必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.68.82.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7623
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.68.82.28.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025032901 1800 900 604800 86400

;; Query time: 160 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 30 07:46:06 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 28.82.68.121.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 28.82.68.121.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
193.242.195.222 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-30 22:55:48
181.115.156.59 attack
Jan 30 15:03:51 server sshd\[8375\]: Invalid user ujjendra from 181.115.156.59
Jan 30 15:03:51 server sshd\[8375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.115.156.59 
Jan 30 15:03:53 server sshd\[8375\]: Failed password for invalid user ujjendra from 181.115.156.59 port 48220 ssh2
Jan 30 17:34:11 server sshd\[32192\]: Invalid user nachni from 181.115.156.59
Jan 30 17:34:11 server sshd\[32192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.115.156.59 
...
2020-01-30 22:39:46
179.197.34.6 attackspam
Honeypot attack, port: 445, PTR: 179-197-34-6.user.veloxzone.com.br.
2020-01-30 22:42:46
94.137.9.246 attack
Honeypot attack, port: 445, PTR: host246.net137-9.omkc.ru.
2020-01-30 22:36:47
52.90.217.199 attackbotsspam
Honeypot attack, port: 445, PTR: ec2-52-90-217-199.compute-1.amazonaws.com.
2020-01-30 22:41:16
115.203.105.61 attackbotsspam
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2020-01-30 22:47:38
115.238.59.165 attackspam
Jan 30 15:15:55 sd-53420 sshd\[11314\]: Invalid user informix from 115.238.59.165
Jan 30 15:15:55 sd-53420 sshd\[11314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.59.165
Jan 30 15:15:57 sd-53420 sshd\[11314\]: Failed password for invalid user informix from 115.238.59.165 port 52996 ssh2
Jan 30 15:20:25 sd-53420 sshd\[11744\]: Invalid user raghupati from 115.238.59.165
Jan 30 15:20:25 sd-53420 sshd\[11744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.59.165
...
2020-01-30 22:49:55
109.194.63.77 attack
Unauthorized connection attempt detected from IP address 109.194.63.77 to port 81 [J]
2020-01-30 23:07:01
222.186.175.155 attackbotsspam
2020-1-30 3:48:05 PM: failed ssh attempt
2020-01-30 22:52:18
171.6.207.16 attackbots
Honeypot attack, port: 81, PTR: mx-ll-171.6.207-16.dynamic.3bb.co.th.
2020-01-30 22:48:12
13.58.240.153 attackbots
Forbidden directory scan :: 2020/01/30 13:37:44 [error] 992#992: *8119 access forbidden by rule, client: 13.58.240.153, server: [censored_2], request: "HEAD /~onixpw/cfg/AppleID.logln.myaccount.JAZ2834HQSD7Q7SD6Q6SD67QSD5Q7S6D6QSD76QSD67Q67D6QQSJDQLJF HTTP/1.1", host: "[censored_2]"
2020-01-30 22:54:45
42.117.20.54 attackbots
Unauthorized connection attempt detected from IP address 42.117.20.54 to port 23 [J]
2020-01-30 23:10:10
102.40.238.212 attackspambots
Unauthorized connection attempt detected from IP address 102.40.238.212 to port 23 [J]
2020-01-30 23:07:59
80.66.81.143 attackspam
Jan 30 15:11:42 srv01 postfix/smtpd\[22985\]: warning: unknown\[80.66.81.143\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 30 15:12:02 srv01 postfix/smtpd\[22967\]: warning: unknown\[80.66.81.143\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 30 15:29:01 srv01 postfix/smtpd\[28007\]: warning: unknown\[80.66.81.143\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 30 15:29:22 srv01 postfix/smtpd\[29119\]: warning: unknown\[80.66.81.143\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 30 15:30:31 srv01 postfix/smtpd\[29128\]: warning: unknown\[80.66.81.143\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-01-30 22:46:06
104.161.77.90 attackspambots
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2020-01-30 23:07:35

最近上报的IP列表

200.159.24.230 5.84.180.74 73.92.93.162 121.124.84.235
23.75.155.39 205.12.33.188 18.66.169.93 17.191.246.29
136.37.206.144 23.164.123.93 225.78.110.79 75.45.197.75
2.17.45.137 246.131.183.83 144.141.77.67 76.200.227.237
196.245.125.30 253.244.12.255 213.167.226.231 4.244.147.35