 181.234.212.201 170.159.3.21 145.68.102.251