必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Koka

省份(region): Shiga

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.80.74.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29872
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;121.80.74.116.			IN	A

;; AUTHORITY SECTION:
.			546	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121001 1800 900 604800 86400

;; Query time: 181 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 11 04:33:37 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
116.74.80.121.in-addr.arpa domain name pointer 121-80-74-116f1.shg1.eonet.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
116.74.80.121.in-addr.arpa	name = 121-80-74-116f1.shg1.eonet.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
129.211.91.213 attackbots
SSH auth scanning - multiple failed logins
2020-10-02 18:00:50
144.76.6.230 attack
20 attempts against mh-misbehave-ban on lake
2020-10-02 18:11:03
45.119.83.164 attackspam
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.83.164 
Failed password for invalid user signature from 45.119.83.164 port 47116 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.83.164
2020-10-02 18:21:27
141.98.10.173 attackbots
Repeated RDP login failures. Last user: Administrateur
2020-10-02 17:54:12
52.80.175.139 attackbotsspam
Repeated RDP login failures. Last user: Portaria
2020-10-02 18:04:19
157.245.227.165 attack
sshd: Failed password for .... from 157.245.227.165 port 57568 ssh2 (5 attempts)
2020-10-02 18:08:54
120.31.204.22 attack
Repeated RDP login failures. Last user: Xerox
2020-10-02 18:01:08
91.236.116.119 attack
Repeated RDP login failures. Last user: Test
2020-10-02 17:55:06
185.202.2.181 attackspambots
RDP Brute-Force
2020-10-02 18:12:17
133.208.149.23 attack
Repeated RDP login failures. Last user: Testuser
2020-10-02 18:06:47
212.64.17.251 attack
Repeated RDP login failures. Last user: Guest
2020-10-02 17:57:43
88.209.116.204 attackbots
Repeated RDP login failures. Last user: Db2admin
2020-10-02 18:03:06
212.81.210.36 attackbotsspam
Repeated RDP login failures. Last user: Audit
2020-10-02 17:57:23
51.158.145.216 attack
51.158.145.216 - - [02/Oct/2020:10:23:28 +0100] "POST /wp/wp-login.php HTTP/1.1" 200 2441 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.158.145.216 - - [02/Oct/2020:10:23:29 +0100] "POST /wp/wp-login.php HTTP/1.1" 200 2417 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.158.145.216 - - [02/Oct/2020:10:23:29 +0100] "POST /wp/xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-02 18:13:51
151.0.160.122 attackbots
Repeated RDP login failures. Last user: admin
2020-10-02 17:49:20

最近上报的IP列表

222.79.5.200 203.107.56.60 197.228.74.44 150.200.156.39
64.227.110.74 93.10.169.220 81.250.154.103 173.140.236.98
199.199.246.8 120.192.125.28 190.197.62.99 204.255.177.129
76.224.43.61 65.167.221.92 219.148.232.150 118.45.204.208
121.85.106.172 93.170.53.95 119.53.20.164 61.27.71.107