必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Taizhou

省份(region): Jiangsu

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.230.136.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40054
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;121.230.136.221.		IN	A

;; AUTHORITY SECTION:
.			214	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020051701 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 18 06:31:10 CST 2020
;; MSG SIZE  rcvd: 119
HOST信息:
Host 221.136.230.121.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 221.136.230.121.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.125.65.99 attackspambots
\[2019-11-07 10:10:27\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-07T10:10:27.525-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="6073701148343508002",SessionID="0x7fdf2c8a8ab8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.65.99/63996",ACLName="no_extension_match"
\[2019-11-07 10:11:08\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-07T10:11:08.283-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="6402501148556213011",SessionID="0x7fdf2c7cd048",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.65.99/49478",ACLName="no_extension_match"
\[2019-11-07 10:11:29\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-07T10:11:29.712-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="6737301148585359060",SessionID="0x7fdf2c003608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.65.99/60652",ACLNam
2019-11-07 23:20:16
175.211.112.242 attackbotsspam
2019-11-07T12:39:08.360520abusebot-5.cloudsearch.cf sshd\[19651\]: Invalid user robert from 175.211.112.242 port 51864
2019-11-07T12:39:08.365366abusebot-5.cloudsearch.cf sshd\[19651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.211.112.242
2019-11-07 22:48:18
196.41.122.39 attackbotsspam
wp bruteforce
2019-11-07 22:36:01
94.177.217.49 attackbots
Nov  7 15:12:33 srv01 sshd[30490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.217.49  user=root
Nov  7 15:12:36 srv01 sshd[30490]: Failed password for root from 94.177.217.49 port 41750 ssh2
Nov  7 15:16:31 srv01 sshd[30651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.217.49  user=root
Nov  7 15:16:33 srv01 sshd[30651]: Failed password for root from 94.177.217.49 port 51066 ssh2
Nov  7 15:20:18 srv01 sshd[30861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.217.49  user=root
Nov  7 15:20:20 srv01 sshd[30861]: Failed password for root from 94.177.217.49 port 60378 ssh2
...
2019-11-07 22:38:30
85.73.105.144 attack
/phpmyadmin/
2019-11-07 22:45:49
51.38.95.12 attackspam
Nov  7 04:47:15 firewall sshd[27916]: Failed password for root from 51.38.95.12 port 51620 ssh2
Nov  7 04:50:46 firewall sshd[28024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.95.12  user=root
Nov  7 04:50:47 firewall sshd[28024]: Failed password for root from 51.38.95.12 port 60116 ssh2
...
2019-11-07 22:40:29
119.160.128.54 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/119.160.128.54/ 
 
 BN - 1H : (1)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BN 
 NAME ASN : ASN10094 
 
 IP : 119.160.128.54 
 
 CIDR : 119.160.128.0/24 
 
 PREFIX COUNT : 135 
 
 UNIQUE IP COUNT : 117248 
 
 
 ATTACKS DETECTED ASN10094 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-07 07:18:13 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-07 22:38:01
47.17.177.110 attackspambots
Nov  7 04:43:21 php1 sshd\[31557\]: Invalid user 24680 from 47.17.177.110
Nov  7 04:43:21 php1 sshd\[31557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ool-2f11b16e.dyn.optonline.net
Nov  7 04:43:23 php1 sshd\[31557\]: Failed password for invalid user 24680 from 47.17.177.110 port 43148 ssh2
Nov  7 04:48:47 php1 sshd\[32145\]: Invalid user ytrewq from 47.17.177.110
Nov  7 04:48:47 php1 sshd\[32145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ool-2f11b16e.dyn.optonline.net
2019-11-07 23:14:53
137.101.196.164 attackbots
Connection by 137.101.196.164 on port: 81 got caught by honeypot at 11/7/2019 5:18:08 AM
2019-11-07 22:44:08
61.250.146.12 attackbots
Lines containing failures of 61.250.146.12
Nov  5 13:51:18 nextcloud sshd[29393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.250.146.12  user=r.r
Nov  5 13:51:21 nextcloud sshd[29393]: Failed password for r.r from 61.250.146.12 port 34720 ssh2
Nov  5 13:51:21 nextcloud sshd[29393]: Received disconnect from 61.250.146.12 port 34720:11: Bye Bye [preauth]
Nov  5 13:51:21 nextcloud sshd[29393]: Disconnected from authenticating user r.r 61.250.146.12 port 34720 [preauth]
Nov  5 14:06:53 nextcloud sshd[2004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.250.146.12  user=r.r
Nov  5 14:06:55 nextcloud sshd[2004]: Failed password for r.r from 61.250.146.12 port 34616 ssh2
Nov  5 14:06:56 nextcloud sshd[2004]: Received disconnect from 61.250.146.12 port 34616:11: Bye Bye [preauth]
Nov  5 14:06:56 nextcloud sshd[2004]: Disconnected from authenticating user r.r 61.250.146.12 port 34616 [pre........
------------------------------
2019-11-07 23:19:41
140.249.22.238 attackbots
Nov  7 15:48:34 vmanager6029 sshd\[9154\]: Invalid user com from 140.249.22.238 port 44880
Nov  7 15:48:34 vmanager6029 sshd\[9154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.22.238
Nov  7 15:48:36 vmanager6029 sshd\[9154\]: Failed password for invalid user com from 140.249.22.238 port 44880 ssh2
2019-11-07 23:22:03
115.159.65.195 attackbotsspam
(sshd) Failed SSH login from 115.159.65.195 (-): 5 in the last 3600 secs
2019-11-07 23:03:04
188.166.45.128 attack
11/07/2019-10:11:14.024025 188.166.45.128 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-07 23:13:16
159.203.197.23 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-07 22:34:24
185.176.27.254 attackspam
11/07/2019-09:57:41.405120 185.176.27.254 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-07 23:00:08

最近上报的IP列表

91.39.196.172 12.19.98.163 79.49.22.75 101.161.205.191
139.112.176.45 84.76.104.65 150.176.32.164 129.187.246.5
153.162.11.43 171.211.101.135 119.5.4.63 52.89.253.231
2.33.236.248 152.19.85.169 194.41.141.174 119.186.247.91
183.107.251.177 114.137.21.82 96.243.34.0 61.163.116.25