必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.126.117.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44906
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.126.117.89.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022501 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 03:21:26 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 89.117.126.21.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 89.117.126.21.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.29.217.181 attack
Jan 27 12:03:53 pi sshd[6308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.217.181 
Jan 27 12:03:55 pi sshd[6308]: Failed password for invalid user test from 14.29.217.181 port 47960 ssh2
2020-03-14 04:16:48
200.53.21.149 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/200.53.21.149/ 
 
 BR - 1H : (83)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN262391 
 
 IP : 200.53.21.149 
 
 CIDR : 200.53.21.0/24 
 
 PREFIX COUNT : 23 
 
 UNIQUE IP COUNT : 8192 
 
 
 ATTACKS DETECTED ASN262391 :  
  1H - 1 
  3H - 2 
  6H - 2 
 12H - 2 
 24H - 2 
 
 DateTime : 2020-03-13 13:44:31 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2020-03-14 04:20:37
150.109.62.183 attackbotsspam
Mar 13 03:40:17 web1 sshd\[23627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.62.183  user=root
Mar 13 03:40:19 web1 sshd\[23627\]: Failed password for root from 150.109.62.183 port 43840 ssh2
Mar 13 03:43:45 web1 sshd\[23943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.62.183  user=root
Mar 13 03:43:47 web1 sshd\[23943\]: Failed password for root from 150.109.62.183 port 57710 ssh2
Mar 13 03:47:07 web1 sshd\[24259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.62.183  user=root
2020-03-14 04:27:49
140.116.86.26 attackbotsspam
Jan 28 05:18:15 pi sshd[11007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.116.86.26 
Jan 28 05:18:17 pi sshd[11007]: Failed password for invalid user naomi from 140.116.86.26 port 55142 ssh2
2020-03-14 03:57:58
221.181.197.226 attackspambots
Mar 13 13:40:05 santamaria sshd\[5327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.181.197.226  user=root
Mar 13 13:40:08 santamaria sshd\[5327\]: Failed password for root from 221.181.197.226 port 35970 ssh2
Mar 13 13:44:26 santamaria sshd\[5353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.181.197.226  user=root
...
2020-03-14 04:26:53
189.226.143.194 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-14 04:11:00
189.174.38.63 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-14 04:17:46
109.167.200.10 attackspambots
Mar 13 14:54:14 vmd17057 sshd[23557]: Failed password for root from 109.167.200.10 port 55130 ssh2
...
2020-03-14 04:09:45
182.68.233.207 attackspambots
Honeypot attack, port: 445, PTR: abts-north-dynamic-207.233.68.182.airtelbroadband.in.
2020-03-14 03:49:28
189.151.179.57 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-14 04:23:41
14.29.215.5 attack
Mar 13 19:17:34 lukav-desktop sshd\[3328\]: Invalid user e from 14.29.215.5
Mar 13 19:17:34 lukav-desktop sshd\[3328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.215.5
Mar 13 19:17:36 lukav-desktop sshd\[3328\]: Failed password for invalid user e from 14.29.215.5 port 41686 ssh2
Mar 13 19:19:35 lukav-desktop sshd\[3354\]: Invalid user nginx from 14.29.215.5
Mar 13 19:19:35 lukav-desktop sshd\[3354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.215.5
2020-03-14 04:20:09
14.29.215.69 attackspam
Feb 12 17:54:32 pi sshd[15113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.215.69  user=root
Feb 12 17:54:35 pi sshd[15113]: Failed password for invalid user root from 14.29.215.69 port 47746 ssh2
2020-03-14 04:17:17
193.56.28.188 attackbotsspam
(smtpauth) Failed SMTP AUTH login from 193.56.28.188 (GB/United Kingdom/-): 5 in the last 3600 secs
2020-03-14 04:02:25
222.186.173.180 attackspambots
Mar 13 20:47:55 vps647732 sshd[1441]: Failed password for root from 222.186.173.180 port 9940 ssh2
Mar 13 20:47:59 vps647732 sshd[1441]: Failed password for root from 222.186.173.180 port 9940 ssh2
...
2020-03-14 03:59:40
14.29.214.34 attackspambots
Jan 20 21:30:10 pi sshd[8652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.214.34 
Jan 20 21:30:13 pi sshd[8652]: Failed password for invalid user test from 14.29.214.34 port 48639 ssh2
2020-03-14 04:22:09

最近上报的IP列表

19.180.99.56 38.92.114.66 175.30.122.16 115.11.41.155
59.46.80.16 229.13.150.232 127.224.48.156 23.254.202.166
74.182.180.15 60.67.23.66 252.245.32.140 88.208.253.77
151.42.196.18 118.198.19.213 230.107.161.131 218.5.82.52
203.126.138.120 26.73.36.75 244.174.165.204 231.129.221.28