必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Beijing

省份(region): Beijing

国家(country): China

运营商(isp): Beijing Zhongbangyatong Telecom Technology Co Ltd

主机名(hostname): unknown

机构(organization): China Tietong Telecommunication Corporation

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attackbots
port scan and connect, tcp 1433 (ms-sql-s)
2020-07-29 02:02:38
attackspambots
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(05081052)
2020-05-10 02:50:39
attack
Unauthorized connection attempt detected from IP address 124.207.137.144 to port 1433 [J]
2020-02-05 16:58:57
attackspambots
Unauthorized connection attempt detected from IP address 124.207.137.144 to port 1433
2019-12-31 08:48:53
attackspambots
Port scan: Attack repeated for 24 hours
2019-12-25 16:36:05
attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-23 13:09:35
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.207.137.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45002
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;124.207.137.144.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040600 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat Apr 06 19:11:00 +08 2019
;; MSG SIZE  rcvd: 119

HOST信息:
Host 144.137.207.124.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 144.137.207.124.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.143.142.162 attack
Invalid user xina from 190.143.142.162 port 34954
2019-11-16 21:04:18
81.177.33.4 attackspam
81.177.33.4 - - \[16/Nov/2019:12:42:17 +0000\] "POST /wp/wp-login.php HTTP/1.1" 200 4205 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
81.177.33.4 - - \[16/Nov/2019:12:42:18 +0000\] "POST /wp/xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-16 21:10:49
112.85.42.227 attackbotsspam
Nov 16 07:27:50 TORMINT sshd\[26740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227  user=root
Nov 16 07:27:51 TORMINT sshd\[26740\]: Failed password for root from 112.85.42.227 port 19255 ssh2
Nov 16 07:28:58 TORMINT sshd\[26788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227  user=root
...
2019-11-16 20:58:20
85.99.64.29 attackspam
Telnet/23 MH Probe, BF, Hack -
2019-11-16 21:27:37
62.80.164.18 attack
Nov 16 14:05:31 OPSO sshd\[3808\]: Invalid user hart from 62.80.164.18 port 52372
Nov 16 14:05:31 OPSO sshd\[3808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.80.164.18
Nov 16 14:05:33 OPSO sshd\[3808\]: Failed password for invalid user hart from 62.80.164.18 port 52372 ssh2
Nov 16 14:12:09 OPSO sshd\[4756\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.80.164.18  user=admin
Nov 16 14:12:11 OPSO sshd\[4756\]: Failed password for admin from 62.80.164.18 port 41141 ssh2
2019-11-16 21:26:10
68.116.41.6 attack
Nov 16 01:18:46 TORMINT sshd\[3750\]: Invalid user sonata from 68.116.41.6
Nov 16 01:18:46 TORMINT sshd\[3750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.116.41.6
Nov 16 01:18:48 TORMINT sshd\[3750\]: Failed password for invalid user sonata from 68.116.41.6 port 38442 ssh2
...
2019-11-16 21:18:53
177.159.157.178 attackbotsspam
[ER hit] Tried to deliver spam. Already well known.
2019-11-16 21:20:22
217.17.117.26 attackspam
Automatic report - Banned IP Access
2019-11-16 21:10:33
41.38.191.251 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/41.38.191.251/ 
 
 EG - 1H : (34)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : EG 
 NAME ASN : ASN8452 
 
 IP : 41.38.191.251 
 
 CIDR : 41.38.0.0/15 
 
 PREFIX COUNT : 833 
 
 UNIQUE IP COUNT : 7610368 
 
 
 ATTACKS DETECTED ASN8452 :  
  1H - 2 
  3H - 4 
  6H - 4 
 12H - 10 
 24H - 31 
 
 DateTime : 2019-11-16 07:19:45 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-16 20:49:56
42.227.197.127 attackspambots
Telnet/23 MH Probe, BF, Hack -
2019-11-16 21:08:08
42.239.240.230 attackspam
9001/tcp
[2019-11-16]1pkt
2019-11-16 21:07:12
212.143.222.209 attackspam
Honeypot attack, port: 23, PTR: dsl212-143-222-209.bb.netvision.net.il.
2019-11-16 21:15:21
190.104.39.147 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-11-16 21:21:13
36.227.127.198 attackspam
SQL APT attack
Reported by nic@wlink.biz from IP 118.69.71.82
2019-11-16 21:20:46
159.203.177.49 attackbots
Nov 16 10:17:38 vps sshd[27747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.177.49 
Nov 16 10:17:40 vps sshd[27747]: Failed password for invalid user kirn from 159.203.177.49 port 42686 ssh2
Nov 16 10:32:34 vps sshd[28291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.177.49 
...
2019-11-16 20:55:45

最近上报的IP列表

31.28.107.74 187.132.39.45 115.78.232.152 14.243.19.7
14.232.92.234 45.7.231.249 190.111.246.46 192.3.197.222
110.138.2.170 185.234.217.218 14.181.136.71 134.249.147.157
14.188.228.13 203.205.52.218 218.248.64.241 117.4.113.236
106.12.205.104 222.252.115.35 187.16.96.37 115.112.100.22