必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.21.126.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32193
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.21.126.239.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012101 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 05:39:46 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
b'Host 239.126.21.121.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 121.21.126.239.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.67.106.137 attackbotsspam
Aug  5 05:35:39 roki-contabo sshd\[16227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.106.137  user=root
Aug  5 05:35:42 roki-contabo sshd\[16227\]: Failed password for root from 114.67.106.137 port 34600 ssh2
Aug  5 05:46:33 roki-contabo sshd\[16666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.106.137  user=root
Aug  5 05:46:35 roki-contabo sshd\[16666\]: Failed password for root from 114.67.106.137 port 40182 ssh2
Aug  5 05:51:30 roki-contabo sshd\[16825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.106.137  user=root
...
2020-08-05 16:37:49
119.45.6.43 attackbots
2020-08-05T05:44:46.306598vps751288.ovh.net sshd\[30129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.6.43  user=root
2020-08-05T05:44:48.373862vps751288.ovh.net sshd\[30129\]: Failed password for root from 119.45.6.43 port 37440 ssh2
2020-08-05T05:48:00.794019vps751288.ovh.net sshd\[30167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.6.43  user=root
2020-08-05T05:48:02.494830vps751288.ovh.net sshd\[30167\]: Failed password for root from 119.45.6.43 port 42308 ssh2
2020-08-05T05:51:24.906204vps751288.ovh.net sshd\[30213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.6.43  user=root
2020-08-05 16:44:00
194.61.26.89 attackspam
2020-08-05T07:37:45.080315shield sshd\[30238\]: Invalid user solarus from 194.61.26.89 port 26070
2020-08-05T07:37:45.090193shield sshd\[30238\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.61.26.89
2020-08-05T07:37:47.231191shield sshd\[30238\]: Failed password for invalid user solarus from 194.61.26.89 port 26070 ssh2
2020-08-05T07:37:47.335065shield sshd\[30240\]: Invalid user admin from 194.61.26.89 port 26858
2020-08-05T07:37:47.344079shield sshd\[30240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.61.26.89
2020-08-05 16:20:20
49.88.112.70 attackspam
Aug  5 10:26:34 mx sshd[233227]: Failed password for root from 49.88.112.70 port 25619 ssh2
Aug  5 10:27:23 mx sshd[233231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.70  user=root
Aug  5 10:27:25 mx sshd[233231]: Failed password for root from 49.88.112.70 port 35978 ssh2
Aug  5 10:28:17 mx sshd[233233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.70  user=root
Aug  5 10:28:18 mx sshd[233233]: Failed password for root from 49.88.112.70 port 32232 ssh2
...
2020-08-05 16:28:29
218.92.0.251 attack
$f2bV_matches
2020-08-05 16:21:34
123.48.82.113 attackspam
SSH authentication failure x 6 reported by Fail2Ban
...
2020-08-05 16:37:20
89.248.168.112 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-08-05 16:15:17
139.199.78.228 attackbotsspam
Aug  5 05:39:09 Ubuntu-1404-trusty-64-minimal sshd\[25630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.78.228  user=root
Aug  5 05:39:12 Ubuntu-1404-trusty-64-minimal sshd\[25630\]: Failed password for root from 139.199.78.228 port 32812 ssh2
Aug  5 05:48:48 Ubuntu-1404-trusty-64-minimal sshd\[30288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.78.228  user=root
Aug  5 05:48:50 Ubuntu-1404-trusty-64-minimal sshd\[30288\]: Failed password for root from 139.199.78.228 port 60586 ssh2
Aug  5 05:52:12 Ubuntu-1404-trusty-64-minimal sshd\[32128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.78.228  user=root
2020-08-05 16:11:15
115.79.24.173 attackbotsspam
20/8/5@03:38:28: FAIL: Alarm-Network address from=115.79.24.173
20/8/5@03:38:28: FAIL: Alarm-Network address from=115.79.24.173
...
2020-08-05 16:09:14
51.91.212.80 attack
Unauthorized connection attempt detected from IP address 51.91.212.80 to port 110
2020-08-05 16:46:26
91.72.171.138 attackbotsspam
2020-08-05T08:20:58.462250abusebot-7.cloudsearch.cf sshd[28285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.72.171.138  user=root
2020-08-05T08:21:00.908965abusebot-7.cloudsearch.cf sshd[28285]: Failed password for root from 91.72.171.138 port 57540 ssh2
2020-08-05T08:24:05.804004abusebot-7.cloudsearch.cf sshd[28312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.72.171.138  user=root
2020-08-05T08:24:08.255756abusebot-7.cloudsearch.cf sshd[28312]: Failed password for root from 91.72.171.138 port 48128 ssh2
2020-08-05T08:27:11.865066abusebot-7.cloudsearch.cf sshd[28351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.72.171.138  user=root
2020-08-05T08:27:14.517619abusebot-7.cloudsearch.cf sshd[28351]: Failed password for root from 91.72.171.138 port 38712 ssh2
2020-08-05T08:30:10.805191abusebot-7.cloudsearch.cf sshd[28382]: pam_unix(sshd:auth): authe
...
2020-08-05 16:30:35
159.65.23.22 attack
CF RAY ID: 5bda95b24b320772 IP Class: noRecord URI: /wp-login.php
2020-08-05 16:27:09
111.230.29.17 attack
Aug  5 06:23:11 ip106 sshd[30275]: Failed password for root from 111.230.29.17 port 35230 ssh2
...
2020-08-05 16:36:19
121.28.69.85 attack
Aug  5 06:28:56 game-panel sshd[16066]: Failed password for root from 121.28.69.85 port 60705 ssh2
Aug  5 06:31:50 game-panel sshd[16443]: Failed password for root from 121.28.69.85 port 47400 ssh2
2020-08-05 16:41:09
94.102.49.159 attackbotsspam
Aug  5 10:27:09 debian-2gb-nbg1-2 kernel: \[18874491.734647\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.49.159 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=15257 PROTO=TCP SPT=57709 DPT=15877 WINDOW=1024 RES=0x00 SYN URGP=0
2020-08-05 16:27:40

最近上报的IP列表

116.235.215.168 32.85.61.83 44.123.216.88 93.155.47.130
228.47.12.132 31.224.247.122 66.36.111.225 24.180.167.32
58.179.53.200 137.136.21.233 136.136.245.48 46.210.253.61
81.150.47.230 254.141.6.248 226.72.242.47 148.96.212.144
128.138.222.136 99.116.183.17 173.82.222.242 123.25.151.212