必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.80.239.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21835
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.80.239.229.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 17:52:57 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
229.239.80.121.in-addr.arpa domain name pointer 121-80-239-229f1.hyg1.eonet.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
229.239.80.121.in-addr.arpa	name = 121-80-239-229f1.hyg1.eonet.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
138.68.233.112 attack
Automatic report - XMLRPC Attack
2020-06-30 01:26:08
128.199.244.150 attackbots
128.199.244.150 - - [29/Jun/2020:14:08:44 +0200] "POST /wp-login.php HTTP/1.1" 200 5416 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
128.199.244.150 - - [29/Jun/2020:14:08:48 +0200] "POST /wp-login.php HTTP/1.1" 200 5404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
128.199.244.150 - - [29/Jun/2020:14:08:52 +0200] "POST /wp-login.php HTTP/1.1" 200 5403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
128.199.244.150 - - [29/Jun/2020:14:08:59 +0200] "POST /wp-login.php HTTP/1.1" 200 5416 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
128.199.244.150 - - [29/Jun/2020:14:09:03 +0200] "POST /wp-login.php HTTP/1.1" 200 5404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-30 01:20:08
113.165.80.155 attack
06/29/2020-07:08:41.710645 113.165.80.155 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-06-30 01:38:41
162.241.142.103 attackspambots
Scanned 333 unique addresses for 2 unique TCP ports in 24 hours (ports 4649,9606)
2020-06-30 01:06:15
91.240.118.113 attack
 TCP (SYN) 91.240.118.113:47837 -> port 3380, len 44
2020-06-30 01:41:13
125.64.94.131 attack
 TCP (SYN) 125.64.94.131:56060 -> port 8001, len 44
2020-06-30 01:32:15
186.248.93.43 attack
Jun 29 16:34:23 sip sshd[17138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.248.93.43
Jun 29 16:34:26 sip sshd[17138]: Failed password for invalid user hml from 186.248.93.43 port 29697 ssh2
Jun 29 16:50:55 sip sshd[23239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.248.93.43
2020-06-30 01:17:32
95.211.209.158 attack
Automatic Report - Banned IP Access
2020-06-30 01:19:49
182.155.205.181 attackbotsspam
 TCP (SYN) 182.155.205.181:9654 -> port 23, len 40
2020-06-30 01:02:50
218.92.0.250 attack
Jun 29 17:02:00 localhost sshd[48588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.250  user=root
Jun 29 17:02:02 localhost sshd[48588]: Failed password for root from 218.92.0.250 port 5833 ssh2
Jun 29 17:02:05 localhost sshd[48588]: Failed password for root from 218.92.0.250 port 5833 ssh2
Jun 29 17:02:00 localhost sshd[48588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.250  user=root
Jun 29 17:02:02 localhost sshd[48588]: Failed password for root from 218.92.0.250 port 5833 ssh2
Jun 29 17:02:05 localhost sshd[48588]: Failed password for root from 218.92.0.250 port 5833 ssh2
Jun 29 17:02:00 localhost sshd[48588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.250  user=root
Jun 29 17:02:02 localhost sshd[48588]: Failed password for root from 218.92.0.250 port 5833 ssh2
Jun 29 17:02:05 localhost sshd[48588]: Failed password for roo
...
2020-06-30 01:09:51
159.65.131.92 attackspam
Jun 29 16:01:10 game-panel sshd[864]: Failed password for root from 159.65.131.92 port 49760 ssh2
Jun 29 16:04:55 game-panel sshd[983]: Failed password for support from 159.65.131.92 port 48084 ssh2
2020-06-30 01:15:11
158.58.184.51 attackbotsspam
Jun 29 15:40:59 lnxmysql61 sshd[6509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.58.184.51
Jun 29 15:40:59 lnxmysql61 sshd[6509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.58.184.51
2020-06-30 01:38:04
59.125.25.7 attack
timhelmke.de 59.125.25.7 [29/Jun/2020:13:08:55 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4260 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
timhelmke.de 59.125.25.7 [29/Jun/2020:13:09:01 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4260 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
2020-06-30 01:16:33
46.218.7.227 attackspambots
5x Failed Password
2020-06-30 01:09:18
104.131.46.166 attackbots
Jun 29 16:53:48 gestao sshd[26982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.46.166 
Jun 29 16:53:50 gestao sshd[26982]: Failed password for invalid user rliu from 104.131.46.166 port 47200 ssh2
Jun 29 16:55:58 gestao sshd[27048]: Failed password for root from 104.131.46.166 port 37078 ssh2
...
2020-06-30 01:08:51

最近上报的IP列表

250.177.252.33 72.93.161.208 154.223.234.177 2.148.57.246
89.82.64.44 154.188.52.183 52.155.178.99 248.35.69.243
230.225.228.237 90.179.128.240 190.160.139.121 137.64.253.93
178.178.57.134 81.108.127.153 126.112.25.50 185.18.47.227
17.193.35.254 242.95.220.118 139.2.72.4 170.204.165.87