必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Nottingham

省份(region): England

国家(country): United Kingdom

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.11.139.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20480
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.11.139.122.			IN	A

;; AUTHORITY SECTION:
.			230	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020101301 1800 900 604800 86400

;; Query time: 82 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 14 04:00:18 CST 2020
;; MSG SIZE  rcvd: 117
HOST信息:
122.139.11.94.in-addr.arpa domain name pointer 5e0b8b7a.bb.sky.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
122.139.11.94.in-addr.arpa	name = 5e0b8b7a.bb.sky.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
125.64.94.212 attack
29.06.2019 15:31:54 Connection to port 32790 blocked by firewall
2019-06-29 23:52:14
121.186.14.44 attackspam
Triggered by Fail2Ban at Ares web server
2019-06-30 00:13:53
118.45.130.170 attackbotsspam
Reported by AbuseIPDB proxy server.
2019-06-29 23:53:56
160.16.119.99 attack
Invalid user fix from 160.16.119.99 port 47030
2019-06-30 00:27:12
115.159.235.153 attackbots
Jun 29 13:04:40 debian sshd\[18964\]: Invalid user p2p from 115.159.235.153 port 56215
Jun 29 13:04:40 debian sshd\[18964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.235.153
...
2019-06-30 00:30:48
159.89.151.10 attackspam
www.geburtshaus-fulda.de 159.89.151.10 \[29/Jun/2019:10:28:55 +0200\] "POST /wp-login.php HTTP/1.1" 200 5787 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
www.geburtshaus-fulda.de 159.89.151.10 \[29/Jun/2019:10:28:58 +0200\] "POST /wp-login.php HTTP/1.1" 200 5791 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-06-30 00:01:35
80.82.77.33 attackbotsspam
29.06.2019 16:19:54 Connection to port 4800 blocked by firewall
2019-06-30 00:35:13
210.149.180.125 attack
Automatic report - Web App Attack
2019-06-29 23:37:37
174.138.9.132 attackbotsspam
firewall-block, port(s): 634/tcp
2019-06-29 23:28:02
118.24.210.254 attackbots
Invalid user anne from 118.24.210.254 port 41104
2019-06-29 23:54:38
182.99.234.92 attackspam
Jun 29 03:29:03 mailman postfix/smtpd[14628]: warning: unknown[182.99.234.92]: SASL LOGIN authentication failed: authentication failure
2019-06-29 23:46:31
47.75.125.97 attackbotsspam
DATE:2019-06-29 10:30:05, IP:47.75.125.97, PORT:ssh brute force auth on SSH service (patata)
2019-06-29 23:40:48
76.27.98.228 attackbots
Jun 29 12:32:26   TCP Attack: SRC=76.27.98.228 DST=[Masked] LEN=40 TOS=0x00 PREC=0x00 TTL=55  PROTO=TCP SPT=8910 DPT=23 WINDOW=29078 RES=0x00 SYN URGP=0
2019-06-30 00:06:10
200.229.172.195 attack
Autoban   200.229.172.195 AUTH/CONNECT
2019-06-29 23:42:48
198.20.70.114 attack
Port scan: Attack repeated for 24 hours
2019-06-30 00:12:28

最近上报的IP列表

111.90.120.231 104.54.11.143 124.65.120.30 120.203.66.80
109.224.232.102 64.118.112.240 77.72.169.212 46.161.27.74
45.167.105.209 45.148.121.28 45.83.27.135 42.4.154.101
38.105.252.228 194.26.25.106 122.176.32.194 91.121.243.215
72.13.171.178 62.171.189.36 45.129.33.54 197.202.25.131