必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.68.136.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15109
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;121.68.136.12.			IN	A

;; AUTHORITY SECTION:
.			582	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010500 1800 900 604800 86400

;; Query time: 110 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 05 17:28:38 CST 2020
;; MSG SIZE  rcvd: 117
HOST信息:
Host 12.136.68.121.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.136.68.121.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.77.140.111 attack
Nov 27 12:52:37 web1 sshd\[21053\]: Invalid user meltsch from 51.77.140.111
Nov 27 12:52:37 web1 sshd\[21053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.140.111
Nov 27 12:52:39 web1 sshd\[21053\]: Failed password for invalid user meltsch from 51.77.140.111 port 50720 ssh2
Nov 27 12:58:36 web1 sshd\[21573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.140.111  user=root
Nov 27 12:58:38 web1 sshd\[21573\]: Failed password for root from 51.77.140.111 port 57854 ssh2
2019-11-28 07:53:45
222.186.169.192 attack
Nov 28 00:49:14 eventyay sshd[30054]: Failed password for root from 222.186.169.192 port 2000 ssh2
Nov 28 00:49:28 eventyay sshd[30054]: error: maximum authentication attempts exceeded for root from 222.186.169.192 port 2000 ssh2 [preauth]
Nov 28 00:49:33 eventyay sshd[30057]: Failed password for root from 222.186.169.192 port 20954 ssh2
...
2019-11-28 07:54:07
218.92.0.187 attack
Nov 28 00:19:54 v22018086721571380 sshd[24527]: error: maximum authentication attempts exceeded for root from 218.92.0.187 port 12060 ssh2 [preauth]
2019-11-28 07:27:17
167.114.230.252 attackbotsspam
Nov 27 17:02:54 dallas01 sshd[30825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.230.252
Nov 27 17:02:55 dallas01 sshd[30825]: Failed password for invalid user Njoseg from 167.114.230.252 port 50521 ssh2
Nov 27 17:08:51 dallas01 sshd[31867]: Failed password for root from 167.114.230.252 port 40337 ssh2
2019-11-28 07:34:14
143.137.177.166 attackbotsspam
port scan/probe/communication attempt; port 23
2019-11-28 07:19:18
117.50.20.112 attack
SSH-BruteForce
2019-11-28 07:39:11
36.72.108.76 attackspambots
Unauthorised access (Nov 28) SRC=36.72.108.76 LEN=48 TTL=248 ID=27852 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov 27) SRC=36.72.108.76 LEN=52 TTL=248 ID=24739 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov 25) SRC=36.72.108.76 LEN=48 TTL=248 ID=3301 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-28 07:44:53
109.107.178.203 attack
Fail2Ban Ban Triggered
2019-11-28 07:36:59
112.85.42.182 attack
Nov 28 00:20:12 sd-53420 sshd\[925\]: User root from 112.85.42.182 not allowed because none of user's groups are listed in AllowGroups
Nov 28 00:20:13 sd-53420 sshd\[925\]: Failed none for invalid user root from 112.85.42.182 port 44312 ssh2
Nov 28 00:20:13 sd-53420 sshd\[925\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.182  user=root
Nov 28 00:20:15 sd-53420 sshd\[925\]: Failed password for invalid user root from 112.85.42.182 port 44312 ssh2
Nov 28 00:20:18 sd-53420 sshd\[925\]: Failed password for invalid user root from 112.85.42.182 port 44312 ssh2
...
2019-11-28 07:21:26
178.33.185.70 attackspam
Nov 28 00:11:17 OPSO sshd\[21708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.185.70  user=root
Nov 28 00:11:19 OPSO sshd\[21708\]: Failed password for root from 178.33.185.70 port 26518 ssh2
Nov 28 00:17:18 OPSO sshd\[22658\]: Invalid user greifer from 178.33.185.70 port 8336
Nov 28 00:17:18 OPSO sshd\[22658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.185.70
Nov 28 00:17:21 OPSO sshd\[22658\]: Failed password for invalid user greifer from 178.33.185.70 port 8336 ssh2
2019-11-28 07:18:53
81.30.152.54 attackspambots
\[2019-11-27 18:41:49\] NOTICE\[2754\] chan_sip.c: Registration from '\' failed for '81.30.152.54:50942' - Wrong password
\[2019-11-27 18:41:49\] SECURITY\[2765\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-11-27T18:41:49.358-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="1022",SessionID="0x7f26c4bb3d98",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.30.152.54/50942",Challenge="61a1cd82",ReceivedChallenge="61a1cd82",ReceivedHash="056fdadfccdb8c95be737232ea0dcd27"
\[2019-11-27 18:42:18\] NOTICE\[2754\] chan_sip.c: Registration from '\' failed for '81.30.152.54:61383' - Wrong password
\[2019-11-27 18:42:18\] SECURITY\[2765\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-11-27T18:42:18.780-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="8298",SessionID="0x7f26c4a90648",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.30.152.54
2019-11-28 07:42:36
188.166.8.178 attack
Nov 28 00:50:29 mout sshd[1734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.8.178  user=root
Nov 28 00:50:32 mout sshd[1734]: Failed password for root from 188.166.8.178 port 46468 ssh2
2019-11-28 07:56:35
187.174.87.54 attack
27.11.2019 23:59:24 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2019-11-28 07:33:58
203.172.66.216 attack
Nov 27 23:56:52 tux-35-217 sshd\[22004\]: Invalid user zandwijken from 203.172.66.216 port 42602
Nov 27 23:56:52 tux-35-217 sshd\[22004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.172.66.216
Nov 27 23:56:54 tux-35-217 sshd\[22004\]: Failed password for invalid user zandwijken from 203.172.66.216 port 42602 ssh2
Nov 28 00:04:15 tux-35-217 sshd\[22041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.172.66.216  user=root
...
2019-11-28 07:55:00
81.45.56.199 attackbotsspam
Nov 27 18:32:48 ny01 sshd[27727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.45.56.199
Nov 27 18:32:50 ny01 sshd[27727]: Failed password for invalid user snapper from 81.45.56.199 port 50130 ssh2
Nov 27 18:39:30 ny01 sshd[28367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.45.56.199
2019-11-28 07:46:39

最近上报的IP列表

123.210.7.1 62.105.44.155 68.183.120.30 96.21.211.70
132.190.10.95 51.231.135.175 201.146.58.246 52.202.225.175
149.150.231.61 182.78.6.225 99.168.227.33 178.215.36.47
47.55.209.50 187.197.218.28 225.150.114.96 68.183.106.145
244.3.38.87 185.164.252.40 42.53.163.48 14.31.62.131