必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.121.81.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16966
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.121.81.197.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012801 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 05:54:08 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 197.81.121.149.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 197.81.121.149.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
70.42.129.126 attackspambots
SMB Server BruteForce Attack
2019-07-18 17:31:50
115.254.63.52 attackbotsspam
Jul 18 10:22:48 vmd17057 sshd\[3294\]: Invalid user webster from 115.254.63.52 port 53134
Jul 18 10:22:48 vmd17057 sshd\[3294\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.254.63.52
Jul 18 10:22:50 vmd17057 sshd\[3294\]: Failed password for invalid user webster from 115.254.63.52 port 53134 ssh2
...
2019-07-18 18:27:56
162.247.74.213 attackbots
SSH Bruteforce @ SigaVPN honeypot
2019-07-18 17:42:23
58.177.171.112 attack
Invalid user jt from 58.177.171.112 port 34908
2019-07-18 18:26:21
49.88.112.56 attackbots
v+ssh-bruteforce
2019-07-18 18:35:51
46.166.151.47 attack
\[2019-07-18 05:09:46\] SECURITY\[20812\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-18T05:09:46.628-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146313113291",SessionID="0x7f06f85ff978",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/51055",ACLName="no_extension_match"
\[2019-07-18 05:12:13\] SECURITY\[20812\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-18T05:12:13.287-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="46363302946",SessionID="0x7f06f823f758",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/59825",ACLName="no_extension_match"
\[2019-07-18 05:13:47\] SECURITY\[20812\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-18T05:13:47.736-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146462607533",SessionID="0x7f06f85ff978",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/64372",ACLName="no_extens
2019-07-18 17:21:46
103.70.145.124 attack
SPF Fail sender not permitted to send mail for @21cncorp.com / Mail sent to address harvested from public web site
2019-07-18 18:06:42
46.225.111.114 attackspambots
proto=tcp  .  spt=52906  .  dpt=25  .     (listed on Blocklist de  Jul 17)     (86)
2019-07-18 17:45:19
59.46.97.114 attack
Jul 18 11:38:35 MainVPS sshd[28202]: Invalid user mv from 59.46.97.114 port 2871
Jul 18 11:38:35 MainVPS sshd[28202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.46.97.114
Jul 18 11:38:35 MainVPS sshd[28202]: Invalid user mv from 59.46.97.114 port 2871
Jul 18 11:38:37 MainVPS sshd[28202]: Failed password for invalid user mv from 59.46.97.114 port 2871 ssh2
Jul 18 11:43:36 MainVPS sshd[28648]: Invalid user test from 59.46.97.114 port 2872
...
2019-07-18 17:53:10
188.128.39.133 attack
Failed password for root from 188.128.39.133 port 59620 ssh2
Invalid user usuario from 188.128.39.133 port 57152
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.128.39.133
Failed password for invalid user usuario from 188.128.39.133 port 57152 ssh2
Invalid user sf from 188.128.39.133 port 54680
2019-07-18 18:34:44
217.21.193.20 attack
*Port Scan* detected from 217.21.193.20 (NL/Netherlands/seo-service.see-opt-out-at.lipperhey.com). 4 hits in the last 250 seconds
2019-07-18 17:36:39
185.214.187.38 attackspambots
proto=tcp  .  spt=45352  .  dpt=25  .     (listed on Blocklist de  Jul 17)     (91)
2019-07-18 17:24:56
157.55.39.102 attackspambots
Automatic report - Banned IP Access
2019-07-18 17:21:15
61.177.172.128 attackspambots
[portscan] tcp/22 [SSH]
*(RWIN=65535)(07181113)
2019-07-18 18:07:40
121.190.197.205 attackspam
" "
2019-07-18 18:23:30

最近上报的IP列表

31.228.205.13 59.122.170.221 165.226.195.83 168.160.243.236
233.94.53.156 101.147.59.76 17.170.106.203 41.65.179.139
76.168.88.227 91.138.71.210 202.180.45.18 33.202.32.136
77.107.230.88 230.7.16.161 71.227.101.127 182.23.189.130
118.73.86.66 162.12.35.0 245.59.183.47 41.55.43.237