必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): New Zealand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.75.204.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61525
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.75.204.140.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 20:21:27 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
140.204.75.121.in-addr.arpa domain name pointer 121-75-204-140.dyn.vf.net.nz.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.204.75.121.in-addr.arpa	name = 121-75-204-140.dyn.vf.net.nz.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.255.57.4 attackspam
139.255.57.4 - - - [23/Jul/2019:09:10:34 +0000] "GET /wp-includes/wlwmanifest.xml HTTP/1.1" 404 564 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36" "52.177.129.12" "-"
2019-07-24 02:04:43
118.137.233.225 attack
Spam Timestamp : 23-Jul-19 09:14 _ BlockList Provider  combined abuse _ (400)
2019-07-24 01:21:39
187.87.3.220 attackspam
failed_logins
2019-07-24 01:30:38
217.79.128.197 attackspambots
ICMP MP Probe, Scan -
2019-07-24 01:39:40
217.156.250.237 attackbotsspam
ICMP MP Probe, Scan -
2019-07-24 01:50:45
148.70.2.5 attackbots
Jul 23 19:39:36 OPSO sshd\[10848\]: Invalid user redmine from 148.70.2.5 port 40820
Jul 23 19:39:36 OPSO sshd\[10848\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.2.5
Jul 23 19:39:38 OPSO sshd\[10848\]: Failed password for invalid user redmine from 148.70.2.5 port 40820 ssh2
Jul 23 19:45:24 OPSO sshd\[12192\]: Invalid user git from 148.70.2.5 port 58896
Jul 23 19:45:24 OPSO sshd\[12192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.2.5
2019-07-24 01:53:00
139.59.34.17 attack
Jul 23 16:41:12 XXX sshd[19798]: Invalid user houx from 139.59.34.17 port 51250
2019-07-24 01:44:56
94.29.73.233 attackbotsspam
Automatic report - Banned IP Access
2019-07-24 02:05:43
206.180.162.6 attackbotsspam
firewall-block, port(s): 445/tcp
2019-07-24 02:06:18
104.248.157.14 attackspambots
Jul 23 11:06:26 MainVPS sshd[23307]: Invalid user cassandra from 104.248.157.14 port 53144
Jul 23 11:06:26 MainVPS sshd[23307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.157.14
Jul 23 11:06:26 MainVPS sshd[23307]: Invalid user cassandra from 104.248.157.14 port 53144
Jul 23 11:06:28 MainVPS sshd[23307]: Failed password for invalid user cassandra from 104.248.157.14 port 53144 ssh2
Jul 23 11:11:41 MainVPS sshd[23756]: Invalid user exploit from 104.248.157.14 port 49022
...
2019-07-24 01:21:03
112.64.34.165 attack
Jul 23 22:33:16 vibhu-HP-Z238-Microtower-Workstation sshd\[18640\]: Invalid user trevor from 112.64.34.165
Jul 23 22:33:16 vibhu-HP-Z238-Microtower-Workstation sshd\[18640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.34.165
Jul 23 22:33:19 vibhu-HP-Z238-Microtower-Workstation sshd\[18640\]: Failed password for invalid user trevor from 112.64.34.165 port 38147 ssh2
Jul 23 22:37:08 vibhu-HP-Z238-Microtower-Workstation sshd\[18767\]: Invalid user minecraft from 112.64.34.165
Jul 23 22:37:08 vibhu-HP-Z238-Microtower-Workstation sshd\[18767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.34.165
...
2019-07-24 01:16:53
85.93.133.178 attackbots
Jul 23 20:22:34 yabzik sshd[13395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.93.133.178
Jul 23 20:22:36 yabzik sshd[13395]: Failed password for invalid user magnifik@123 from 85.93.133.178 port 32435 ssh2
Jul 23 20:27:47 yabzik sshd[14981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.93.133.178
2019-07-24 01:32:39
103.78.181.184 attackbotsspam
TCP src-port=39251   dst-port=25    dnsbl-sorbs abuseat-org zen-spamhaus       (Project Honey Pot rated Suspicious)   (395)
2019-07-24 01:35:31
114.237.109.147 attackbotsspam
2019-07-23 10:20:12 H=(vps9567.com) [114.237.109.147]:53176 I=[10.100.18.20]:25 sender verify fail for : Unrouteable address
2019-07-23 x@x
2019-07-23 10:55:11 H=(kcic.com) [114.237.109.147]:17366 I=[10.100.18.20]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=114.237.109.147)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=114.237.109.147
2019-07-24 01:12:02
46.101.204.20 attack
Jul 23 17:58:31 yabzik sshd[29880]: Failed password for root from 46.101.204.20 port 45990 ssh2
Jul 23 18:03:00 yabzik sshd[31407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.204.20
Jul 23 18:03:01 yabzik sshd[31407]: Failed password for invalid user uniform from 46.101.204.20 port 41646 ssh2
2019-07-24 01:55:40

最近上报的IP列表

223.65.225.158 85.2.86.141 241.66.131.252 175.201.188.187
217.241.246.16 100.233.83.83 119.77.182.198 207.240.209.106
253.53.98.86 216.163.99.144 93.30.205.136 78.218.82.202
188.50.64.109 172.196.155.104 6.13.33.35 143.28.174.244
248.77.113.208 222.195.230.172 12.100.130.114 64.15.12.115