必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.142.118.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26532
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.142.118.205.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 01:36:36 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 205.118.142.21.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 205.118.142.21.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
104.160.190.146 attack
Unauthorized connection attempt from IP address 104.160.190.146 on Port 445(SMB)
2019-12-07 05:27:51
117.200.79.20 attackspambots
Unauthorized connection attempt from IP address 117.200.79.20 on Port 445(SMB)
2019-12-07 05:27:19
5.9.198.99 attackspam
Dec  6 17:28:55 srv206 sshd[18493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=static.99.198.9.5.clients.your-server.de  user=bin
Dec  6 17:28:57 srv206 sshd[18493]: Failed password for bin from 5.9.198.99 port 33006 ssh2
...
2019-12-07 05:42:55
87.67.99.37 attack
Dec  6 20:19:58 pornomens sshd\[2995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.67.99.37  user=root
Dec  6 20:20:01 pornomens sshd\[2995\]: Failed password for root from 87.67.99.37 port 34534 ssh2
Dec  6 20:20:19 pornomens sshd\[2997\]: Invalid user funkquist from 87.67.99.37 port 55064
Dec  6 20:20:19 pornomens sshd\[2997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.67.99.37
...
2019-12-07 05:46:18
212.30.52.243 attack
2019-12-06T22:10:55.836311host3.slimhost.com.ua sshd[2308956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.30.52.243  user=root
2019-12-06T22:10:57.708690host3.slimhost.com.ua sshd[2308956]: Failed password for root from 212.30.52.243 port 48210 ssh2
2019-12-06T22:23:19.039630host3.slimhost.com.ua sshd[2316993]: Invalid user Jewel from 212.30.52.243 port 33406
2019-12-06T22:23:19.044438host3.slimhost.com.ua sshd[2316993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.30.52.243
2019-12-06T22:23:19.039630host3.slimhost.com.ua sshd[2316993]: Invalid user Jewel from 212.30.52.243 port 33406
2019-12-06T22:23:21.046723host3.slimhost.com.ua sshd[2316993]: Failed password for invalid user Jewel from 212.30.52.243 port 33406 ssh2
2019-12-06T22:29:55.532881host3.slimhost.com.ua sshd[2320998]: Invalid user doerner from 212.30.52.243 port 38971
2019-12-06T22:29:55.538650host3.slimhost.com.ua sshd[2320998]
...
2019-12-07 05:43:24
51.83.77.224 attack
leo_www
2019-12-07 05:27:36
88.204.202.222 attackbots
Unauthorized connection attempt from IP address 88.204.202.222 on Port 445(SMB)
2019-12-07 05:22:05
203.162.230.150 attackspam
Dec  6 22:11:36 ncomp sshd[23208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.162.230.150  user=root
Dec  6 22:11:38 ncomp sshd[23208]: Failed password for root from 203.162.230.150 port 51757 ssh2
Dec  6 22:19:26 ncomp sshd[23307]: Invalid user walter from 203.162.230.150
2019-12-07 05:25:21
58.26.67.73 attack
Unauthorized connection attempt from IP address 58.26.67.73 on Port 445(SMB)
2019-12-07 05:19:53
199.195.251.227 attackspambots
Dec  6 18:00:26 wh01 sshd[32166]: Invalid user lieselotte from 199.195.251.227 port 39726
Dec  6 18:00:26 wh01 sshd[32166]: Failed password for invalid user lieselotte from 199.195.251.227 port 39726 ssh2
Dec  6 18:00:26 wh01 sshd[32166]: Received disconnect from 199.195.251.227 port 39726:11: Bye Bye [preauth]
Dec  6 18:00:26 wh01 sshd[32166]: Disconnected from 199.195.251.227 port 39726 [preauth]
Dec  6 18:08:41 wh01 sshd[374]: Invalid user aideen from 199.195.251.227 port 38636
Dec  6 18:08:41 wh01 sshd[374]: Failed password for invalid user aideen from 199.195.251.227 port 38636 ssh2
Dec  6 18:08:41 wh01 sshd[374]: Received disconnect from 199.195.251.227 port 38636:11: Bye Bye [preauth]
Dec  6 18:08:41 wh01 sshd[374]: Disconnected from 199.195.251.227 port 38636 [preauth]
Dec  6 18:38:17 wh01 sshd[3148]: Invalid user rafaee from 199.195.251.227 port 55670
Dec  6 18:38:17 wh01 sshd[3148]: Failed password for invalid user rafaee from 199.195.251.227 port 55670 ssh2
Dec  6 18:38:17 w
2019-12-07 05:45:33
103.26.75.249 attackbots
Unauthorized connection attempt from IP address 103.26.75.249 on Port 445(SMB)
2019-12-07 05:34:16
120.211.27.45 attackbotsspam
2019-12-06T15:44:27.495394vfs-server-01 sshd\[12488\]: Invalid user ubnt from 120.211.27.45 port 33505
2019-12-06T15:45:25.606314vfs-server-01 sshd\[12575\]: Invalid user admin from 120.211.27.45 port 34972
2019-12-06T15:45:28.264437vfs-server-01 sshd\[12579\]: Invalid user admin from 120.211.27.45 port 35025
2019-12-07 05:36:35
54.37.71.235 attack
SSH Brute Force
2019-12-07 05:24:57
218.92.0.156 attack
Dec  6 18:11:15 firewall sshd[20102]: Failed password for root from 218.92.0.156 port 7124 ssh2
Dec  6 18:11:19 firewall sshd[20102]: Failed password for root from 218.92.0.156 port 7124 ssh2
Dec  6 18:11:22 firewall sshd[20102]: Failed password for root from 218.92.0.156 port 7124 ssh2
...
2019-12-07 05:12:47
92.118.161.37 attackbots
" "
2019-12-07 05:12:30

最近上报的IP列表

245.70.65.126 59.118.65.49 15.3.68.17 171.67.37.109
251.80.201.59 89.12.129.199 204.128.194.208 123.243.208.201
254.231.242.240 152.62.109.209 221.49.209.144 252.207.71.193
187.175.190.179 84.1.11.189 108.15.140.226 96.31.118.168
196.162.165.49 247.40.122.234 107.30.90.6 195.205.210.97