必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.72.202.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54093
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;133.72.202.21.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 19:44:03 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
21.202.72.133.in-addr.arpa domain name pointer ns1-11.kyogaku.kanagawa-u.ac.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.202.72.133.in-addr.arpa	name = ns1-11.kyogaku.kanagawa-u.ac.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
120.92.2.48 attackbotsspam
Jun 22 05:51:52 piServer sshd[16142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.2.48 
Jun 22 05:51:54 piServer sshd[16142]: Failed password for invalid user shop from 120.92.2.48 port 64173 ssh2
Jun 22 05:55:56 piServer sshd[16766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.2.48 
...
2020-06-22 12:00:31
138.68.92.121 attackspam
Jun 22 06:30:27 plex sshd[28413]: Invalid user user from 138.68.92.121 port 44490
2020-06-22 12:41:31
128.199.239.52 attackspambots
2020-06-21T23:29:44.3645141495-001 sshd[49929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.239.52
2020-06-21T23:29:44.3614731495-001 sshd[49929]: Invalid user app from 128.199.239.52 port 48852
2020-06-21T23:29:46.8022071495-001 sshd[49929]: Failed password for invalid user app from 128.199.239.52 port 48852 ssh2
2020-06-21T23:33:03.5414391495-001 sshd[50117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.239.52  user=root
2020-06-21T23:33:05.2969161495-001 sshd[50117]: Failed password for root from 128.199.239.52 port 42986 ssh2
2020-06-21T23:36:22.8100261495-001 sshd[50312]: Invalid user zl from 128.199.239.52 port 37040
...
2020-06-22 12:12:10
219.75.134.27 attack
Jun 22 04:53:45 rocket sshd[12811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.75.134.27
Jun 22 04:53:47 rocket sshd[12811]: Failed password for invalid user ftptest from 219.75.134.27 port 41981 ssh2
...
2020-06-22 12:01:10
115.79.139.44 attack
1592798135 - 06/22/2020 05:55:35 Host: 115.79.139.44/115.79.139.44 Port: 445 TCP Blocked
2020-06-22 12:12:37
51.38.32.230 attackbotsspam
Jun 22 05:50:11 rotator sshd\[13812\]: Invalid user rodney from 51.38.32.230Jun 22 05:50:14 rotator sshd\[13812\]: Failed password for invalid user rodney from 51.38.32.230 port 53792 ssh2Jun 22 05:52:50 rotator sshd\[14274\]: Invalid user john from 51.38.32.230Jun 22 05:52:52 rotator sshd\[14274\]: Failed password for invalid user john from 51.38.32.230 port 33932 ssh2Jun 22 05:55:12 rotator sshd\[14629\]: Invalid user sinusbot from 51.38.32.230Jun 22 05:55:13 rotator sshd\[14629\]: Failed password for invalid user sinusbot from 51.38.32.230 port 42306 ssh2
...
2020-06-22 12:35:54
49.233.26.75 attackbotsspam
SSH authentication failure x 6 reported by Fail2Ban
...
2020-06-22 12:28:36
51.81.53.186 attackspam
Fail2Ban
2020-06-22 12:20:26
150.109.99.243 attackbotsspam
no
2020-06-22 12:28:10
41.93.32.94 attackspam
Jun 22 05:24:00 ns382633 sshd\[22148\]: Invalid user ftptest from 41.93.32.94 port 45612
Jun 22 05:24:00 ns382633 sshd\[22148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.93.32.94
Jun 22 05:24:02 ns382633 sshd\[22148\]: Failed password for invalid user ftptest from 41.93.32.94 port 45612 ssh2
Jun 22 05:55:45 ns382633 sshd\[28653\]: Invalid user apache from 41.93.32.94 port 53602
Jun 22 05:55:45 ns382633 sshd\[28653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.93.32.94
2020-06-22 12:07:39
103.194.88.162 attack
Port probing on unauthorized port 445
2020-06-22 12:44:21
180.109.34.12 attackbotsspam
Jun 22 05:47:52 server sshd[5724]: Failed password for invalid user admin from 180.109.34.12 port 34942 ssh2
Jun 22 05:53:33 server sshd[12822]: Failed password for invalid user git_user from 180.109.34.12 port 59354 ssh2
Jun 22 05:55:51 server sshd[15286]: Failed password for invalid user hyperic from 180.109.34.12 port 57170 ssh2
2020-06-22 12:04:48
80.211.89.9 attackbotsspam
Jun 22 06:14:45 rotator sshd\[17512\]: Invalid user admin from 80.211.89.9Jun 22 06:14:47 rotator sshd\[17512\]: Failed password for invalid user admin from 80.211.89.9 port 57962 ssh2Jun 22 06:18:01 rotator sshd\[18295\]: Failed password for root from 80.211.89.9 port 57986 ssh2Jun 22 06:21:13 rotator sshd\[19051\]: Invalid user user3 from 80.211.89.9Jun 22 06:21:15 rotator sshd\[19051\]: Failed password for invalid user user3 from 80.211.89.9 port 58006 ssh2Jun 22 06:24:21 rotator sshd\[19068\]: Failed password for root from 80.211.89.9 port 58032 ssh2
...
2020-06-22 12:26:04
84.17.46.228 attackspam
(From augusta.grieve@yahoo.com) Hi, I was just visiting your site and filled out your "contact us" form. The contact page on your site sends you these messages to your email account which is the reason you're reading my message right now right? This is half the battle with any type of online ad, getting people to actually READ your ad and I did that just now with you! If you have an advertisement you would like to blast out to thousands of websites via their contact forms in the U.S. or to any country worldwide send me a quick note now, I can even focus on particular niches and my prices are very reasonable. Send a reply to: Bobue67hasy57@gmail.com

I want to terminate these ad messages https://bit.ly/3aELXYU
2020-06-22 12:34:18
187.174.219.142 attackspam
Jun 22 05:54:32 piServer sshd[16598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.174.219.142 
Jun 22 05:54:34 piServer sshd[16598]: Failed password for invalid user ths from 187.174.219.142 port 39682 ssh2
Jun 22 05:56:52 piServer sshd[16899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.174.219.142 
...
2020-06-22 12:05:38

最近上报的IP列表

132.48.73.41 93.181.113.63 159.68.200.10 181.199.2.158
229.57.227.164 152.238.153.37 163.196.11.12 231.231.16.67
177.115.126.26 230.99.189.119 126.142.13.94 109.27.81.207
155.156.3.210 135.99.200.250 248.46.125.53 187.198.54.6
38.39.220.229 39.178.89.84 49.16.121.201 48.171.134.188