必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Ecsed

省份(region): Heves megye

国家(country): Hungary

运营商(isp): DIGI

主机名(hostname): unknown

机构(organization): DIGI Tavkozlesi es Szolgaltato Kft.

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.21.127.78
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25394
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.21.127.78.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041701 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Thu Apr 18 03:38:20 +08 2019
;; MSG SIZE  rcvd: 116

HOST信息:
78.127.21.94.in-addr.arpa domain name pointer 94-21-127-78.pool.digikabel.hu.
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
78.127.21.94.in-addr.arpa	name = 94-21-127-78.pool.digikabel.hu.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.128.217.135 attackbots
Oct  9 19:40:33 friendsofhawaii sshd\[313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.135  user=root
Oct  9 19:40:35 friendsofhawaii sshd\[313\]: Failed password for root from 178.128.217.135 port 52210 ssh2
Oct  9 19:45:13 friendsofhawaii sshd\[718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.135  user=root
Oct  9 19:45:15 friendsofhawaii sshd\[718\]: Failed password for root from 178.128.217.135 port 35576 ssh2
Oct  9 19:49:59 friendsofhawaii sshd\[1143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.135  user=root
2019-10-10 14:05:06
178.128.106.139 attackspam
Oct  9 20:01:27 web1 sshd\[6460\]: Invalid user insserver from 178.128.106.139
Oct  9 20:01:27 web1 sshd\[6460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.106.139
Oct  9 20:01:29 web1 sshd\[6460\]: Failed password for invalid user insserver from 178.128.106.139 port 60390 ssh2
Oct  9 20:05:30 web1 sshd\[6764\]: Invalid user insserver from 178.128.106.139
Oct  9 20:05:30 web1 sshd\[6764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.106.139
2019-10-10 14:15:27
138.197.189.138 attackbotsspam
Oct  9 19:55:06 wbs sshd\[32093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.189.138  user=root
Oct  9 19:55:08 wbs sshd\[32093\]: Failed password for root from 138.197.189.138 port 43876 ssh2
Oct  9 19:58:51 wbs sshd\[32391\]: Invalid user 123 from 138.197.189.138
Oct  9 19:58:51 wbs sshd\[32391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.189.138
Oct  9 19:58:53 wbs sshd\[32391\]: Failed password for invalid user 123 from 138.197.189.138 port 55134 ssh2
2019-10-10 14:01:17
106.12.34.188 attackbots
Oct 10 05:44:07 microserver sshd[13894]: Invalid user 4%6rTyfgh from 106.12.34.188 port 42422
Oct 10 05:44:07 microserver sshd[13894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.34.188
Oct 10 05:44:09 microserver sshd[13894]: Failed password for invalid user 4%6rTyfgh from 106.12.34.188 port 42422 ssh2
Oct 10 05:48:27 microserver sshd[14525]: Invalid user Contrasena1@1 from 106.12.34.188 port 50408
Oct 10 05:48:27 microserver sshd[14525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.34.188
Oct 10 06:01:24 microserver sshd[16429]: Invalid user Montana2017 from 106.12.34.188 port 46152
Oct 10 06:01:24 microserver sshd[16429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.34.188
Oct 10 06:01:26 microserver sshd[16429]: Failed password for invalid user Montana2017 from 106.12.34.188 port 46152 ssh2
Oct 10 06:05:47 microserver sshd[17134]: Invalid user !@#wsx123 fro
2019-10-10 13:54:31
172.107.94.66 attackbots
" "
2019-10-10 14:09:30
195.181.168.138 attackbotsspam
\[2019-10-10 01:42:17\] NOTICE\[1887\] chan_sip.c: Registration from '\' failed for '195.181.168.138:54448' - Wrong password
\[2019-10-10 01:42:17\] SECURITY\[1898\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-10T01:42:17.819-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="515",SessionID="0x7fc3ac8f6cd8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/195.181.168.138/54448",Challenge="5a7bf3cd",ReceivedChallenge="5a7bf3cd",ReceivedHash="384ef202d69da9d13ae9e35de4fa19cd"
\[2019-10-10 01:43:36\] NOTICE\[1887\] chan_sip.c: Registration from '\' failed for '195.181.168.138:52651' - Wrong password
\[2019-10-10 01:43:36\] SECURITY\[1898\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-10T01:43:36.711-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="516",SessionID="0x7fc3acc3d768",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/195.181
2019-10-10 13:53:59
103.249.26.155 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/103.249.26.155/ 
 IN - 1H : (104)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : IN 
 NAME ASN : ASN132761 
 
