必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Taoyuan District

省份(region): Taoyuan

国家(country): Taiwan, China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Data Communication Business Group

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.116.0.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64949
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;122.116.0.53.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041302 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sun Apr 14 08:47:38 +08 2019
;; MSG SIZE  rcvd: 116

HOST信息:
53.0.116.122.in-addr.arpa domain name pointer 122-116-0-53.HINET-IP.hinet.net.
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
53.0.116.122.in-addr.arpa	name = 122-116-0-53.HINET-IP.hinet.net.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
101.109.250.73 attack
Port 1433 Scan
2019-12-01 07:20:04
78.129.146.110 attack
TCP Port Scanning
2019-12-01 07:12:42
129.28.184.205 attackspam
ssh failed login
2019-12-01 07:37:30
51.254.129.128 attack
Invalid user scarpone from 51.254.129.128 port 43404
2019-12-01 07:15:42
218.92.0.133 attackspam
Dec  1 00:16:25 srv-ubuntu-dev3 sshd[95911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
Dec  1 00:16:27 srv-ubuntu-dev3 sshd[95911]: Failed password for root from 218.92.0.133 port 51743 ssh2
Dec  1 00:16:39 srv-ubuntu-dev3 sshd[95911]: error: maximum authentication attempts exceeded for root from 218.92.0.133 port 51743 ssh2 [preauth]
Dec  1 00:16:25 srv-ubuntu-dev3 sshd[95911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
Dec  1 00:16:27 srv-ubuntu-dev3 sshd[95911]: Failed password for root from 218.92.0.133 port 51743 ssh2
Dec  1 00:16:39 srv-ubuntu-dev3 sshd[95911]: error: maximum authentication attempts exceeded for root from 218.92.0.133 port 51743 ssh2 [preauth]
Dec  1 00:16:25 srv-ubuntu-dev3 sshd[95911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
Dec  1 00:16:27 srv-ubuntu-de
...
2019-12-01 07:25:12
122.228.19.80 attackspam
Connection by 122.228.19.80 on port: 15000 got caught by honeypot at 11/30/2019 10:31:53 PM
2019-12-01 07:48:03
34.92.247.140 attackbots
Dec  1 01:17:04 sauna sshd[130155]: Failed password for root from 34.92.247.140 port 49726 ssh2
Dec  1 01:20:20 sauna sshd[130214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.92.247.140
...
2019-12-01 07:31:33
111.198.88.86 attackbotsspam
Dec  1 00:08:17 OPSO sshd\[7572\]: Invalid user maller from 111.198.88.86 port 36610
Dec  1 00:08:17 OPSO sshd\[7572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.198.88.86
Dec  1 00:08:19 OPSO sshd\[7572\]: Failed password for invalid user maller from 111.198.88.86 port 36610 ssh2
Dec  1 00:12:12 OPSO sshd\[8788\]: Invalid user git from 111.198.88.86 port 42726
Dec  1 00:12:12 OPSO sshd\[8788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.198.88.86
2019-12-01 07:17:12
104.236.124.45 attackbotsspam
Invalid user blancher from 104.236.124.45 port 36221
2019-12-01 07:12:24
91.201.246.180 attack
Nov 30 23:31:50 mxgate1 postfix/postscreen[27208]: CONNECT from [91.201.246.180]:2368 to [176.31.12.44]:25
Nov 30 23:31:50 mxgate1 postfix/dnsblog[27338]: addr 91.201.246.180 listed by domain zen.spamhaus.org as 127.0.0.11
Nov 30 23:31:50 mxgate1 postfix/dnsblog[27335]: addr 91.201.246.180 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Nov 30 23:31:50 mxgate1 postfix/dnsblog[27336]: addr 91.201.246.180 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 30 23:31:56 mxgate1 postfix/postscreen[27208]: DNSBL rank 4 for [91.201.246.180]:2368
Nov 30 23:31:56 mxgate1 postfix/postscreen[27208]: NOQUEUE: reject: RCPT from [91.201.246.180]:2368: 550 5.7.1 Service unavailable; client [91.201.246.180] blocked using zen.spamhaus.org; from=x@x helo=
Nov 30 23:31:57 mxgate1 postfix/postscreen[27208]: HANGUP after 0.31 from [91.201.246.180]:2368 in tests after SMTP handshake
Nov 30 23:31:57 mxgate1 postfix/postscreen[27208]: DISCONNECT [91.201.246.180]:2368


........
-----------------------------------------
2019-12-01 07:13:57
84.241.4.184 attackbots
port scan and connect, tcp 23 (telnet)
2019-12-01 07:32:57
45.82.153.80 attackbotsspam
Nov 30 00:02:59 xzibhostname postfix/smtpd[11021]: connect from unknown[45.82.153.80]
Nov 30 00:03:05 xzibhostname postfix/smtpd[11021]: warning: unknown[45.82.153.80]: SASL LOGIN authentication failed: authentication failure
Nov 30 00:03:05 xzibhostname postfix/smtpd[11021]: lost connection after AUTH from unknown[45.82.153.80]
Nov 30 00:03:05 xzibhostname postfix/smtpd[11021]: disconnect from unknown[45.82.153.80]
Nov 30 00:03:05 xzibhostname postfix/smtpd[10085]: connect from unknown[45.82.153.80]
Nov 30 00:03:11 xzibhostname postfix/smtpd[10085]: warning: unknown[45.82.153.80]: SASL LOGIN authentication failed: authentication failure
Nov 30 00:03:12 xzibhostname postfix/smtpd[10085]: lost connection after AUTH from unknown[45.82.153.80]
Nov 30 00:03:12 xzibhostname postfix/smtpd[10085]: disconnect from unknown[45.82.153.80]
Nov 30 00:03:17 xzibhostname postfix/smtpd[11021]: connect from unknown[45.82.153.80]
Nov 30 00:03:26 xzibhostname postfix/smtpd[11021]: warning........
-------------------------------
2019-12-01 07:45:24
106.12.211.247 attackbots
Automatic report - Banned IP Access
2019-12-01 07:26:10
49.66.183.220 attackbotsspam
Apr 16 11:06:45 meumeu sshd[15606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.66.183.220 
Apr 16 11:06:47 meumeu sshd[15606]: Failed password for invalid user yw from 49.66.183.220 port 60225 ssh2
Apr 16 11:14:02 meumeu sshd[16575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.66.183.220 
...
2019-12-01 07:49:20
77.247.109.59 attackbotsspam
\[2019-11-30 18:24:18\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-30T18:24:18.036-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="555555555501148134454001",SessionID="0x7f26c4276ea8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.109.59/52329",ACLName="no_extension_match"
\[2019-11-30 18:24:57\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-30T18:24:57.995-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="559401148122518001",SessionID="0x7f26c4a46cc8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.109.59/61526",ACLName="no_extension_match"
\[2019-11-30 18:25:02\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-30T18:25:02.086-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="4010101148632170012",SessionID="0x7f26c461b1c8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.109.59/55976"
2019-12-01 07:42:04

最近上报的IP列表

98.15.102.151 82.62.233.15 195.231.4.64 128.199.92.174
81.22.45.150 218.92.0.131 206.189.152.215 178.128.118.131
184.152.29.178 69.27.85.194 97.64.122.22 78.231.94.165
202.101.87.29 47.74.231.43 121.8.142.250 159.203.18.112
37.72.219.137 46.251.239.29 213.239.80.194 142.93.83.136