必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Fort Dodge

省份(region): Iowa

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 69.63.20.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16319
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;69.63.20.121.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 08:06:48 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
121.20.63.69.in-addr.arpa domain name pointer lhgh-4-69-63-20-121.dsl.netins.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
121.20.63.69.in-addr.arpa	name = lhgh-4-69-63-20-121.dsl.netins.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
67.55.92.90 attackbots
Dec  6 01:41:36 icinga sshd[36592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.55.92.90 
Dec  6 01:41:38 icinga sshd[36592]: Failed password for invalid user rpm from 67.55.92.90 port 37406 ssh2
Dec  6 01:47:28 icinga sshd[42006]: Failed password for root from 67.55.92.90 port 45198 ssh2
...
2019-12-06 09:11:24
45.141.86.131 attackbots
12/05/2019-18:13:03.210557 45.141.86.131 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-06 09:10:16
180.76.182.157 attackspam
SSH brute-force: detected 29 distinct usernames within a 24-hour window.
2019-12-06 09:07:16
222.252.30.117 attack
Dec  5 19:56:24 sshd: Connection from 222.252.30.117 port 37094
Dec  5 19:56:26 sshd: reverse mapping checking getaddrinfo for static.vnpt-hanoi.com.vn [222.252.30.117] failed - POSSIBLE BREAK-IN ATTEMPT!
Dec  5 19:56:26 sshd: Invalid user holste from 222.252.30.117
Dec  5 19:56:26 sshd: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.252.30.117
Dec  5 19:56:28 sshd: Failed password for invalid user holste from 222.252.30.117 port 37094 ssh2
Dec  5 19:56:29 sshd: Received disconnect from 222.252.30.117: 11: Bye Bye [preauth]
2019-12-06 08:56:09
177.133.58.0 attack
Unauthorized connection attempt from IP address 177.133.58.0 on Port 445(SMB)
2019-12-06 08:41:47
190.85.200.110 attack
Unauthorized connection attempt from IP address 190.85.200.110 on Port 445(SMB)
2019-12-06 08:36:36
187.237.19.114 attack
Unauthorized connection attempt from IP address 187.237.19.114 on Port 445(SMB)
2019-12-06 08:42:42
50.208.49.154 attackspambots
Dec  5 17:41:39 server sshd\[24161\]: Failed password for invalid user gdm from 50.208.49.154 port 22252 ssh2
Dec  6 02:17:27 server sshd\[3309\]: Invalid user info from 50.208.49.154
Dec  6 02:17:27 server sshd\[3309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.208.49.154 
Dec  6 02:17:30 server sshd\[3309\]: Failed password for invalid user info from 50.208.49.154 port 19822 ssh2
Dec  6 02:33:20 server sshd\[7501\]: Invalid user jenny from 50.208.49.154
Dec  6 02:33:20 server sshd\[7501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.208.49.154 
...
2019-12-06 08:55:23
47.74.231.192 attackspam
Dec  6 00:54:15 venus sshd\[424\]: Invalid user olsgard from 47.74.231.192 port 57534
Dec  6 00:54:15 venus sshd\[424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.74.231.192
Dec  6 00:54:17 venus sshd\[424\]: Failed password for invalid user olsgard from 47.74.231.192 port 57534 ssh2
...
2019-12-06 09:06:29
188.36.121.218 attackspambots
Dec  5 17:13:42 sshd: Connection from 188.36.121.218 port 35290
Dec  5 17:13:43 sshd: Invalid user mysql from 188.36.121.218
Dec  5 17:13:45 sshd: Failed password for invalid user mysql from 188.36.121.218 port 35290 ssh2
Dec  5 17:13:45 sshd: Received disconnect from 188.36.121.218: 11: Bye Bye [preauth]
2019-12-06 08:49:57
218.92.0.155 attackspambots
Dec  6 02:09:26 minden010 sshd[7673]: Failed password for root from 218.92.0.155 port 11171 ssh2
Dec  6 02:09:29 minden010 sshd[7673]: Failed password for root from 218.92.0.155 port 11171 ssh2
Dec  6 02:09:32 minden010 sshd[7673]: Failed password for root from 218.92.0.155 port 11171 ssh2
Dec  6 02:09:35 minden010 sshd[7673]: Failed password for root from 218.92.0.155 port 11171 ssh2
...
2019-12-06 09:12:23
60.255.230.202 attackspam
Dec  5 19:19:43 sshd: Connection from 60.255.230.202 port 37008
Dec  5 19:19:48 sshd: Invalid user bale from 60.255.230.202
Dec  5 19:19:48 sshd: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.255.230.202
Dec  5 19:19:50 sshd: Failed password for invalid user bale from 60.255.230.202 port 37008 ssh2
Dec  5 19:19:51 sshd: Received disconnect from 60.255.230.202: 11: Bye Bye [preauth]
2019-12-06 08:54:58
138.197.166.110 attackspambots
Dec  5 18:16:45 sshd: Connection from 138.197.166.110 port 33082
Dec  5 18:16:45 sshd: Invalid user 12345660 from 138.197.166.110
Dec  5 18:16:45 sshd: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.166.110
Dec  5 18:16:47 sshd: Failed password for invalid user 12345660 from 138.197.166.110 port 33082 ssh2
Dec  5 18:16:47 sshd: Received disconnect from 138.197.166.110: 11: Bye Bye [preauth]
2019-12-06 09:00:19
134.175.39.246 attackbots
Dec  6 01:01:38 server sshd\[15444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.39.246  user=root
Dec  6 01:01:40 server sshd\[15444\]: Failed password for root from 134.175.39.246 port 54030 ssh2
Dec  6 01:13:50 server sshd\[18634\]: Invalid user dydcjf from 134.175.39.246
Dec  6 01:13:50 server sshd\[18634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.39.246 
Dec  6 01:13:52 server sshd\[18634\]: Failed password for invalid user dydcjf from 134.175.39.246 port 48356 ssh2
...
2019-12-06 08:51:45
14.228.143.134 attack
Unauthorized connection attempt from IP address 14.228.143.134 on Port 445(SMB)
2019-12-06 08:40:41

最近上报的IP列表

160.55.69.39 171.16.62.187 59.24.248.241 81.199.255.73
86.180.74.79 16.34.159.163 34.205.189.41 144.93.212.141
29.233.105.38 241.164.192.163 128.222.241.17 200.69.126.83
137.34.213.100 169.246.34.151 67.210.63.70 29.107.78.161
196.163.4.3 239.63.85.219 172.84.37.72 53.56.52.116