必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Stahovica

省份(region): Kamnik

国家(country): Slovenia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Stelkom d.o.o.

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 77.94.140.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12932
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;77.94.140.124.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041500 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon Apr 15 13:40:35 +08 2019
;; MSG SIZE  rcvd: 117

HOST信息:
124.140.94.77.in-addr.arpa domain name pointer bsn-77-94-140-124.static.stelkom.net.
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
124.140.94.77.in-addr.arpa	name = bsn-77-94-140-124.static.stelkom.net.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
138.68.171.25 attack
2019-07-01T17:45:54.025749abusebot.cloudsearch.cf sshd\[5528\]: Invalid user fstab from 138.68.171.25 port 44972
2019-07-02 06:41:34
62.103.236.252 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-02 06:47:04
117.83.54.47 attackbotsspam
Jul  1 08:42:54 esmtp postfix/smtpd[15012]: lost connection after AUTH from unknown[117.83.54.47]
Jul  1 08:43:02 esmtp postfix/smtpd[15012]: lost connection after AUTH from unknown[117.83.54.47]
Jul  1 08:43:05 esmtp postfix/smtpd[15012]: lost connection after AUTH from unknown[117.83.54.47]
Jul  1 08:43:09 esmtp postfix/smtpd[15012]: lost connection after AUTH from unknown[117.83.54.47]
Jul  1 08:43:10 esmtp postfix/smtpd[15012]: lost connection after AUTH from unknown[117.83.54.47]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=117.83.54.47
2019-07-02 06:23:46
101.255.64.194 attackbotsspam
Jul  1 09:10:48 mail01 postfix/postscreen[8009]: CONNECT from [101.255.64.194]:42360 to [94.130.181.95]:25
Jul  1 09:10:48 mail01 postfix/dnsblog[8011]: addr 101.255.64.194 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jul  1 09:10:48 mail01 postfix/dnsblog[8010]: addr 101.255.64.194 listed by domain zen.spamhaus.org as 127.0.0.3
Jul  1 09:10:48 mail01 postfix/dnsblog[8010]: addr 101.255.64.194 listed by domain zen.spamhaus.org as 127.0.0.11
Jul  1 09:10:48 mail01 postfix/dnsblog[8010]: addr 101.255.64.194 listed by domain zen.spamhaus.org as 127.0.0.4
Jul  1 09:10:48 mail01 postfix/postscreen[8009]: PREGREET 16 after 0.47 from [101.255.64.194]:42360: EHLO 021fy.com

Jul  1 09:10:48 mail01 postfix/postscreen[8009]: DNSBL rank 4 for [101.255.64.194]:42360
Jul x@x
Jul x@x
Jul  1 09:10:50 mail01 postfix/postscreen[8009]: HANGUP after 1.6 from [101.255.64.194]:42360 in tests after SMTP handshake
Jul  1 09:10:50 mail01 postfix/postscreen[8009]: DISCONNECT [101.255.64.194........
-------------------------------
2019-07-02 06:21:11
51.68.46.70 attackspambots
Automatic report - Web App Attack
2019-07-02 06:37:13
61.163.143.85 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-02 06:31:36
61.162.171.209 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-02 06:29:46
103.83.215.73 attackspam
Brute forcing Wordpress login
2019-07-02 06:13:48
87.98.147.104 attackbotsspam
Reported by AbuseIPDB proxy server.
2019-07-02 06:29:13
198.71.239.36 attack
C1,WP GET /humor/beta/wp-includes/wlwmanifest.xml
2019-07-02 06:44:35
115.159.39.30 attack
Jul  1 20:26:15 vpn01 sshd\[29116\]: Invalid user amavis from 115.159.39.30
Jul  1 20:26:15 vpn01 sshd\[29116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.39.30
Jul  1 20:26:18 vpn01 sshd\[29116\]: Failed password for invalid user amavis from 115.159.39.30 port 54174 ssh2
2019-07-02 06:08:18
148.70.57.180 attack
ECShop Remote Code Execution Vulnerability
2019-07-02 06:11:10
60.191.52.254 attackbotsspam
Port scan: Attack repeated for 24 hours
2019-07-02 06:18:29
2001:41d0:1000:b72:: attackspambots
C1,WP GET /humor/newsite/wp-includes/wlwmanifest.xml
2019-07-02 06:12:10
94.227.247.212 attack
Honeypot attack, port: 23, PTR: 94-227-247-212.access.telenet.be.
2019-07-02 06:43:01

最近上报的IP列表

78.158.146.208 58.190.141.60 24.139.106.74 220.83.176.116
213.211.96.74 209.97.156.19 202.124.204.5 202.86.172.66
201.92.152.79 198.199.66.196 191.37.32.7 191.8.26.125
189.19.177.16 187.45.113.95 187.10.159.100 186.91.118.54
186.6.201.147 185.187.48.165 185.185.173.210 183.192.240.194