必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
121.231.139.220 attackbotsspam
IP reached maximum auth failures
2020-03-25 00:48:41
121.231.139.220 attack
(ftpd) Failed FTP login from 121.231.139.220 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Mar 23 11:05:23 ir1 pure-ftpd: (?@121.231.139.220) [WARNING] Authentication failed for user [anonymous]
2020-03-23 18:46:44
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.231.139.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.231.139.100.		IN	A

;; AUTHORITY SECTION:
.			411	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 20:30:22 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 100.139.231.121.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 100.139.231.121.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.111.70.12 attackbots
Unauthorized connection attempt from IP address 103.111.70.12 on Port 445(SMB)
2020-10-11 16:29:47
185.220.101.202 attackspambots
22 attempts against mh-misbehave-ban on sonic
2020-10-11 16:32:23
81.68.123.185 attackbots
SSH Brute-Force Attack
2020-10-11 16:26:41
141.98.80.22 attackbotsspam
[H1.VM1] Blocked by UFW
2020-10-11 16:21:12
49.88.112.111 attack
Oct 11 08:03:15 email sshd\[4368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.111  user=root
Oct 11 08:03:17 email sshd\[4368\]: Failed password for root from 49.88.112.111 port 36859 ssh2
Oct 11 08:05:02 email sshd\[4666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.111  user=root
Oct 11 08:05:05 email sshd\[4666\]: Failed password for root from 49.88.112.111 port 44268 ssh2
Oct 11 08:05:07 email sshd\[4666\]: Failed password for root from 49.88.112.111 port 44268 ssh2
...
2020-10-11 16:07:50
74.120.14.77 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-10-11 16:16:30
165.22.61.112 attackbots
Oct 11 05:48:46 hcbbdb sshd\[30843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.61.112  user=root
Oct 11 05:48:48 hcbbdb sshd\[30843\]: Failed password for root from 165.22.61.112 port 30700 ssh2
Oct 11 05:52:56 hcbbdb sshd\[31198\]: Invalid user student from 165.22.61.112
Oct 11 05:52:56 hcbbdb sshd\[31198\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.61.112
Oct 11 05:52:59 hcbbdb sshd\[31198\]: Failed password for invalid user student from 165.22.61.112 port 26941 ssh2
2020-10-11 16:27:51
114.42.207.37 attackbots
TCP Port Scanning
2020-10-11 16:21:44
68.183.120.37 attackbotsspam
Oct 11 08:11:23 mavik sshd[19964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.120.37  user=root
Oct 11 08:11:25 mavik sshd[19964]: Failed password for root from 68.183.120.37 port 51368 ssh2
Oct 11 08:14:55 mavik sshd[20174]: Invalid user customer2 from 68.183.120.37
Oct 11 08:14:55 mavik sshd[20174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.120.37
Oct 11 08:14:57 mavik sshd[20174]: Failed password for invalid user customer2 from 68.183.120.37 port 55878 ssh2
...
2020-10-11 16:02:34
103.245.181.2 attack
$f2bV_matches
2020-10-11 15:57:24
118.24.243.53 attackspambots
Oct 11 09:22:50 sso sshd[8597]: Failed password for root from 118.24.243.53 port 48470 ssh2
...
2020-10-11 16:15:54
106.13.230.219 attackbotsspam
Oct 11 13:57:04 itv-usvr-02 sshd[22020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.230.219  user=root
Oct 11 13:57:06 itv-usvr-02 sshd[22020]: Failed password for root from 106.13.230.219 port 37394 ssh2
Oct 11 13:58:36 itv-usvr-02 sshd[22069]: Invalid user wwwdata from 106.13.230.219 port 54106
Oct 11 13:58:36 itv-usvr-02 sshd[22069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.230.219
Oct 11 13:58:36 itv-usvr-02 sshd[22069]: Invalid user wwwdata from 106.13.230.219 port 54106
Oct 11 13:58:38 itv-usvr-02 sshd[22069]: Failed password for invalid user wwwdata from 106.13.230.219 port 54106 ssh2
2020-10-11 16:04:36
221.229.218.40 attackbots
Oct 11 09:45:58 haigwepa sshd[15660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.229.218.40 
Oct 11 09:46:00 haigwepa sshd[15660]: Failed password for invalid user school from 221.229.218.40 port 45392 ssh2
...
2020-10-11 16:08:25
106.12.46.179 attackbots
(sshd) Failed SSH login from 106.12.46.179 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 11 03:36:47 optimus sshd[8191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.46.179  user=root
Oct 11 03:36:49 optimus sshd[8191]: Failed password for root from 106.12.46.179 port 40854 ssh2
Oct 11 03:41:56 optimus sshd[9470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.46.179  user=root
Oct 11 03:41:58 optimus sshd[9470]: Failed password for root from 106.12.46.179 port 41772 ssh2
Oct 11 03:46:29 optimus sshd[10365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.46.179  user=root
2020-10-11 16:22:43
189.127.144.22 attackspambots
Unauthorized connection attempt detected from IP address 189.127.144.22 to port 80
2020-10-11 16:03:09

最近上报的IP列表

121.231.120.11 121.231.113.92 121.231.129.247 121.231.124.209
121.231.141.56 121.231.118.194 121.231.123.115 121.231.112.217
121.231.119.211 121.231.123.215 121.231.118.154 121.231.146.230
121.231.148.33 121.231.145.13 115.49.176.21 121.231.144.198
121.231.151.139 121.231.147.29 121.231.149.55 121.231.151.20