必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.121.125.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23268
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;128.121.125.94.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 09:28:44 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 94.125.121.128.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 94.125.121.128.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
161.35.193.16 attack
SSH Invalid Login
2020-08-28 06:44:39
106.12.55.57 attackbotsspam
SSH Invalid Login
2020-08-28 06:41:55
115.146.127.147 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-28 06:51:10
172.105.89.161 attackspambots
Firewall Dropped Connection
2020-08-28 06:32:41
201.48.192.60 attack
2020-08-28T04:38:46.578589hostname sshd[31152]: Failed password for invalid user dipak from 201.48.192.60 port 45166 ssh2
2020-08-28T04:44:09.289901hostname sshd[796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.192.60  user=root
2020-08-28T04:44:10.926587hostname sshd[796]: Failed password for root from 201.48.192.60 port 37594 ssh2
...
2020-08-28 06:35:06
118.89.71.142 attack
Aug 28 00:09:52 server sshd[53128]: Failed password for root from 118.89.71.142 port 33132 ssh2
Aug 28 00:14:57 server sshd[55563]: Failed password for invalid user owncloud from 118.89.71.142 port 33040 ssh2
Aug 28 00:20:05 server sshd[58263]: Failed password for invalid user ypf from 118.89.71.142 port 32956 ssh2
2020-08-28 06:23:48
187.190.79.178 attackbots
1598562450 - 08/27/2020 23:07:30 Host: 187.190.79.178/187.190.79.178 Port: 445 TCP Blocked
2020-08-28 06:44:07
119.73.179.114 attackspambots
Aug 27 23:00:17 MainVPS sshd[23312]: Invalid user liulei from 119.73.179.114 port 12814
Aug 27 23:00:17 MainVPS sshd[23312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.73.179.114
Aug 27 23:00:17 MainVPS sshd[23312]: Invalid user liulei from 119.73.179.114 port 12814
Aug 27 23:00:20 MainVPS sshd[23312]: Failed password for invalid user liulei from 119.73.179.114 port 12814 ssh2
Aug 27 23:08:04 MainVPS sshd[7360]: Invalid user osman from 119.73.179.114 port 52248
...
2020-08-28 06:22:25
202.152.1.89 attack
Port scan: Attack repeated for 24 hours
2020-08-28 06:20:56
20.48.102.92 attackspambots
(smtpauth) Failed SMTP AUTH login from 20.48.102.92 (JP/Japan/-): 5 in the last 3600 secs
2020-08-28 06:28:18
117.4.35.72 attackspambots
1598562472 - 08/27/2020 23:07:52 Host: 117.4.35.72/117.4.35.72 Port: 445 TCP Blocked
2020-08-28 06:31:56
87.103.126.98 attack
Aug 27 22:15:14 rush sshd[4737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.103.126.98
Aug 27 22:15:15 rush sshd[4737]: Failed password for invalid user linuxprobe from 87.103.126.98 port 51742 ssh2
Aug 27 22:18:55 rush sshd[4858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.103.126.98
...
2020-08-28 06:41:15
201.156.225.127 attack
Automatic report - Port Scan Attack
2020-08-28 06:38:28
188.166.150.17 attackbots
Aug 28 00:07:22 santamaria sshd\[538\]: Invalid user uru from 188.166.150.17
Aug 28 00:07:22 santamaria sshd\[538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.150.17
Aug 28 00:07:24 santamaria sshd\[538\]: Failed password for invalid user uru from 188.166.150.17 port 53306 ssh2
...
2020-08-28 06:55:22
222.186.169.192 attackbotsspam
Aug 27 22:30:29 rush sshd[5121]: Failed password for root from 222.186.169.192 port 15702 ssh2
Aug 27 22:30:33 rush sshd[5121]: Failed password for root from 222.186.169.192 port 15702 ssh2
Aug 27 22:30:36 rush sshd[5121]: Failed password for root from 222.186.169.192 port 15702 ssh2
Aug 27 22:30:40 rush sshd[5121]: Failed password for root from 222.186.169.192 port 15702 ssh2
...
2020-08-28 06:32:25

最近上报的IP列表

176.229.55.75 68.14.58.246 53.49.8.17 211.22.150.57
142.40.227.9 55.171.124.158 89.157.79.252 147.94.92.205
176.207.114.32 208.111.241.214 253.229.91.172 90.33.197.253
30.189.31.152 115.244.248.105 30.140.145.212 114.246.27.86
86.208.94.140 60.117.25.17 85.91.167.191 187.215.93.65