必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
124.121.92.142 attack
Unauthorized connection attempt detected from IP address 124.121.92.142 to port 81 [J]
2020-01-17 19:22:34
124.121.92.11 attackspambots
Honeypot attack, port: 81, PTR: ppp-124-121-92-11.revip2.asianet.co.th.
2020-01-13 18:20:30
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.121.92.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42749
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.121.92.94.			IN	A

;; AUTHORITY SECTION:
.			492	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030901 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 10 10:45:10 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
94.92.121.124.in-addr.arpa domain name pointer ppp-124-121-92-94.revip2.asianet.co.th.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
94.92.121.124.in-addr.arpa	name = ppp-124-121-92-94.revip2.asianet.co.th.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.15.171.46 attack
Sep 21 23:31:58 nextcloud sshd\[20282\]: Invalid user groupoffice from 51.15.171.46
Sep 21 23:31:58 nextcloud sshd\[20282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.171.46
Sep 21 23:32:00 nextcloud sshd\[20282\]: Failed password for invalid user groupoffice from 51.15.171.46 port 55810 ssh2
...
2019-09-22 08:43:03
138.68.90.14 attack
xmlrpc attack
2019-09-22 09:11:46
187.122.102.4 attack
Sep 21 14:38:58 wbs sshd\[1382\]: Invalid user p@ssw0rd123 from 187.122.102.4
Sep 21 14:38:58 wbs sshd\[1382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.122.102.4
Sep 21 14:39:00 wbs sshd\[1382\]: Failed password for invalid user p@ssw0rd123 from 187.122.102.4 port 50029 ssh2
Sep 21 14:46:06 wbs sshd\[2083\]: Invalid user admin123 from 187.122.102.4
Sep 21 14:46:06 wbs sshd\[2083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.122.102.4
2019-09-22 08:59:19
138.68.93.14 attackspam
SSH Brute-Force reported by Fail2Ban
2019-09-22 08:46:46
113.164.94.43 attackspambots
Unauthorized connection attempt from IP address 113.164.94.43 on Port 445(SMB)
2019-09-22 09:00:02
94.102.3.242 attackspambots
Unauthorized connection attempt from IP address 94.102.3.242 on Port 445(SMB)
2019-09-22 09:07:47
220.92.16.102 attackspambots
Invalid user yunhui from 220.92.16.102 port 37510
2019-09-22 09:12:09
220.121.58.55 attack
Automatic report - Banned IP Access
2019-09-22 08:56:12
81.22.45.253 attack
Sep 22 02:21:29 mc1 kernel: \[398143.314318\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.253 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=57973 PROTO=TCP SPT=53978 DPT=2030 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 22 02:23:20 mc1 kernel: \[398254.873974\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.253 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=55039 PROTO=TCP SPT=53978 DPT=33910 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 22 02:25:52 mc1 kernel: \[398406.255420\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.253 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=8611 PROTO=TCP SPT=53978 DPT=911 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-09-22 08:37:58
201.234.178.151 attackspambots
Unauthorized connection attempt from IP address 201.234.178.151 on Port 445(SMB)
2019-09-22 08:51:46
168.232.156.205 attackspam
Sep 22 01:32:44 MainVPS sshd[7866]: Invalid user ftpadmin from 168.232.156.205 port 52641
Sep 22 01:32:44 MainVPS sshd[7866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.232.156.205
Sep 22 01:32:44 MainVPS sshd[7866]: Invalid user ftpadmin from 168.232.156.205 port 52641
Sep 22 01:32:46 MainVPS sshd[7866]: Failed password for invalid user ftpadmin from 168.232.156.205 port 52641 ssh2
Sep 22 01:38:32 MainVPS sshd[8286]: Invalid user util from 168.232.156.205 port 45056
...
2019-09-22 08:44:55
92.241.111.7 attackbotsspam
Unauthorized connection attempt from IP address 92.241.111.7 on Port 445(SMB)
2019-09-22 09:10:28
34.74.205.72 attackbotsspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/34.74.205.72/ 
 US - 1H : (288)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN15169 
 
 IP : 34.74.205.72 
 
 CIDR : 34.72.0.0/14 
 
 PREFIX COUNT : 602 
 
 UNIQUE IP COUNT : 8951808 
 
 
 WYKRYTE ATAKI Z ASN15169 :  
  1H - 2 
  3H - 3 
  6H - 4 
 12H - 11 
 24H - 15 
 
 INFO : SERVER - ABB - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2019-09-22 08:49:16
73.171.226.23 attackbotsspam
Sep 21 14:47:33 hanapaa sshd\[21164\]: Invalid user openproject from 73.171.226.23
Sep 21 14:47:33 hanapaa sshd\[21164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-171-226-23.hsd1.fl.comcast.net
Sep 21 14:47:35 hanapaa sshd\[21164\]: Failed password for invalid user openproject from 73.171.226.23 port 51012 ssh2
Sep 21 14:52:07 hanapaa sshd\[21496\]: Invalid user user1 from 73.171.226.23
Sep 21 14:52:07 hanapaa sshd\[21496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-171-226-23.hsd1.fl.comcast.net
2019-09-22 09:00:43
130.61.229.117 attack
SASL PLAIN auth failed: ruser=...
2019-09-22 09:03:07

最近上报的IP列表

124.121.92.80 124.121.93.101 124.121.93.102 124.121.93.105
124.121.93.107 124.121.93.109 124.121.93.111 124.121.93.113
162.185.79.134 124.121.93.198 124.121.95.111 124.121.99.29
124.121.99.34 124.121.99.38 124.121.99.4 124.121.99.43
124.121.99.48 124.121.99.53 124.121.99.64 124.121.99.78