必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Beijing

省份(region): Beijing

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.193.234.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40649
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;124.193.234.146.		IN	A

;; AUTHORITY SECTION:
.			2033	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091600 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Sep 16 21:53:39 CST 2019
;; MSG SIZE  rcvd: 119
HOST信息:
Host 146.234.193.124.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 67.207.67.2, trying next server
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 146.234.193.124.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
74.50.197.51 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-04-14 01:02:52
119.206.161.197 attack
port 23
2020-04-14 00:21:47
124.61.214.44 attackspambots
Apr 13 16:40:25 vserver sshd\[23244\]: Invalid user user0 from 124.61.214.44Apr 13 16:40:27 vserver sshd\[23244\]: Failed password for invalid user user0 from 124.61.214.44 port 56142 ssh2Apr 13 16:45:50 vserver sshd\[23304\]: Invalid user samikhionbare from 124.61.214.44Apr 13 16:45:52 vserver sshd\[23304\]: Failed password for invalid user samikhionbare from 124.61.214.44 port 58050 ssh2
...
2020-04-14 00:23:11
27.67.14.29 attackspam
Honeypot attack, port: 445, PTR: localhost.
2020-04-14 00:35:07
183.15.91.0 attackspam
Unauthorized connection attempt detected from IP address 183.15.91.0 to port 23 [T]
2020-04-14 01:04:42
205.205.150.58 attack
64738/tcp 55553/tcp 55443/tcp...
[2020-04-11]269pkt,246pt.(tcp),6pt.(udp)
2020-04-14 00:29:23
31.211.8.116 attack
445/tcp 445/tcp 445/tcp...
[2020-02-23/04-12]7pkt,1pt.(tcp)
2020-04-14 00:43:17
195.54.166.104 attackbots
scans 61 times in preceeding hours on the ports (in chronological order) 23220 23225 23359 23145 23012 23009 23226 23449 23414 23105 23067 23359 23441 23003 23497 23259 23488 23249 23138 23240 23276 23137 23012 23030 23217 23007 23013 23035 23034 23093 23184 23267 23201 23226 23052 23405 23428 23216 23193 23339 23183 23172 23436 23176 23087 23112 23132 23383 23043 23026 23175 23255 23410 23148 23025 23312 23086 23258 23021 23056 23202 resulting in total of 183 scans from 195.54.166.0/23 block.
2020-04-14 01:00:50
118.25.133.121 attackbotsspam
$f2bV_matches
2020-04-14 00:30:21
185.9.75.254 attack
1586767205 - 04/13/2020 10:40:05 Host: 185.9.75.254/185.9.75.254 Port: 445 TCP Blocked
2020-04-14 00:33:05
49.51.141.147 attackspambots
Apr 13 18:30:03 pve sshd[27757]: Failed password for root from 49.51.141.147 port 58650 ssh2
Apr 13 18:35:30 pve sshd[31892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.141.147 
Apr 13 18:35:32 pve sshd[31892]: Failed password for invalid user usuario from 49.51.141.147 port 38752 ssh2
2020-04-14 00:53:05
187.189.11.49 attackspambots
SSH invalid-user multiple login try
2020-04-14 00:45:37
54.36.150.114 attackspambots
Automatic report - Banned IP Access
2020-04-14 00:49:48
87.251.74.9 attackbotsspam
firewall-block, port(s): 3093/tcp, 3176/tcp, 3315/tcp, 3446/tcp
2020-04-14 00:24:20
178.210.49.101 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-14 00:27:02

最近上报的IP列表

125.106.71.2 218.75.197.125 68.72.151.254 187.107.72.101
70.207.116.143 114.224.223.122 190.18.209.174 134.206.170.151
107.179.28.32 221.40.77.75 68.8.90.148 84.63.68.211
116.104.38.204 197.52.3.249 44.82.127.221 76.166.49.247
197.161.142.31 144.0.53.32 41.153.29.207 175.150.106.241