 IP : 103.249.26.155 
 
 CIDR : 103.249.26.0/24 
 
 PREFIX COUNT : 12 
 
 UNIQUE IP COUNT : 3072 
 
 
 WYKRYTE ATAKI Z ASN132761 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-10 05:52:46 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-10 14:07:39
199.250.188.129 attack
(From noreply@gplforest7985.top) Hello There,

Are you presently working with Wordpress/Woocommerce or maybe will you plan to utilise it at some point ? We currently offer more than 2500 premium plugins but also themes 100 % free to get : http://voap.xyz/LXIA5

Regards,

Muriel
2019-10-10 14:12:40
142.44.137.62 attackbotsspam
Oct 10 07:07:56 SilenceServices sshd[11364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.137.62
Oct 10 07:07:59 SilenceServices sshd[11364]: Failed password for invalid user Animal@2017 from 142.44.137.62 port 46456 ssh2
Oct 10 07:12:00 SilenceServices sshd[12464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.137.62
2019-10-10 13:59:49
213.147.113.61 attackbots
RDP Brute-Force (Grieskirchen RZ1)
2019-10-10 13:55:02
200.233.134.85 attackspam
email spam
2019-10-10 13:29:40
222.186.175.147 attackspambots
Oct 10 07:48:21 minden010 sshd[22733]: Failed password for root from 222.186.175.147 port 29660 ssh2
Oct 10 07:48:35 minden010 sshd[22733]: Failed password for root from 222.186.175.147 port 29660 ssh2
Oct 10 07:48:40 minden010 sshd[22733]: Failed password for root from 222.186.175.147 port 29660 ssh2
Oct 10 07:48:40 minden010 sshd[22733]: error: maximum authentication attempts exceeded for root from 222.186.175.147 port 29660 ssh2 [preauth]
...
2019-10-10 13:58:17
80.211.16.26 attackspam
Oct  9 19:56:24 php1 sshd\[20420\]: Invalid user Books@2017 from 80.211.16.26
Oct  9 19:56:24 php1 sshd\[20420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.16.26
Oct  9 19:56:27 php1 sshd\[20420\]: Failed password for invalid user Books@2017 from 80.211.16.26 port 58166 ssh2
Oct  9 20:00:28 php1 sshd\[20744\]: Invalid user Pa\$\$w0rd001  from 80.211.16.26
Oct  9 20:00:28 php1 sshd\[20744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.16.26
2019-10-10 14:08:53
222.186.173.142 attackspambots
Oct 10 07:58:31 MainVPS sshd[20552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
Oct 10 07:58:32 MainVPS sshd[20552]: Failed password for root from 222.186.173.142 port 43450 ssh2
Oct 10 07:58:54 MainVPS sshd[20552]: error: maximum authentication attempts exceeded for root from 222.186.173.142 port 43450 ssh2 [preauth]
Oct 10 07:58:31 MainVPS sshd[20552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
Oct 10 07:58:32 MainVPS sshd[20552]: Failed password for root from 222.186.173.142 port 43450 ssh2
Oct 10 07:58:54 MainVPS sshd[20552]: error: maximum authentication attempts exceeded for root from 222.186.173.142 port 43450 ssh2 [preauth]
Oct 10 07:59:03 MainVPS sshd[20598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
Oct 10 07:59:05 MainVPS sshd[20598]: Failed password for root from 222.186.173.142 port
2019-10-10 14:02:02
118.243.118.144 attackbots
118.243.118.144 - - [10/Oct/2019:05:52:30 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
118.243.118.144 - - [10/Oct/2019:05:52:31 +0200] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
118.243.118.144 - - [10/Oct/2019:05:52:31 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
118.243.118.144 - - [10/Oct/2019:05:52:32 +0200] "POST /wp-login.php HTTP/1.1" 200 1486 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
118.243.118.144 - - [10/Oct/2019:05:52:33 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
118.243.118.144 - - [10/Oct/2019:05:52:34 +0200] "POST /wp-login.php HTTP/1.1" 200 1486 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
.
2019-10-10 14:15:11

最近上报的IP列表

103.9.159.49 167.99.100.140 171.244.45.137 113.204.66.138
59.47.72.9 45.18.126.38 182.76.208.98 217.165.126.112
37.187.108.207 202.191.168.99 94.21.241.37 138.68.57.194
120.138.19.194 93.66.56.27 13.251.22.128 185.117.75.163
186.77.199.246 45.32.191.29 39.120.13.73 117.50.48.21