必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Denmark

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.104.114.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60922
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.104.114.120.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021600 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 21:44:37 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
120.114.104.2.in-addr.arpa domain name pointer 2-104-114-120-cable.dk.customer.tdc.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
120.114.104.2.in-addr.arpa	name = 2-104-114-120-cable.dk.customer.tdc.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
130.185.108.149 attack
SpamScore above: 10.0
2020-04-15 17:48:13
185.234.219.81 attackspambots
Apr 15 08:47:35 web01.agentur-b-2.de postfix/smtpd[102248]: warning: unknown[185.234.219.81]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 15 08:47:35 web01.agentur-b-2.de postfix/smtpd[102248]: lost connection after AUTH from unknown[185.234.219.81]
Apr 15 08:49:52 web01.agentur-b-2.de postfix/smtpd[101235]: lost connection after CONNECT from unknown[185.234.219.81]
Apr 15 08:50:28 web01.agentur-b-2.de postfix/smtpd[101235]: warning: unknown[185.234.219.81]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 15 08:50:28 web01.agentur-b-2.de postfix/smtpd[101235]: lost connection after AUTH from unknown[185.234.219.81]
2020-04-15 18:03:38
195.231.0.89 attackbots
Bruteforce detected by fail2ban
2020-04-15 17:35:39
124.156.121.59 attackspam
SSH authentication failure x 6 reported by Fail2Ban
...
2020-04-15 17:41:51
137.74.173.182 attack
5x Failed Password
2020-04-15 17:59:22
66.135.227.178 attackbots
(imapd) Failed IMAP login from 66.135.227.178 (US/United States/mail.dellew.com): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr 15 08:24:10 ir1 dovecot[566034]: imap-login: Disconnected (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=66.135.227.178, lip=5.63.12.44, TLS, session=
2020-04-15 17:56:07
185.153.196.230 attackspam
[portscan] tcp/22 [SSH]
[scan/connect: 3 time(s)]
*(RWIN=8192)(04151025)
2020-04-15 17:57:24
129.204.139.26 attack
Apr 15 08:42:32 powerpi2 sshd[15062]: Invalid user ed from 129.204.139.26 port 39550
Apr 15 08:42:34 powerpi2 sshd[15062]: Failed password for invalid user ed from 129.204.139.26 port 39550 ssh2
Apr 15 08:47:24 powerpi2 sshd[15274]: Invalid user toor from 129.204.139.26 port 33454
...
2020-04-15 17:44:39
62.4.54.158 attackbotsspam
email spam
2020-04-15 17:31:25
115.59.243.41 attack
postfix (unknown user, SPF fail or relay access denied)
2020-04-15 17:58:46
91.103.31.45 attack
spam
2020-04-15 17:27:04
83.142.197.99 attackspambots
spam
2020-04-15 17:29:26
119.123.64.240 attackbots
(ftpd) Failed FTP login from 119.123.64.240 (CN/China/-): 10 in the last 3600 secs
2020-04-15 17:36:49
46.29.79.57 attack
postfix
2020-04-15 17:31:56
87.103.245.190 attackbotsspam
spam
2020-04-15 17:28:15

最近上报的IP列表

153.221.136.97 205.72.113.229 81.233.177.199 157.63.122.219
39.72.228.69 133.56.195.111 228.48.115.73 134.147.57.119
100.178.16.232 168.70.9.3 141.219.69.212 99.65.216.98
180.66.164.5 149.30.180.159 177.98.73.55 20.66.228.192
215.11.177.198 220.150.241.171 241.25.170.25 77.213.222.67