必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.93.252.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52906
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.93.252.103.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 23:53:20 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
103.252.93.121.in-addr.arpa domain name pointer ntkyto133007.kyto.nt.ftth.ppp.infoweb.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
103.252.93.121.in-addr.arpa	name = ntkyto133007.kyto.nt.ftth.ppp.infoweb.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
41.160.113.203 attack
Unauthorized connection attempt from IP address 41.160.113.203 on Port 445(SMB)
2020-03-03 06:47:21
221.2.158.54 attackspam
Mar  2 23:02:24  sshd\[5281\]: Invalid user qiuliuyang from 221.2.158.54Mar  2 23:02:26  sshd\[5281\]: Failed password for invalid user qiuliuyang from 221.2.158.54 port 41198 ssh2
...
2020-03-03 06:18:22
27.3.193.25 attack
Unauthorized connection attempt from IP address 27.3.193.25 on Port 445(SMB)
2020-03-03 06:30:25
46.29.163.22 attackbots
2020-03-02T22:41:04.850016vps773228.ovh.net sshd[22163]: Invalid user mark from 46.29.163.22 port 41174
2020-03-02T22:41:04.861191vps773228.ovh.net sshd[22163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.29.163.22
2020-03-02T22:41:04.850016vps773228.ovh.net sshd[22163]: Invalid user mark from 46.29.163.22 port 41174
2020-03-02T22:41:06.791184vps773228.ovh.net sshd[22163]: Failed password for invalid user mark from 46.29.163.22 port 41174 ssh2
2020-03-02T22:51:34.948628vps773228.ovh.net sshd[22282]: Invalid user konglh from 46.29.163.22 port 49092
2020-03-02T22:51:34.968118vps773228.ovh.net sshd[22282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.29.163.22
2020-03-02T22:51:34.948628vps773228.ovh.net sshd[22282]: Invalid user konglh from 46.29.163.22 port 49092
2020-03-02T22:51:37.053541vps773228.ovh.net sshd[22282]: Failed password for invalid user konglh from 46.29.163.22 port 49092 ssh2
2020
...
2020-03-03 06:40:30
54.37.66.73 attackspam
Mar  2 12:18:08 hanapaa sshd\[12229\]: Invalid user daniel from 54.37.66.73
Mar  2 12:18:08 hanapaa sshd\[12229\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.ip-54-37-66.eu
Mar  2 12:18:10 hanapaa sshd\[12229\]: Failed password for invalid user daniel from 54.37.66.73 port 57668 ssh2
Mar  2 12:25:54 hanapaa sshd\[12846\]: Invalid user test2 from 54.37.66.73
Mar  2 12:25:54 hanapaa sshd\[12846\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.ip-54-37-66.eu
2020-03-03 06:29:59
88.230.105.200 attackbots
Lines containing failures of 88.230.105.200
Mar  2 22:44:41 shared11 sshd[17405]: Invalid user Admin2 from 88.230.105.200 port 58285
Mar  2 22:44:42 shared11 sshd[17405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.230.105.200
Mar  2 22:44:44 shared11 sshd[17405]: Failed password for invalid user Admin2 from 88.230.105.200 port 58285 ssh2
Mar  2 22:44:44 shared11 sshd[17405]: Connection closed by invalid user Admin2 88.230.105.200 port 58285 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=88.230.105.200
2020-03-03 06:49:04
185.202.1.164 attack
Mar  2 23:13:51 ns3042688 sshd\[26703\]: Invalid user openvpn from 185.202.1.164
Mar  2 23:13:51 ns3042688 sshd\[26703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.202.1.164 
Mar  2 23:13:52 ns3042688 sshd\[26703\]: Failed password for invalid user openvpn from 185.202.1.164 port 42476 ssh2
Mar  2 23:13:53 ns3042688 sshd\[26708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.202.1.164  user=mysql
Mar  2 23:13:55 ns3042688 sshd\[26708\]: Failed password for mysql from 185.202.1.164 port 44263 ssh2
...
2020-03-03 06:39:17
190.206.183.41 attackbotsspam
Unauthorized connection attempt from IP address 190.206.183.41 on Port 445(SMB)
2020-03-03 06:36:39
125.162.164.129 attackbots
1583186538 - 03/02/2020 23:02:18 Host: 125.162.164.129/125.162.164.129 Port: 445 TCP Blocked
2020-03-03 06:25:39
217.234.95.252 attackbots
Mar  2 20:49:41 mx01 sshd[15119]: Connection closed by 217.234.95.252 [preauth]
Mar  2 20:50:14 mx01 sshd[15121]: Invalid user cpaneleximscanner from 217.234.95.252
Mar  2 20:50:16 mx01 sshd[15121]: Failed password for invalid user cpaneleximscanner from 217.234.95.252 port 40822 ssh2
Mar  2 20:50:16 mx01 sshd[15121]: Received disconnect from 217.234.95.252: 11: Bye Bye [preauth]
Mar  2 21:30:09 mx01 sshd[20205]: Failed password for gnats from 217.234.95.252 port 50932 ssh2
Mar  2 21:30:09 mx01 sshd[20205]: Received disconnect from 217.234.95.252: 11: Bye Bye [preauth]
Mar  2 21:33:56 mx01 sshd[20751]: Failed password for r.r from 217.234.95.252 port 45198 ssh2
Mar  2 21:33:57 mx01 sshd[20751]: Received disconnect from 217.234.95.252: 11: Bye Bye [preauth]
Mar  2 21:34:51 mx01 sshd[20865]: Invalid user user from 217.234.95.252
Mar  2 21:34:53 mx01 sshd[20865]: Failed password for invalid user user from 217.234.95.252 port 51432 ssh2
Mar  2 21:34:53 mx01 sshd[20865]: Rec........
-------------------------------
2020-03-03 06:31:19
104.248.181.156 attack
Mar  2 23:18:26 srv01 sshd[30777]: Invalid user ftpuser from 104.248.181.156 port 37808
Mar  2 23:18:26 srv01 sshd[30777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.181.156
Mar  2 23:18:26 srv01 sshd[30777]: Invalid user ftpuser from 104.248.181.156 port 37808
Mar  2 23:18:28 srv01 sshd[30777]: Failed password for invalid user ftpuser from 104.248.181.156 port 37808 ssh2
Mar  2 23:22:00 srv01 sshd[31109]: Invalid user ftpuser from 104.248.181.156 port 35586
...
2020-03-03 06:46:57
180.76.248.85 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-03-03 06:35:32
69.194.68.114 attack
Unauthorized connection attempt from IP address 69.194.68.114 on Port 445(SMB)
2020-03-03 06:56:48
39.106.159.75 attackspam
Banned by Fail2Ban
...
2020-03-03 06:37:38
220.164.2.118 attack
Brute force attempt
2020-03-03 06:27:46

最近上报的IP列表

160.178.223.174 235.82.130.75 230.5.167.210 141.125.154.160
250.249.228.66 223.57.197.38 191.105.79.18 70.48.154.165
199.182.238.45 166.179.111.220 95.198.25.159 189.151.241.119
40.89.181.244 97.25.242.233 144.229.157.52 133.117.152.69
156.158.214.179 157.52.74.97 132.99.2.58 172.36.54.164