必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): China Tietong

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 123.94.11.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20943
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;123.94.11.3.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025063000 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 30 15:49:57 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 3.11.94.123.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 3.11.94.123.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.38.187.19 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/114.38.187.19/ 
 TW - 1H : (2809)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 114.38.187.19 
 
 CIDR : 114.38.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 WYKRYTE ATAKI Z ASN3462 :  
  1H - 283 
  3H - 1104 
  6H - 2236 
 12H - 2712 
 24H - 2721 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-24 01:38:36
91.134.153.144 attackspambots
Sep 23 02:50:50 hcbb sshd\[11365\]: Invalid user ren from 91.134.153.144
Sep 23 02:50:50 hcbb sshd\[11365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.153.144
Sep 23 02:50:52 hcbb sshd\[11365\]: Failed password for invalid user ren from 91.134.153.144 port 57806 ssh2
Sep 23 02:55:34 hcbb sshd\[11738\]: Invalid user zzzz from 91.134.153.144
Sep 23 02:55:34 hcbb sshd\[11738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.153.144
2019-09-24 01:40:35
49.88.112.90 attackspam
Sep 23 13:25:30 plusreed sshd[27894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.90  user=root
Sep 23 13:25:31 plusreed sshd[27894]: Failed password for root from 49.88.112.90 port 20949 ssh2
...
2019-09-24 01:41:46
142.93.232.222 attack
Sep 23 06:48:59 friendsofhawaii sshd\[26726\]: Invalid user ax from 142.93.232.222
Sep 23 06:48:59 friendsofhawaii sshd\[26726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.232.222
Sep 23 06:49:01 friendsofhawaii sshd\[26726\]: Failed password for invalid user ax from 142.93.232.222 port 47088 ssh2
Sep 23 06:53:14 friendsofhawaii sshd\[27090\]: Invalid user nagios from 142.93.232.222
Sep 23 06:53:14 friendsofhawaii sshd\[27090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.232.222
2019-09-24 01:29:42
142.93.92.232 attackbotsspam
Sep 23 06:59:45 sachi sshd\[28985\]: Invalid user p@ssw0rd from 142.93.92.232
Sep 23 06:59:45 sachi sshd\[28985\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.92.232
Sep 23 06:59:47 sachi sshd\[28985\]: Failed password for invalid user p@ssw0rd from 142.93.92.232 port 52238 ssh2
Sep 23 07:03:44 sachi sshd\[29298\]: Invalid user process from 142.93.92.232
Sep 23 07:03:44 sachi sshd\[29298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.92.232
2019-09-24 01:09:43
134.209.17.42 attackspambots
Sep 23 14:36:57 vpn01 sshd[8973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.17.42
Sep 23 14:37:00 vpn01 sshd[8973]: Failed password for invalid user elle from 134.209.17.42 port 42371 ssh2
2019-09-24 01:15:29
129.204.115.214 attack
Sep 23 10:58:07 xtremcommunity sshd\[396956\]: Invalid user mike from 129.204.115.214 port 43920
Sep 23 10:58:07 xtremcommunity sshd\[396956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.115.214
Sep 23 10:58:09 xtremcommunity sshd\[396956\]: Failed password for invalid user mike from 129.204.115.214 port 43920 ssh2
Sep 23 11:05:21 xtremcommunity sshd\[397092\]: Invalid user testftp from 129.204.115.214 port 56056
Sep 23 11:05:21 xtremcommunity sshd\[397092\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.115.214
...
2019-09-24 01:16:42
104.140.183.186 attackspambots
104.140.183.186 - - [23/Sep/2019:08:17:14 -0400] "GET /?page=products&action=view&manufacturerID=1&productID=%2fetc%2fpasswd%00&linkID=3128 HTTP/1.1" 302 - "https://baldwinbrasshardware.com/?page=products&action=view&manufacturerID=1&productID=%2fetc%2fpasswd%00&linkID=3128" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0"
...
2019-09-24 01:19:36
23.94.205.209 attack
Sep 23 05:42:14 hiderm sshd\[21065\]: Invalid user p@Ssw0rd from 23.94.205.209
Sep 23 05:42:14 hiderm sshd\[21065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.205.209
Sep 23 05:42:16 hiderm sshd\[21065\]: Failed password for invalid user p@Ssw0rd from 23.94.205.209 port 56862 ssh2
Sep 23 05:46:14 hiderm sshd\[21388\]: Invalid user whirwind from 23.94.205.209
Sep 23 05:46:14 hiderm sshd\[21388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.205.209
2019-09-24 01:31:27
114.43.164.245 attack
Honeypot attack, port: 23, PTR: 114-43-164-245.dynamic-ip.hinet.net.
2019-09-24 01:33:48
36.72.217.91 attack
Sep 23 08:36:52 localhost kernel: [2980030.529439] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=36.72.217.91 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=13449 DF PROTO=TCP SPT=65100 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 
Sep 23 08:36:52 localhost kernel: [2980030.529459] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=36.72.217.91 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=13449 DF PROTO=TCP SPT=65100 DPT=445 SEQ=1717095196 ACK=0 WINDOW=8192 RES=0x00 SYN URGP=0 OPT (020405AC0103030201010402) 
Sep 23 08:36:55 localhost kernel: [2980033.426173] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=36.72.217.91 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=13765 DF PROTO=TCP SPT=65100 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 
Sep 23 08:36:55 localhost kernel: [2980033.426206] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=36.72.217.91 DST
2019-09-24 01:20:54
49.234.3.90 attack
Sep 23 18:55:44 v22018076622670303 sshd\[11625\]: Invalid user barison from 49.234.3.90 port 52608
Sep 23 18:55:44 v22018076622670303 sshd\[11625\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.3.90
Sep 23 18:55:46 v22018076622670303 sshd\[11625\]: Failed password for invalid user barison from 49.234.3.90 port 52608 ssh2
...
2019-09-24 01:34:21
49.88.112.85 attackspam
2019-09-23T17:20:46.339998abusebot.cloudsearch.cf sshd\[19332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.85  user=root
2019-09-24 01:23:37
200.209.174.76 attackspam
Sep 23 20:16:40 server sshd\[28936\]: Invalid user arpawatch from 200.209.174.76 port 45766
Sep 23 20:16:40 server sshd\[28936\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.209.174.76
Sep 23 20:16:42 server sshd\[28936\]: Failed password for invalid user arpawatch from 200.209.174.76 port 45766 ssh2
Sep 23 20:22:54 server sshd\[7800\]: Invalid user build from 200.209.174.76 port 35814
Sep 23 20:22:54 server sshd\[7800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.209.174.76
2019-09-24 01:31:47
182.73.123.118 attack
Reported by AbuseIPDB proxy server.
2019-09-24 01:35:40

最近上报的IP列表

76.44.151.150 98.20.197.150 163.87.245.93 21.109.79.95
92.35.33.195 71.218.143.210 163.242.244.114 128.34.108.109
154.245.225.148 40.231.226.196 51.191.7.204 133.104.240.24
147.131.72.40 154.235.61.131 153.182.234.203 8.173.94.38
26.219.94.112 76.81.18.18 64.177.204.250 209.244.60.217