必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Sagamihara

省份(region): Kanagawa

国家(country): Japan

运营商(isp): SoftBank

主机名(hostname): unknown

机构(organization): Softbank BB Corp.

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 126.203.72.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53294
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;126.203.72.11.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050700 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Tue May 07 22:05:22 +08 2019
;; MSG SIZE  rcvd: 117

HOST信息:
11.72.203.126.in-addr.arpa domain name pointer softbank126203072011.bbtec.net.
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
11.72.203.126.in-addr.arpa	name = softbank126203072011.bbtec.net.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
159.203.74.227 attackbots
Automatic report BANNED IP
2020-04-13 21:25:15
157.230.2.208 attack
$f2bV_matches
2020-04-13 21:39:49
219.91.153.134 attackspambots
2020-04-13T09:12:13.531439abusebot-3.cloudsearch.cf sshd[1113]: Invalid user silke from 219.91.153.134 port 54596
2020-04-13T09:12:13.538953abusebot-3.cloudsearch.cf sshd[1113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.91.153.134
2020-04-13T09:12:13.531439abusebot-3.cloudsearch.cf sshd[1113]: Invalid user silke from 219.91.153.134 port 54596
2020-04-13T09:12:15.265183abusebot-3.cloudsearch.cf sshd[1113]: Failed password for invalid user silke from 219.91.153.134 port 54596 ssh2
2020-04-13T09:16:51.074769abusebot-3.cloudsearch.cf sshd[1383]: Invalid user backup from 219.91.153.134 port 35596
2020-04-13T09:16:51.081846abusebot-3.cloudsearch.cf sshd[1383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.91.153.134
2020-04-13T09:16:51.074769abusebot-3.cloudsearch.cf sshd[1383]: Invalid user backup from 219.91.153.134 port 35596
2020-04-13T09:16:53.305068abusebot-3.cloudsearch.cf sshd[1383]: Faile
...
2020-04-13 21:36:31
106.14.211.77 attackbots
bruteforce detected
2020-04-13 21:30:08
140.143.230.79 attackspambots
Apr 13 10:40:48 OPSO sshd\[15761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.230.79  user=admin
Apr 13 10:40:50 OPSO sshd\[15761\]: Failed password for admin from 140.143.230.79 port 39542 ssh2
Apr 13 10:41:43 OPSO sshd\[16009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.230.79  user=root
Apr 13 10:41:45 OPSO sshd\[16009\]: Failed password for root from 140.143.230.79 port 47880 ssh2
Apr 13 10:42:33 OPSO sshd\[16062\]: Invalid user SP35 from 140.143.230.79 port 56218
Apr 13 10:42:33 OPSO sshd\[16062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.230.79
2020-04-13 21:09:27
219.150.93.157 attackbotsspam
Apr 13 15:07:46 srv-ubuntu-dev3 sshd[108548]: Invalid user sk from 219.150.93.157
Apr 13 15:07:46 srv-ubuntu-dev3 sshd[108548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.150.93.157
Apr 13 15:07:46 srv-ubuntu-dev3 sshd[108548]: Invalid user sk from 219.150.93.157
Apr 13 15:07:48 srv-ubuntu-dev3 sshd[108548]: Failed password for invalid user sk from 219.150.93.157 port 58795 ssh2
Apr 13 15:12:24 srv-ubuntu-dev3 sshd[109349]: Invalid user adi from 219.150.93.157
Apr 13 15:12:24 srv-ubuntu-dev3 sshd[109349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.150.93.157
Apr 13 15:12:24 srv-ubuntu-dev3 sshd[109349]: Invalid user adi from 219.150.93.157
Apr 13 15:12:27 srv-ubuntu-dev3 sshd[109349]: Failed password for invalid user adi from 219.150.93.157 port 57050 ssh2
Apr 13 15:16:41 srv-ubuntu-dev3 sshd[110197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2
...
2020-04-13 21:18:33
188.27.217.148 attackbots
Automatic report - Port Scan Attack
2020-04-13 21:46:32
205.209.160.122 attackbotsspam
Apr 13 09:55:50 clarabelen sshd[29611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.209.160.122  user=r.r
Apr 13 09:55:53 clarabelen sshd[29611]: Failed password for r.r from 205.209.160.122 port 59312 ssh2
Apr 13 09:55:54 clarabelen sshd[29611]: Received disconnect from 205.209.160.122: 11: Bye Bye [preauth]
