必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.21.91.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23565
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.21.91.116.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 16:42:32 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 116.91.21.121.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 121.21.91.116.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.254.205.6 attackspam
Oct  3 10:59:14 web8 sshd\[28451\]: Invalid user esther from 51.254.205.6
Oct  3 10:59:14 web8 sshd\[28451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.205.6
Oct  3 10:59:16 web8 sshd\[28451\]: Failed password for invalid user esther from 51.254.205.6 port 33600 ssh2
Oct  3 11:03:38 web8 sshd\[30591\]: Invalid user server from 51.254.205.6
Oct  3 11:03:38 web8 sshd\[30591\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.205.6
2019-10-03 19:11:17
124.94.79.1 attack
Unauthorised access (Oct  3) SRC=124.94.79.1 LEN=40 TTL=49 ID=27552 TCP DPT=8080 WINDOW=43233 SYN 
Unauthorised access (Oct  3) SRC=124.94.79.1 LEN=40 TTL=49 ID=37318 TCP DPT=8080 WINDOW=43233 SYN 
Unauthorised access (Oct  2) SRC=124.94.79.1 LEN=40 TTL=49 ID=48496 TCP DPT=8080 WINDOW=54681 SYN 
Unauthorised access (Oct  2) SRC=124.94.79.1 LEN=40 TTL=49 ID=598 TCP DPT=8080 WINDOW=63649 SYN 
Unauthorised access (Oct  2) SRC=124.94.79.1 LEN=40 TTL=49 ID=12246 TCP DPT=8080 WINDOW=54681 SYN
2019-10-03 19:10:51
118.25.193.128 attack
$f2bV_matches
2019-10-03 19:48:49
35.228.188.244 attackspam
Lines containing failures of 35.228.188.244 (max 1000)
Sep 30 10:25:28 localhost sshd[6076]: Invalid user newsletter from 35.228.188.244 port 48424
Sep 30 10:25:28 localhost sshd[6076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.228.188.244 
Sep 30 10:25:30 localhost sshd[6076]: Failed password for invalid user newsletter from 35.228.188.244 port 48424 ssh2
Sep 30 10:25:31 localhost sshd[6076]: Received disconnect from 35.228.188.244 port 48424:11: Bye Bye [preauth]
Sep 30 10:25:31 localhost sshd[6076]: Disconnected from invalid user newsletter 35.228.188.244 port 48424 [preauth]
Sep 30 10:41:15 localhost sshd[8988]: Invalid user harris from 35.228.188.244 port 48100
Sep 30 10:41:15 localhost sshd[8988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.228.188.244 
Sep 30 10:41:17 localhost sshd[8988]: Failed password for invalid user harris from 35.228.188.244 port 48100 ssh2
Sep 3........
------------------------------
2019-10-03 19:24:43
222.186.15.18 attack
Oct  3 14:12:01 pkdns2 sshd\[38924\]: Failed password for root from 222.186.15.18 port 38558 ssh2Oct  3 14:12:05 pkdns2 sshd\[38924\]: Failed password for root from 222.186.15.18 port 38558 ssh2Oct  3 14:12:07 pkdns2 sshd\[38924\]: Failed password for root from 222.186.15.18 port 38558 ssh2Oct  3 14:13:00 pkdns2 sshd\[38955\]: Failed password for root from 222.186.15.18 port 16609 ssh2Oct  3 14:13:02 pkdns2 sshd\[38955\]: Failed password for root from 222.186.15.18 port 16609 ssh2Oct  3 14:13:05 pkdns2 sshd\[38955\]: Failed password for root from 222.186.15.18 port 16609 ssh2
...
2019-10-03 19:16:20
77.247.110.226 attack
\[2019-10-03 06:56:21\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-03T06:56:21.045-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="1780901148333554014",SessionID="0x7f1e1c57d008",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.226/54182",ACLName="no_extension_match"
\[2019-10-03 06:57:05\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-03T06:57:05.108-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="1790901148333554014",SessionID="0x7f1e1c02d9c8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.226/62662",ACLName="no_extension_match"
\[2019-10-03 06:57:31\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-03T06:57:31.243-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="1810901148333554014",SessionID="0x7f1e1c57d008",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.226/49844",
2019-10-03 19:19:45
118.25.216.111 attackbots
$f2bV_matches
2019-10-03 19:41:28
121.40.66.129 attackspam
Oct  2 19:54:09 our-server-hostname postfix/smtpd[24236]: connect from unknown[121.40.66.129]
Oct x@x
Oct x@x
Oct x@x
Oct  2 19:54:54 our-server-hostname postfix/smtpd[24236]: lost connection after RCPT from unknown[121.40.66.129]
Oct  2 19:54:54 our-server-hostname postfix/smtpd[24236]: disconnect from unknown[121.40.66.129]
Oct  2 20:09:58 our-server-hostname postfix/smtpd[13967]: connect from unknown[121.40.66.129]
Oct  2 20:09:59 our-server-hostname postfix/smtpd[26014]: connect from unknown[121.40.66.129]
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct  2 20:10:28 our-server-hostname postfix/smtpd[13967]: lost connection after EHLO from unknown[121.40.66.129]
Oct  2 20:10:28 our-server-hostname postfix/smtpd[13967]: disconnect from unknown[121.40.66.129]
Oct  2 20:10:48 our-server-hostname postfix/smtpd[26014]: lost connection after RCPT from unknown[121.40.66.129]
Oct  2 20:10:48 our-server-hostname postfix/smtpd[26014]: disconnect from unknown[121.40.66.129]
Oct  2 20:12:05 ........
-------------------------------
2019-10-03 19:27:56
159.203.201.234 attack
port scan and connect, tcp 8080 (http-proxy)
2019-10-03 19:19:21
118.25.22.142 attackbotsspam
$f2bV_matches
2019-10-03 19:40:46
106.12.7.56 attack
Oct  3 03:29:51 plusreed sshd[25305]: Invalid user trendimsa1.0 from 106.12.7.56
...
2019-10-03 19:39:36
175.124.43.123 attack
Oct  2 21:46:42 web1 sshd\[25804\]: Invalid user user from 175.124.43.123
Oct  2 21:46:42 web1 sshd\[25804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.124.43.123
Oct  2 21:46:44 web1 sshd\[25804\]: Failed password for invalid user user from 175.124.43.123 port 61776 ssh2
Oct  2 21:50:59 web1 sshd\[26188\]: Invalid user admin from 175.124.43.123
Oct  2 21:50:59 web1 sshd\[26188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.124.43.123
2019-10-03 19:23:50
118.25.195.244 attack
Invalid user hj from 118.25.195.244 port 47404
2019-10-03 19:47:19
49.70.86.234 attack
Automatic report - Malicious Script Upload
2019-10-03 19:21:45
132.232.182.190 attackbots
2019-08-22 08:03:07,081 fail2ban.actions        [878]: NOTICE  [sshd] Ban 132.232.182.190
2019-08-22 11:09:33,062 fail2ban.actions        [878]: NOTICE  [sshd] Ban 132.232.182.190
2019-08-22 14:17:25,135 fail2ban.actions        [878]: NOTICE  [sshd] Ban 132.232.182.190
...
2019-10-03 19:45:00

最近上报的IP列表

80.69.94.81 51.178.137.101 36.229.103.22 230.172.154.48
234.206.163.7 124.126.66.216 8.213.33.10 66.210.56.206
115.23.28.113 61.6.133.171 200.61.157.244 135.157.117.32
142.9.168.178 231.167.202.178 179.181.131.5 17.254.100.147
138.136.16.243 218.85.134.229 241.176.76.37 65.234.39.41