必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.205.75.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21815
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.205.75.164.			IN	A

;; AUTHORITY SECTION:
.			137	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 20:10:03 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
164.75.205.121.in-addr.arpa domain name pointer 164.75.205.121.broad.qz.fj.dynamic.163data.com.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.75.205.121.in-addr.arpa	name = 164.75.205.121.broad.qz.fj.dynamic.163data.com.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
121.55.240.208 attackbots
Port probing on unauthorized port 5555
2020-08-31 18:42:59
198.12.32.123 attackspam
ssh intrusion attempt
2020-08-31 18:14:37
120.92.117.182 attackspam
Aug 31 06:44:25 lukav-desktop sshd\[18700\]: Invalid user andres from 120.92.117.182
Aug 31 06:44:25 lukav-desktop sshd\[18700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.117.182
Aug 31 06:44:28 lukav-desktop sshd\[18700\]: Failed password for invalid user andres from 120.92.117.182 port 9426 ssh2
Aug 31 06:49:37 lukav-desktop sshd\[18769\]: Invalid user ubnt from 120.92.117.182
Aug 31 06:49:37 lukav-desktop sshd\[18769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.117.182
2020-08-31 18:24:55
117.4.20.140 attackspam
1598845777 - 08/31/2020 05:49:37 Host: 117.4.20.140/117.4.20.140 Port: 445 TCP Blocked
2020-08-31 18:26:50
195.24.207.252 attackspam
 TCP (SYN) 195.24.207.252:62233 -> port 22, len 40
2020-08-31 18:49:30
159.89.171.81 attackbotsspam
Aug 31 06:50:33 sip sshd[1474602]: Invalid user hj from 159.89.171.81 port 57282
Aug 31 06:50:35 sip sshd[1474602]: Failed password for invalid user hj from 159.89.171.81 port 57282 ssh2
Aug 31 06:55:00 sip sshd[1474630]: Invalid user sysadmin from 159.89.171.81 port 35928
...
2020-08-31 18:09:09
94.177.214.9 attackspambots
94.177.214.9 - - [31/Aug/2020:10:05:29 +0200] "POST /wp-login.php HTTP/1.0" 200 4747 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-31 18:12:44
51.210.107.15 attackbotsspam
Aug 31 12:23:22 OPSO sshd\[11322\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.107.15  user=root
Aug 31 12:23:24 OPSO sshd\[11322\]: Failed password for root from 51.210.107.15 port 54630 ssh2
Aug 31 12:28:22 OPSO sshd\[11899\]: Invalid user qwt from 51.210.107.15 port 44830
Aug 31 12:28:22 OPSO sshd\[11899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.107.15
Aug 31 12:28:24 OPSO sshd\[11899\]: Failed password for invalid user qwt from 51.210.107.15 port 44830 ssh2
2020-08-31 18:37:56
50.30.84.219 attackspam
port
2020-08-31 18:39:16
128.199.239.204 attackspam
Port Scan detected!
...
2020-08-31 18:15:55
218.92.0.145 attackbots
2020-08-31T08:18:07.528626afi-git.jinr.ru sshd[8045]: Failed password for root from 218.92.0.145 port 16652 ssh2
2020-08-31T08:18:15.001894afi-git.jinr.ru sshd[8045]: Failed password for root from 218.92.0.145 port 16652 ssh2
2020-08-31T08:18:19.220859afi-git.jinr.ru sshd[8045]: Failed password for root from 218.92.0.145 port 16652 ssh2
2020-08-31T08:18:19.221017afi-git.jinr.ru sshd[8045]: error: maximum authentication attempts exceeded for root from 218.92.0.145 port 16652 ssh2 [preauth]
2020-08-31T08:18:19.221032afi-git.jinr.ru sshd[8045]: Disconnecting: Too many authentication failures [preauth]
...
2020-08-31 18:26:32
139.59.75.111 attackbotsspam
Aug 31 05:44:23 ns382633 sshd\[17051\]: Invalid user lynx from 139.59.75.111 port 36274
Aug 31 05:44:23 ns382633 sshd\[17051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.75.111
Aug 31 05:44:25 ns382633 sshd\[17051\]: Failed password for invalid user lynx from 139.59.75.111 port 36274 ssh2
Aug 31 05:49:23 ns382633 sshd\[17853\]: Invalid user ubuntu from 139.59.75.111 port 45040
Aug 31 05:49:23 ns382633 sshd\[17853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.75.111
2020-08-31 18:31:40
218.92.0.247 attack
Aug 31 07:09:16 vps1 sshd[19333]: Failed none for invalid user root from 218.92.0.247 port 5719 ssh2
Aug 31 07:09:17 vps1 sshd[19333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.247  user=root
Aug 31 07:09:18 vps1 sshd[19333]: Failed password for invalid user root from 218.92.0.247 port 5719 ssh2
Aug 31 07:09:22 vps1 sshd[19333]: Failed password for invalid user root from 218.92.0.247 port 5719 ssh2
Aug 31 07:09:25 vps1 sshd[19333]: Failed password for invalid user root from 218.92.0.247 port 5719 ssh2
Aug 31 07:09:29 vps1 sshd[19333]: Failed password for invalid user root from 218.92.0.247 port 5719 ssh2
Aug 31 07:09:34 vps1 sshd[19333]: Failed password for invalid user root from 218.92.0.247 port 5719 ssh2
Aug 31 07:09:36 vps1 sshd[19333]: error: maximum authentication attempts exceeded for invalid user root from 218.92.0.247 port 5719 ssh2 [preauth]
...
2020-08-31 18:28:32
118.117.89.173 attackspambots
(smtpauth) Failed SMTP AUTH login from 118.117.89.173 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-08-31 08:19:45 login authenticator failed for (xqR5REBDS) [118.117.89.173]: 535 Incorrect authentication data (set_id=huangying)
2020-08-31 18:18:24
176.122.129.114 attackspambots
Aug 31 12:47:28 lukav-desktop sshd\[10754\]: Invalid user sinusbot from 176.122.129.114
Aug 31 12:47:28 lukav-desktop sshd\[10754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.122.129.114
Aug 31 12:47:30 lukav-desktop sshd\[10754\]: Failed password for invalid user sinusbot from 176.122.129.114 port 42912 ssh2
Aug 31 12:49:59 lukav-desktop sshd\[10762\]: Invalid user ajay from 176.122.129.114
Aug 31 12:49:59 lukav-desktop sshd\[10762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.122.129.114
2020-08-31 18:35:48

最近上报的IP列表

121.205.73.222 121.205.75.202 121.205.69.147 121.205.75.68
121.205.72.232 121.205.8.156 121.205.8.61 121.205.84.102
114.237.154.140 121.205.84.113 121.205.84.115 121.205.84.119
121.205.84.13 121.205.8.176 121.205.84.127 121.205.84.109
121.205.84.116 121.205.84.130 121.205.84.136 121.205.84.139