必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.207.104.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34971
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.207.104.239.		IN	A

;; AUTHORITY SECTION:
.			358	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 03:29:03 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
239.104.207.121.in-addr.arpa domain name pointer 239.104.207.121.broad.qz.fj.dynamic.163data.com.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
239.104.207.121.in-addr.arpa	name = 239.104.207.121.broad.qz.fj.dynamic.163data.com.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
198.108.67.105 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-10-03 17:57:13
222.186.175.151 attackbotsspam
Oct  3 11:39:06 root sshd[16447]: Failed password for root from 222.186.175.151 port 57654 ssh2
Oct  3 11:39:12 root sshd[16447]: Failed password for root from 222.186.175.151 port 57654 ssh2
Oct  3 11:39:18 root sshd[16447]: Failed password for root from 222.186.175.151 port 57654 ssh2
Oct  3 11:39:25 root sshd[16447]: Failed password for root from 222.186.175.151 port 57654 ssh2
...
2019-10-03 17:44:55
46.73.187.225 attack
Brute force RDP, port 3389
2019-10-03 17:55:40
138.68.140.76 attack
2019-08-18 20:18:37,508 fail2ban.actions        [878]: NOTICE  [sshd] Ban 138.68.140.76
2019-08-18 23:26:22,206 fail2ban.actions        [878]: NOTICE  [sshd] Ban 138.68.140.76
2019-08-19 02:30:50,934 fail2ban.actions        [878]: NOTICE  [sshd] Ban 138.68.140.76
...
2019-10-03 17:24:28
106.13.48.241 attack
Oct  3 09:09:54 mail1 sshd\[7913\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.48.241  user=alex
Oct  3 09:09:56 mail1 sshd\[7913\]: Failed password for alex from 106.13.48.241 port 43976 ssh2
Oct  3 09:15:37 mail1 sshd\[10487\]: Invalid user user from 106.13.48.241 port 53802
Oct  3 09:15:37 mail1 sshd\[10487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.48.241
Oct  3 09:15:39 mail1 sshd\[10487\]: Failed password for invalid user user from 106.13.48.241 port 53802 ssh2
...
2019-10-03 18:00:39
103.75.103.211 attackspambots
Oct  3 11:44:32 server sshd\[28664\]: Invalid user mdom from 103.75.103.211 port 48302
Oct  3 11:44:32 server sshd\[28664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.75.103.211
Oct  3 11:44:34 server sshd\[28664\]: Failed password for invalid user mdom from 103.75.103.211 port 48302 ssh2
Oct  3 11:49:29 server sshd\[14686\]: Invalid user ry from 103.75.103.211 port 60288
Oct  3 11:49:29 server sshd\[14686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.75.103.211
2019-10-03 17:41:00
35.186.145.141 attackbotsspam
Invalid user solr from 35.186.145.141 port 37876
2019-10-03 17:59:13
138.197.200.77 attackbots
2019-09-02 19:02:48,010 fail2ban.actions        [804]: NOTICE  [sshd] Ban 138.197.200.77
2019-09-02 22:07:33,199 fail2ban.actions        [804]: NOTICE  [sshd] Ban 138.197.200.77
2019-09-03 01:15:07,054 fail2ban.actions        [804]: NOTICE  [sshd] Ban 138.197.200.77
...
2019-10-03 17:43:57
46.38.144.146 attackbots
Oct  3 11:00:49 webserver postfix/smtpd\[24125\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  3 11:02:40 webserver postfix/smtpd\[24879\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  3 11:04:26 webserver postfix/smtpd\[24879\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  3 11:06:20 webserver postfix/smtpd\[24879\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  3 11:08:11 webserver postfix/smtpd\[25551\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-10-03 17:22:06
138.68.146.186 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2019-10-03 17:18:21
118.193.31.20 attackspambots
Oct  3 16:27:57 itv-usvr-02 sshd[23358]: Invalid user susuki from 118.193.31.20 port 44656
Oct  3 16:27:57 itv-usvr-02 sshd[23358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.193.31.20
Oct  3 16:27:57 itv-usvr-02 sshd[23358]: Invalid user susuki from 118.193.31.20 port 44656
Oct  3 16:27:59 itv-usvr-02 sshd[23358]: Failed password for invalid user susuki from 118.193.31.20 port 44656 ssh2
Oct  3 16:33:28 itv-usvr-02 sshd[23378]: Invalid user ubnt from 118.193.31.20 port 56546
2019-10-03 17:56:52
78.186.141.76 attackspam
Automatic report - Port Scan Attack
2019-10-03 17:21:43
178.255.126.198 attackspam
DATE:2019-10-03 07:19:47, IP:178.255.126.198, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-10-03 17:23:28
139.59.190.69 attackspam
2019-10-03T09:31:10.667801abusebot-3.cloudsearch.cf sshd\[11380\]: Invalid user deploy from 139.59.190.69 port 38165
2019-10-03 17:43:35
138.197.195.52 attackbots
Oct  3 11:32:17 dedicated sshd[29128]: Invalid user abcs from 138.197.195.52 port 55178
2019-10-03 17:47:26

最近上报的IP列表

121.207.104.102 121.206.48.41 121.207.104.108 121.207.104.55
121.207.104.86 121.207.104.39 121.207.61.66 121.207.92.22
121.207.93.192 121.207.93.70 121.207.93.206 121.21.25.48
121.217.171.229 121.212.141.112 121.237.169.67 121.22.124.86
121.237.169.96 121.237.246.114 121.24.149.211 121.238.252.86