必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.117.94.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39049
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.117.94.70.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 23:21:43 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 70.94.117.21.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.94.117.21.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
61.93.240.65 attackbotsspam
May 13 01:44:49 NPSTNNYC01T sshd[986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.93.240.65
May 13 01:44:51 NPSTNNYC01T sshd[986]: Failed password for invalid user amol from 61.93.240.65 port 56512 ssh2
May 13 01:46:54 NPSTNNYC01T sshd[1312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.93.240.65
...
2020-05-13 18:01:28
123.207.149.93 attack
May 13 11:25:38 home sshd[24439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.149.93
May 13 11:25:39 home sshd[24439]: Failed password for invalid user nadine from 123.207.149.93 port 43262 ssh2
May 13 11:29:27 home sshd[25100]: Failed password for root from 123.207.149.93 port 55616 ssh2
...
2020-05-13 17:52:37
146.185.163.81 attackbots
146.185.163.81 - - [13/May/2020:10:30:10 +0200] "GET /wp-login.php HTTP/1.1" 200 6451 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
146.185.163.81 - - [13/May/2020:10:30:12 +0200] "POST /wp-login.php HTTP/1.1" 200 6702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
146.185.163.81 - - [13/May/2020:10:30:13 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-13 17:43:55
137.74.132.175 attackbotsspam
2020-05-13T07:48:04.324785Z c8ec1e7f518a New connection: 137.74.132.175:58424 (172.17.0.5:2222) [session: c8ec1e7f518a]
2020-05-13T08:01:49.888519Z 81589194aff9 New connection: 137.74.132.175:35788 (172.17.0.5:2222) [session: 81589194aff9]
2020-05-13 17:58:27
62.178.48.23 attackspam
(sshd) Failed SSH login from 62.178.48.23 (AT/Austria/62-178-48-23.cable.dynamic.surfer.at): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 13 10:04:40 amsweb01 sshd[25881]: User admin from 62.178.48.23 not allowed because not listed in AllowUsers
May 13 10:04:40 amsweb01 sshd[25881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.178.48.23  user=admin
May 13 10:04:42 amsweb01 sshd[25881]: Failed password for invalid user admin from 62.178.48.23 port 51196 ssh2
May 13 10:48:53 amsweb01 sshd[31934]: Invalid user oracle from 62.178.48.23 port 60464
May 13 10:48:56 amsweb01 sshd[31934]: Failed password for invalid user oracle from 62.178.48.23 port 60464 ssh2
2020-05-13 18:17:22
150.109.104.153 attackspam
May 13 10:22:19 pi sshd[11847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.104.153 
May 13 10:22:20 pi sshd[11847]: Failed password for invalid user intro1 from 150.109.104.153 port 24262 ssh2
2020-05-13 18:03:34
183.111.206.111 attack
SSH/22 MH Probe, BF, Hack -
2020-05-13 18:06:42
142.93.235.47 attackspam
"Unauthorized connection attempt on SSHD detected"
2020-05-13 17:55:32
42.115.19.67 attack
05/12/2020-20:52:13 - *Port Scan* detected from 42.115.19.67 (KH/Cambodia/Phnom Penh/Phnom Penh/-/[AS131178 OpenNet ISP Cambodia]).  226
2020-05-13 18:06:22
54.37.159.12 attack
May 13 12:14:44 lukav-desktop sshd\[23534\]: Invalid user henry from 54.37.159.12
May 13 12:14:44 lukav-desktop sshd\[23534\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.159.12
May 13 12:14:46 lukav-desktop sshd\[23534\]: Failed password for invalid user henry from 54.37.159.12 port 47130 ssh2
May 13 12:18:18 lukav-desktop sshd\[23574\]: Invalid user liang from 54.37.159.12
May 13 12:18:18 lukav-desktop sshd\[23574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.159.12
2020-05-13 18:00:34
125.45.12.133 attack
May 13 10:32:43 vps sshd[336165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.45.12.133
May 13 10:32:44 vps sshd[336165]: Failed password for invalid user ql from 125.45.12.133 port 50384 ssh2
May 13 10:34:42 vps sshd[342783]: Invalid user mailman from 125.45.12.133 port 41930
May 13 10:34:42 vps sshd[342783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.45.12.133
May 13 10:34:45 vps sshd[342783]: Failed password for invalid user mailman from 125.45.12.133 port 41930 ssh2
...
2020-05-13 17:56:33
5.101.51.211 attackspambots
postfix (unknown user, SPF fail or relay access denied)
2020-05-13 17:49:21
119.57.170.155 attackbots
May 13 07:17:18 vps sshd[466790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.57.170.155
May 13 07:17:19 vps sshd[466790]: Failed password for invalid user hadoop from 119.57.170.155 port 60953 ssh2
May 13 07:19:14 vps sshd[473524]: Invalid user Admin from 119.57.170.155 port 44263
May 13 07:19:14 vps sshd[473524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.57.170.155
May 13 07:19:16 vps sshd[473524]: Failed password for invalid user Admin from 119.57.170.155 port 44263 ssh2
...
2020-05-13 17:49:00
192.241.131.72 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-13 18:11:19
14.166.9.31 attackbots
2020-05-13T03:50:50.356221upcloud.m0sh1x2.com sshd[30988]: Invalid user Administrator from 14.166.9.31 port 64174
2020-05-13 18:13:46

最近上报的IP列表

231.241.175.133 254.26.83.11 103.245.50.205 48.103.231.71
37.132.12.18 104.126.87.190 6.83.252.247 189.210.5.225
214.52.207.106 89.245.176.181 173.63.180.15 242.145.139.213
6.26.96.64 55.152.176.34 184.90.104.8 12.213.243.170
14.19.239.152 18.59.138.221 141.169.134.93 126.3.7.85