必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.142.121.17
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64699
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;133.142.121.17.			IN	A

;; AUTHORITY SECTION:
.			147	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023032900 1800 900 604800 86400

;; Query time: 87 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 29 18:14:30 CST 2023
;; MSG SIZE  rcvd: 107
HOST信息:
17.121.142.133.in-addr.arpa domain name pointer 17.121.142.133.rev.iijmobile.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
17.121.142.133.in-addr.arpa	name = 17.121.142.133.rev.iijmobile.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
142.93.204.221 attackbotsspam
Automatic report - XMLRPC Attack
2019-11-10 08:07:18
95.42.78.175 attackbotsspam
95.42.78.175 was recorded 26 times by 1 hosts attempting to connect to the following ports: 23. Incident counter (4h, 24h, all-time): 26, 40, 40
2019-11-10 08:14:31
88.214.26.18 attack
191109 15:33:05 \[Warning\] Access denied for user 'merchant'@'88.214.26.18' \(using password: YES\)
191109 16:43:57 \[Warning\] Access denied for user 'merchant'@'88.214.26.18' \(using password: YES\)
191109 16:51:46 \[Warning\] Access denied for user 'merchant'@'88.214.26.18' \(using password: YES\)
...
2019-11-10 08:02:24
198.108.67.39 attack
11/09/2019-11:09:17.941923 198.108.67.39 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-10 08:12:08
112.216.93.141 attackspambots
Nov  9 06:55:17 auw2 sshd\[11335\]: Invalid user spyder from 112.216.93.141
Nov  9 06:55:17 auw2 sshd\[11335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.216.93.141
Nov  9 06:55:20 auw2 sshd\[11335\]: Failed password for invalid user spyder from 112.216.93.141 port 49232 ssh2
Nov  9 06:59:26 auw2 sshd\[11752\]: Invalid user utilize from 112.216.93.141
Nov  9 06:59:26 auw2 sshd\[11752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.216.93.141
2019-11-10 07:40:54
111.85.182.30 attackspam
Nov  9 21:47:01 vserver sshd\[10944\]: Failed password for root from 111.85.182.30 port 59842 ssh2Nov  9 21:51:26 vserver sshd\[11003\]: Invalid user user from 111.85.182.30Nov  9 21:51:28 vserver sshd\[11003\]: Failed password for invalid user user from 111.85.182.30 port 39923 ssh2Nov  9 21:56:07 vserver sshd\[11081\]: Failed password for root from 111.85.182.30 port 20038 ssh2
...
2019-11-10 08:11:36
185.162.235.98 attack
2019-11-09 12:21:41 dovecot_login authenticator failed for (t4YVVu1) [185.162.235.98]:55306 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=ler@lerctr.org)
2019-11-09 12:21:57 dovecot_login authenticator failed for (0hRPtPr) [185.162.235.98]:61435 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=ler@lerctr.org)
2019-11-09 12:22:18 dovecot_login authenticator failed for (xD0WRD) [185.162.235.98]:51184 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=ler@lerctr.org)
...
2019-11-10 07:50:50
103.139.45.67 attack
Nov  9 21:37:23 marvibiene postfix/smtpd[25412]: warning: unknown[103.139.45.67]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  9 21:37:32 marvibiene postfix/smtpd[25412]: warning: unknown[103.139.45.67]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-10 08:09:06
183.6.107.248 attackspam
Nov  4 17:10:32 iago sshd[18098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.6.107.248  user=r.r
Nov  4 17:10:34 iago sshd[18098]: Failed password for r.r from 183.6.107.248 port 37218 ssh2
Nov  4 17:10:35 iago sshd[18099]: Received disconnect from 183.6.107.248: 11: Bye Bye


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=183.6.107.248
2019-11-10 07:37:57
193.70.81.201 attack
Nov  9 17:53:46 meumeu sshd[8827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.81.201 
Nov  9 17:53:47 meumeu sshd[8827]: Failed password for invalid user peabody from 193.70.81.201 port 42236 ssh2
Nov  9 17:57:50 meumeu sshd[9321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.81.201 
...
2019-11-10 07:53:03
151.45.47.171 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/151.45.47.171/ 
 
 IT - 1H : (114)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : IT 
 NAME ASN : ASN1267 
 
 IP : 151.45.47.171 
 
 CIDR : 151.45.0.0/16 
 
 PREFIX COUNT : 161 
 
 UNIQUE IP COUNT : 6032640 
 
 
 ATTACKS DETECTED ASN1267 :  
  1H - 2 
  3H - 2 
  6H - 3 
 12H - 8 
 24H - 14 
 
 DateTime : 2019-11-09 17:09:43 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-11-10 07:59:01
45.55.233.213 attackspam
Nov  9 11:46:25 TORMINT sshd\[31529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.233.213  user=root
Nov  9 11:46:27 TORMINT sshd\[31529\]: Failed password for root from 45.55.233.213 port 45222 ssh2
Nov  9 11:50:12 TORMINT sshd\[31755\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.233.213  user=root
...
2019-11-10 07:42:19
77.119.231.144 attack
Chat Spam
2019-11-10 07:56:59
68.234.105.200 attack
firewall-block, port(s): 23/tcp
2019-11-10 07:49:42
125.25.171.134 attack
firewall-block, port(s): 445/tcp
2019-11-10 07:47:02

最近上报的IP列表

190.70.221.188 241.213.62.69 242.188.125.96 49.66.144.11
215.239.52.244 70.32.199.68 112.189.241.116 172.6.54.173
218.67.111.162 197.113.8.154 161.228.245.201 142.166.189.219
197.220.215.173 168.158.109.125 102.198.75.227 186.164.254.131
104.81.93.231 165.30.2.43 248.151.142.36 137.37.238.169