必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Yulin

省份(region): Shaanxi

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.116.12.208
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19532
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;124.116.12.208.			IN	A

;; AUTHORITY SECTION:
.			188	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020042502 1800 900 604800 86400

;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 26 07:37:34 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
;; connection timed out; no servers could be reached
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 208.12.116.124.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
200.120.0.164 attackbotsspam
2019-03-15 02:10:22 H=pc-164-0-120-200.cm.vtr.net \[200.120.0.164\]:17452 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-15 02:10:49 H=pc-164-0-120-200.cm.vtr.net \[200.120.0.164\]:17616 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-15 02:11:12 H=pc-164-0-120-200.cm.vtr.net \[200.120.0.164\]:17750 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-01-30 00:45:51
221.194.44.208 attack
Unauthorized connection attempt detected from IP address 221.194.44.208 to port 1433 [J]
2020-01-30 00:36:22
3.82.128.59 attackbotsspam
xmlrpc attack
2020-01-30 01:10:28
217.174.248.133 attack
445/tcp 445/tcp
[2020-01-02/29]2pkt
2020-01-30 00:52:49
2.99.154.81 attackbotsspam
2019-03-11 13:52:01 H=host-2-99-154-81.as13285.net \[2.99.154.81\]:49640 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-11 13:52:03 H=host-2-99-154-81.as13285.net \[2.99.154.81\]:49664 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-11 13:52:05 H=host-2-99-154-81.as13285.net \[2.99.154.81\]:49672 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-01-30 01:07:18
2.90.211.197 attackbotsspam
2019-07-08 18:07:17 1hkWAd-0005Fv-Db SMTP connection from \(\[2.90.211.197\]\) \[2.90.211.197\]:16475 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-08 18:07:25 1hkWAl-0005G0-PJ SMTP connection from \(\[2.90.211.197\]\) \[2.90.211.197\]:16569 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-08 18:07:33 1hkWAt-0005GD-Ni SMTP connection from \(\[2.90.211.197\]\) \[2.90.211.197\]:16636 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-30 01:12:02
200.124.18.108 attack
2019-06-22 00:11:58 1heRlD-0001wk-NR SMTP connection from \(cpe-001ee52db13a.cpe.cableonda.net\) \[200.124.18.108\]:29440 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-22 00:12:06 1heRlL-0001wz-BP SMTP connection from \(cpe-001ee52db13a.cpe.cableonda.net\) \[200.124.18.108\]:29492 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-22 00:12:12 1heRlT-0001xC-4d SMTP connection from \(cpe-001ee52db13a.cpe.cableonda.net\) \[200.124.18.108\]:29543 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-30 00:33:28
187.111.217.9 attack
SSH Bruteforce attack
2020-01-30 01:12:45
2.91.136.115 attackbots
2019-10-23 14:57:32 1iNGCh-0003rT-Cw SMTP connection from \(\[2.91.136.115\]\) \[2.91.136.115\]:25366 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-10-23 14:58:10 1iNGDJ-0003sD-Gf SMTP connection from \(\[2.91.136.115\]\) \[2.91.136.115\]:25713 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-10-23 14:58:30 1iNGDe-0003sk-6r SMTP connection from \(\[2.91.136.115\]\) \[2.91.136.115\]:25915 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-30 01:10:49
71.6.147.254 attackbotsspam
Unauthorized connection attempt detected from IP address 71.6.147.254 to port 5801 [J]
2020-01-30 00:35:23
104.206.128.22 attackspambots
Unauthorized connection attempt detected from IP address 104.206.128.22 to port 3306 [J]
2020-01-30 01:02:37
200.1.208.162 attack
2019-03-08 16:13:37 1h2HBo-0006au-4i SMTP connection from \(200-1-208-162-revzone.parbo.net\) \[200.1.208.162\]:19569 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-08 16:14:42 1h2HCr-0006cR-9f SMTP connection from \(200-1-208-162-revzone.parbo.net\) \[200.1.208.162\]:38307 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-08 16:15:16 1h2HDP-0006eQ-JJ SMTP connection from \(200-1-208-162-revzone.parbo.net\) \[200.1.208.162\]:35756 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-30 01:05:56
177.140.62.186 attack
Unauthorized connection attempt detected from IP address 177.140.62.186 to port 2220 [J]
2020-01-30 00:58:37
200.106.100.105 attackspam
2019-01-29 15:43:54 1goUcD-00050t-FQ SMTP connection from \(client-200.106.100.105.speedy.net.pe\) \[200.106.100.105\]:29731 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-01-29 15:44:04 1goUcO-00051G-7N SMTP connection from \(client-200.106.100.105.speedy.net.pe\) \[200.106.100.105\]:29849 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-01-29 15:44:09 1goUcS-00051V-Uc SMTP connection from \(client-200.106.100.105.speedy.net.pe\) \[200.106.100.105\]:29909 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-30 01:00:38
116.114.95.86 attackbotsspam
23/tcp 23/tcp
[2019-12-16/2020-01-29]2pkt
2020-01-30 00:41:19

最近上报的IP列表

180.126.12.107 189.11.224.75 81.155.176.118 134.206.136.121
97.51.93.69 194.79.204.105 100.211.144.187 221.110.156.190
160.114.86.204 114.115.175.58 111.132.162.59 24.5.13.58
190.244.159.203 85.16.155.147 217.87.32.55 67.105.46.122
179.180.191.164 208.184.59.232 136.26.141.112 125.237.93.82