必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.214.12.63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53879
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.214.12.63.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120801 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 09 03:34:37 CST 2024
;; MSG SIZE  rcvd: 106
HOST信息:
63.12.214.124.in-addr.arpa domain name pointer KD124214012063.ppp-bb.dion.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
63.12.214.124.in-addr.arpa	name = KD124214012063.ppp-bb.dion.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
188.240.208.26 attackspambots
[23/Oct/2019:18:32:43 +0200] Web-Request: "GET /wp-login.php?6=6d7f18", User-Agent: "Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)"
[23/Oct/2019:18:32:43 +0200] Web-Request: "GET /wp-login.php?6=6d7f18", User-Agent: "Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)"
2019-10-24 00:42:43
198.108.67.108 attackbotsspam
10/23/2019-09:00:39.714846 198.108.67.108 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-24 00:21:30
45.136.110.26 attack
Oct 23 15:46:21   TCP Attack: SRC=45.136.110.26 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=241  PROTO=TCP SPT=48625 DPT=14191 WINDOW=1024 RES=0x00 SYN URGP=0
2019-10-24 00:04:14
5.135.138.188 attack
Automatic report - Banned IP Access
2019-10-24 00:36:59
37.59.98.64 attackspambots
leo_www
2019-10-24 00:32:55
185.156.73.52 attackspambots
10/23/2019-12:42:05.098799 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-24 00:43:22
159.0.200.153 attackbotsspam
Automatic report - XMLRPC Attack
2019-10-24 00:26:10
181.44.68.66 attack
2019-10-23T16:06:20.671187abusebot-5.cloudsearch.cf sshd\[6530\]: Invalid user user from 181.44.68.66 port 54910
2019-10-24 00:25:52
31.169.65.26 attack
Unauthorised access (Oct 23) SRC=31.169.65.26 LEN=40 TTL=240 ID=46072 DF TCP DPT=23 WINDOW=14600 SYN
2019-10-24 00:22:52
36.56.155.4 attack
23/tcp
[2019-10-23]1pkt
2019-10-24 00:31:45
45.227.253.139 attack
Oct 23 17:23:30 mail postfix/smtpd\[3502\]: warning: unknown\[45.227.253.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 23 17:23:37 mail postfix/smtpd\[3561\]: warning: unknown\[45.227.253.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 23 18:04:48 mail postfix/smtpd\[2660\]: warning: unknown\[45.227.253.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 23 18:04:55 mail postfix/smtpd\[4965\]: warning: unknown\[45.227.253.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-10-24 00:05:34
178.214.163.48 attack
Automatic report - Port Scan Attack
2019-10-24 00:25:31
81.84.235.209 attackbots
Oct 23 09:27:06 askasleikir sshd[992363]: Failed password for invalid user www from 81.84.235.209 port 60222 ssh2
2019-10-24 00:14:29
171.6.139.148 attackspam
Oct 22 06:15:39 DNS-2 sshd[25063]: User r.r from 171.6.139.148 not allowed because not listed in AllowUsers
Oct 22 06:15:39 DNS-2 sshd[25063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.6.139.148  user=r.r
Oct 22 06:15:41 DNS-2 sshd[25063]: Failed password for invalid user r.r from 171.6.139.148 port 1844 ssh2
Oct 22 06:15:42 DNS-2 sshd[25063]: Received disconnect from 171.6.139.148 port 1844:11: Bye Bye [preauth]
Oct 22 06:15:42 DNS-2 sshd[25063]: Disconnected from 171.6.139.148 port 1844 [preauth]
Oct 22 06:24:48 DNS-2 sshd[25364]: User r.r from 171.6.139.148 not allowed because not listed in AllowUsers
Oct 22 06:24:48 DNS-2 sshd[25364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.6.139.148  user=r.r
Oct 22 06:24:50 DNS-2 sshd[25364]: Failed password for invalid user r.r from 171.6.139.148 port 63606 ssh2
Oct 22 06:24:50 DNS-2 sshd[25364]: Received disconnect from 171.6.13........
-------------------------------
2019-10-24 00:38:44
198.108.66.93 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-24 00:18:08

最近上报的IP列表

39.134.249.88 108.103.206.61 165.176.44.23 252.177.246.121
176.208.224.20 131.180.44.98 131.238.39.222 185.207.153.98
134.113.149.113 213.68.203.69 240.63.24.43 241.89.36.196
98.129.249.108 212.215.191.67 209.231.172.224 86.227.38.204
163.227.219.129 80.130.107.109 233.249.213.151 31.140.120.218