必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Baozidian

省份(region): Shanxi

国家(country): China

运营商(isp): China Unicom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.30.46.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8339
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.30.46.45.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022012601 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 27 00:16:23 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
45.46.30.121.in-addr.arpa domain name pointer 45.46.30.121.adsl-pool.sx.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.46.30.121.in-addr.arpa	name = 45.46.30.121.adsl-pool.sx.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
93.39.184.17 attack
Invalid user admin from 93.39.184.17 port 37946
2020-09-03 16:46:31
13.127.58.123 attackbots
reported through recidive - multiple failed attempts(SSH)
2020-09-03 17:04:16
185.220.103.8 attackbotsspam
Tried sshing with brute force.
2020-09-03 16:52:30
164.132.98.75 attack
Invalid user magento from 164.132.98.75 port 57433
2020-09-03 17:10:24
101.251.206.30 attackspam
 TCP (SYN) 101.251.206.30:41246 -> port 27487, len 44
2020-09-03 17:17:07
45.185.135.47 attackspambots
Automatic report - Banned IP Access
2020-09-03 17:21:30
167.99.96.114 attackspam
Invalid user network from 167.99.96.114 port 34624
2020-09-03 17:22:22
106.52.249.148 attackbots
Port probing on unauthorized port 6379
2020-09-03 16:54:25
195.206.105.217 attack
[02/Sep/2020:22:26:04 +0200] "GET /wp-config.php.original HTTP/1.1"
2020-09-03 16:44:19
138.204.225.120 attack
20/9/2@13:29:03: FAIL: Alarm-Network address from=138.204.225.120
20/9/2@13:29:04: FAIL: Alarm-Network address from=138.204.225.120
...
2020-09-03 17:06:45
192.163.207.200 attackbots
192.163.207.200 - - [03/Sep/2020:09:40:56 +0200] "GET /wp-login.php HTTP/1.1" 200 9040 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
192.163.207.200 - - [03/Sep/2020:09:40:59 +0200] "POST /wp-login.php HTTP/1.1" 200 9291 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
192.163.207.200 - - [03/Sep/2020:09:41:01 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-03 16:59:04
62.210.215.34 attackspam
Invalid user postgres from 62.210.215.34 port 35198
2020-09-03 17:18:27
104.33.60.133 attack
Port 22 Scan, PTR: None
2020-09-03 17:20:09
106.12.201.16 attackspambots
Invalid user sce from 106.12.201.16 port 46536
2020-09-03 17:12:33
61.177.172.177 attackbots
Sep  3 10:47:14 vm1 sshd[6508]: Failed password for root from 61.177.172.177 port 9776 ssh2
Sep  3 10:47:27 vm1 sshd[6508]: error: maximum authentication attempts exceeded for root from 61.177.172.177 port 9776 ssh2 [preauth]
...
2020-09-03 16:57:59

最近上报的IP列表

92.7.171.142 69.248.96.145 170.58.7.10 142.149.25.244
92.206.118.40 185.83.143.157 142.10.36.226 85.37.86.217
102.178.168.136 69.87.213.115 108.132.12.68 172.22.30.81
255.192.159.84 73.202.74.143 248.10.180.148 140.71.215.146
54.254.129.1 54.254.129.197 52.229.141.86 155.124.163.131