必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.204.123.224
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38108
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.204.123.224.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 05:49:45 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
224.123.204.121.in-addr.arpa domain name pointer 224.123.204.121.board.fz.fj.dynamic.163data.com.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
224.123.204.121.in-addr.arpa	name = 224.123.204.121.board.fz.fj.dynamic.163data.com.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
183.80.89.54 attackspambots
Unauthorized connection attempt detected from IP address 183.80.89.54 to port 23 [J]
2020-01-21 00:43:22
139.212.172.170 attackspam
Unauthorized connection attempt detected from IP address 139.212.172.170 to port 1433 [T]
2020-01-21 01:16:02
124.205.141.245 attackbots
Unauthorized connection attempt detected from IP address 124.205.141.245 to port 22 [T]
2020-01-21 01:17:09
183.80.16.191 attackbotsspam
Unauthorized connection attempt detected from IP address 183.80.16.191 to port 23 [J]
2020-01-21 00:43:54
47.94.80.125 attackspam
Unauthorized connection attempt detected from IP address 47.94.80.125 to port 8080 [J]
2020-01-21 01:01:41
125.24.225.24 attackspam
Unauthorized connection attempt detected from IP address 125.24.225.24 to port 8000 [T]
2020-01-21 00:49:11
183.239.134.162 attackspam
Unauthorized connection attempt detected from IP address 183.239.134.162 to port 1433 [T]
2020-01-21 01:10:49
42.117.205.166 attack
Unauthorized connection attempt detected from IP address 42.117.205.166 to port 23 [J]
2020-01-21 01:03:11
170.106.81.221 attack
Unauthorized connection attempt detected from IP address 170.106.81.221 to port 5900 [J]
2020-01-21 00:44:41
172.105.218.213 attackbots
Unauthorized connection attempt detected from IP address 172.105.218.213 to port 21 [J]
2020-01-21 01:12:32
113.58.243.15 attackbots
The IP has triggered Cloudflare WAF. CF-Ray: 55811dcfaedd7716 | WAF_Rule_ID: a75424b44a1e4f27881d03344a122815 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: disqus.skk.moe | User-Agent: Mozilla/4.066686748 Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2020-01-21 00:53:20
106.75.116.12 attackspambots
Unauthorized connection attempt detected from IP address 106.75.116.12 to port 9999 [T]
2020-01-21 00:55:18
59.50.64.238 attackspambots
Unauthorized connection attempt detected from IP address 59.50.64.238 to port 23 [J]
2020-01-21 01:00:27
187.63.19.112 attackbotsspam
Unauthorized connection attempt detected from IP address 187.63.19.112 to port 81 [J]
2020-01-21 01:10:21
42.114.154.51 attack
Unauthorized connection attempt detected from IP address 42.114.154.51 to port 23 [J]
2020-01-21 01:03:47

最近上报的IP列表

114.47.105.151 198.122.19.201 47.219.83.91 120.66.242.72
51.252.124.138 69.94.89.250 224.30.238.178 155.174.10.62
193.255.144.157 225.35.194.29 37.109.112.254 95.205.176.214
26.240.81.73 119.145.234.193 94.157.247.95 55.141.235.178
162.93.197.130 116.198.5.251 46.93.109.112 70.119.217.31