必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Australia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.216.162.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16972
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.216.162.142.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 03:59:04 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
142.162.216.121.in-addr.arpa domain name pointer cpe-121-216-162-142.wb03.wa.asp.telstra.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.162.216.121.in-addr.arpa	name = cpe-121-216-162-142.wb03.wa.asp.telstra.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
217.68.216.155 attack
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 03:08:24
51.75.195.39 attack
Jul  9 04:16:00 vtv3 sshd\[20045\]: Invalid user mc from 51.75.195.39 port 34918
Jul  9 04:16:00 vtv3 sshd\[20045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.195.39
Jul  9 04:16:02 vtv3 sshd\[20045\]: Failed password for invalid user mc from 51.75.195.39 port 34918 ssh2
Jul  9 04:19:09 vtv3 sshd\[21376\]: Invalid user ts3bot from 51.75.195.39 port 40106
Jul  9 04:19:09 vtv3 sshd\[21376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.195.39
Jul  9 04:29:49 vtv3 sshd\[26206\]: Invalid user honey from 51.75.195.39 port 40876
Jul  9 04:29:49 vtv3 sshd\[26206\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.195.39
Jul  9 04:29:51 vtv3 sshd\[26206\]: Failed password for invalid user honey from 51.75.195.39 port 40876 ssh2
Jul  9 04:31:58 vtv3 sshd\[27515\]: Invalid user hadoop from 51.75.195.39 port 57966
Jul  9 04:31:58 vtv3 sshd\[27515\]: pam_unix\(sshd:aut
2019-10-28 03:40:48
196.200.181.2 attackspam
Oct 27 14:23:44 v22018076622670303 sshd\[3474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.200.181.2  user=root
Oct 27 14:23:46 v22018076622670303 sshd\[3474\]: Failed password for root from 196.200.181.2 port 53474 ssh2
Oct 27 14:28:10 v22018076622670303 sshd\[3511\]: Invalid user andres from 196.200.181.2 port 44913
Oct 27 14:28:10 v22018076622670303 sshd\[3511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.200.181.2
...
2019-10-28 03:21:17
134.209.252.119 attackbots
Oct 27 18:37:17 ip-172-31-62-245 sshd\[612\]: Invalid user 123qwaszx from 134.209.252.119\
Oct 27 18:37:20 ip-172-31-62-245 sshd\[612\]: Failed password for invalid user 123qwaszx from 134.209.252.119 port 52136 ssh2\
Oct 27 18:40:59 ip-172-31-62-245 sshd\[733\]: Invalid user pixel from 134.209.252.119\
Oct 27 18:41:01 ip-172-31-62-245 sshd\[733\]: Failed password for invalid user pixel from 134.209.252.119 port 34208 ssh2\
Oct 27 18:44:48 ip-172-31-62-245 sshd\[761\]: Invalid user sdfkhjh from 134.209.252.119\
2019-10-28 03:18:59
186.103.223.10 attackspam
Oct 27 03:34:11 php1 sshd\[13377\]: Invalid user vincintz from 186.103.223.10
Oct 27 03:34:11 php1 sshd\[13377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.103.223.10
Oct 27 03:34:12 php1 sshd\[13377\]: Failed password for invalid user vincintz from 186.103.223.10 port 58475 ssh2
Oct 27 03:39:01 php1 sshd\[13913\]: Invalid user poliana from 186.103.223.10
Oct 27 03:39:01 php1 sshd\[13913\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.103.223.10
2019-10-28 03:47:39
141.98.80.204 attackbots
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-10-28 03:44:33
217.68.215.254 attackspam
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 03:31:38
217.68.215.31 attackspam
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 03:26:54
217.68.215.46 attack
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 03:19:51
217.68.215.213 attackspambots
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 03:37:28
118.89.30.90 attackspam
$f2bV_matches
2019-10-28 03:30:39
217.68.215.71 attackspambots
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 03:17:19
217.68.215.188 attackbots
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 03:42:18
217.68.215.5 attackbotsspam
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 03:21:05
217.68.215.248 attackspambots
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 03:32:01

最近上报的IP列表

74.178.142.132 94.138.165.200 87.99.233.235 143.194.208.133
228.149.118.131 207.35.35.143 209.55.117.102 42.181.70.129
7.239.45.195 175.42.213.94 191.127.7.231 252.253.141.174
215.196.102.130 80.149.5.31 65.157.233.185 8.67.106.86
214.90.44.15 87.112.117.110 120.46.234.49 167.104.180.66