Apr 13 10:05:40 clarabelen sshd[31333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.209.160.122  user=r.r
Apr 13 10:05:41 clarabelen sshd[31333]: Failed password for r.r from 205.209.160.122 port 54564 ssh2
Apr 13 10:05:42 clarabelen sshd[31333]: Received disconnect from 205.209.160.122: 11: Bye Bye [preauth]
Apr 13 10:14:51 clarabelen sshd[31918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.209.160.122  user=r.r
Apr 13 10:14:54 clarabelen sshd[31918]: Failed password for r.r from 205.209.160.122 port 45266 ssh2
Apr 13 10:1........
-------------------------------
2020-04-13 21:12:17
167.71.48.57 attackbots
2020-04-13T12:22:03.015960Z 06e47d935446 New connection: 167.71.48.57:38658 (172.17.0.5:2222) [session: 06e47d935446]
2020-04-13T12:31:42.000571Z 121a38a76e73 New connection: 167.71.48.57:36454 (172.17.0.5:2222) [session: 121a38a76e73]
2020-04-13 21:41:33
103.48.192.48 attack
Apr 13 15:02:32 ArkNodeAT sshd\[23396\]: Invalid user backupadmin from 103.48.192.48
Apr 13 15:02:32 ArkNodeAT sshd\[23396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.192.48
Apr 13 15:02:34 ArkNodeAT sshd\[23396\]: Failed password for invalid user backupadmin from 103.48.192.48 port 25928 ssh2
2020-04-13 21:06:48
139.217.233.36 attackspam
Apr 13 10:32:46 ns382633 sshd\[19827\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.217.233.36  user=root
Apr 13 10:32:48 ns382633 sshd\[19827\]: Failed password for root from 139.217.233.36 port 1536 ssh2
Apr 13 10:38:50 ns382633 sshd\[20972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.217.233.36  user=root
Apr 13 10:38:52 ns382633 sshd\[20972\]: Failed password for root from 139.217.233.36 port 1536 ssh2
Apr 13 10:42:20 ns382633 sshd\[21752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.217.233.36  user=root
2020-04-13 21:20:44
212.64.7.134 attackspambots
2020-04-13T10:36:39.232467amanda2.illicoweb.com sshd\[20251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.7.134  user=bin
2020-04-13T10:36:41.329977amanda2.illicoweb.com sshd\[20251\]: Failed password for bin from 212.64.7.134 port 58614 ssh2
2020-04-13T10:42:02.636962amanda2.illicoweb.com sshd\[20427\]: Invalid user fml from 212.64.7.134 port 59150
2020-04-13T10:42:02.642487amanda2.illicoweb.com sshd\[20427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.7.134
2020-04-13T10:42:05.080995amanda2.illicoweb.com sshd\[20427\]: Failed password for invalid user fml from 212.64.7.134 port 59150 ssh2
...
2020-04-13 21:37:03
201.148.160.237 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-13 21:34:10
125.64.94.211 attack
abuseConfidenceScore blocked for 12h
2020-04-13 21:21:13
59.36.172.8 attack
2020-04-13T08:36:33.297690abusebot-2.cloudsearch.cf sshd[21497]: Invalid user admin from 59.36.172.8 port 50610
2020-04-13T08:36:33.305933abusebot-2.cloudsearch.cf sshd[21497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.36.172.8
2020-04-13T08:36:33.297690abusebot-2.cloudsearch.cf sshd[21497]: Invalid user admin from 59.36.172.8 port 50610
2020-04-13T08:36:35.579665abusebot-2.cloudsearch.cf sshd[21497]: Failed password for invalid user admin from 59.36.172.8 port 50610 ssh2
2020-04-13T08:39:28.678069abusebot-2.cloudsearch.cf sshd[21746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.36.172.8  user=root
2020-04-13T08:39:30.309418abusebot-2.cloudsearch.cf sshd[21746]: Failed password for root from 59.36.172.8 port 48790 ssh2
2020-04-13T08:42:27.829308abusebot-2.cloudsearch.cf sshd[21942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.36.172.8  user=root
...
2020-04-13 21:12:45

最近上报的IP列表

199.74.83.133 140.102.169.36 202.57.5.10 180.175.123.176
218.31.174.92 149.36.84.139 178.33.17.158 81.212.95.198
2001:e68:507b:6f9d:1e5f:2bff:fe38:4f28 66.42.51.200 81.169.151.29 196.234.163.245
178.33.159.71 103.77.188.2 96.70.244.40 196.229.202.240
103.76.23.34 87.9.118.65 195.98.76.20 96.245.2.42