必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Hungary

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.21.6.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31135
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.21.6.89.			IN	A

;; AUTHORITY SECTION:
.			149	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010101 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 02 07:07:05 CST 2022
;; MSG SIZE  rcvd: 103
HOST信息:
89.6.21.94.in-addr.arpa domain name pointer 94-21-6-89.pool.digikabel.hu.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
89.6.21.94.in-addr.arpa	name = 94-21-6-89.pool.digikabel.hu.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
60.62.92.141 attack
Unauthorised access (Sep 27) SRC=60.62.92.141 LEN=40 TTL=47 ID=4441 TCP DPT=8080 WINDOW=20530 SYN 
Unauthorised access (Sep 25) SRC=60.62.92.141 LEN=40 TTL=47 ID=1268 TCP DPT=8080 WINDOW=20530 SYN 
Unauthorised access (Sep 25) SRC=60.62.92.141 LEN=40 TTL=47 ID=51649 TCP DPT=8080 WINDOW=20530 SYN 
Unauthorised access (Sep 25) SRC=60.62.92.141 LEN=40 TTL=47 ID=29204 TCP DPT=8080 WINDOW=20530 SYN
2019-09-27 12:10:55
129.204.202.89 attackbotsspam
Sep 27 05:56:01 mail sshd[11020]: Invalid user test from 129.204.202.89
Sep 27 05:56:01 mail sshd[11020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.202.89
Sep 27 05:56:01 mail sshd[11020]: Invalid user test from 129.204.202.89
Sep 27 05:56:03 mail sshd[11020]: Failed password for invalid user test from 129.204.202.89 port 40096 ssh2
Sep 27 06:11:58 mail sshd[13124]: Invalid user nana from 129.204.202.89
...
2019-09-27 12:31:36
82.62.170.205 attackbotsspam
Sep 27 04:36:47 site3 sshd\[86646\]: Invalid user rootuser from 82.62.170.205
Sep 27 04:36:47 site3 sshd\[86646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.62.170.205
Sep 27 04:36:49 site3 sshd\[86646\]: Failed password for invalid user rootuser from 82.62.170.205 port 52708 ssh2
Sep 27 04:40:45 site3 sshd\[86759\]: Invalid user chris from 82.62.170.205
Sep 27 04:40:45 site3 sshd\[86759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.62.170.205
...
2019-09-27 09:56:22
138.197.152.113 attack
Sep 26 18:08:13 php1 sshd\[31849\]: Invalid user lm from 138.197.152.113
Sep 26 18:08:13 php1 sshd\[31849\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.152.113
Sep 26 18:08:15 php1 sshd\[31849\]: Failed password for invalid user lm from 138.197.152.113 port 34350 ssh2
Sep 26 18:12:22 php1 sshd\[32290\]: Invalid user postgres from 138.197.152.113
Sep 26 18:12:22 php1 sshd\[32290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.152.113
2019-09-27 12:29:00
159.203.201.66 attack
ssh bruteforce or scan
...
2019-09-27 12:34:01
62.14.182.146 attackbots
port scan and connect, tcp 80 (http)
2019-09-27 12:26:57
139.59.25.230 attackspambots
Sep 26 17:52:13 hanapaa sshd\[2509\]: Invalid user ca from 139.59.25.230
Sep 26 17:52:13 hanapaa sshd\[2509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.25.230
Sep 26 17:52:15 hanapaa sshd\[2509\]: Failed password for invalid user ca from 139.59.25.230 port 42614 ssh2
Sep 26 17:56:38 hanapaa sshd\[2963\]: Invalid user ctrls from 139.59.25.230
Sep 26 17:56:38 hanapaa sshd\[2963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.25.230
2019-09-27 12:04:34
178.61.100.162 attackbots
Automatic report - Port Scan Attack
2019-09-27 12:30:50
172.94.53.141 attack
Sep 27 02:46:34 vps01 sshd[20739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.94.53.141
Sep 27 02:46:36 vps01 sshd[20739]: Failed password for invalid user test from 172.94.53.141 port 52180 ssh2
2019-09-27 09:59:31
222.186.173.183 attackspambots
Sep 27 04:08:34 sshgateway sshd\[20094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183  user=root
Sep 27 04:08:36 sshgateway sshd\[20094\]: Failed password for root from 222.186.173.183 port 37486 ssh2
Sep 27 04:08:48 sshgateway sshd\[20094\]: Failed password for root from 222.186.173.183 port 37486 ssh2
2019-09-27 12:14:43
94.177.243.130 attackbots
\[2019-09-26 23:55:57\] NOTICE\[1948\] chan_sip.c: Registration from '"220" \' failed for '94.177.243.130:5157' - Wrong password
\[2019-09-26 23:55:57\] SECURITY\[2006\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-09-26T23:55:57.140-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="220",SessionID="0x7f1e1c0a98e8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/94.177.243.130/5157",Challenge="3603fbd8",ReceivedChallenge="3603fbd8",ReceivedHash="9e07b826d55a04133081ffa925f0491a"
\[2019-09-26 23:56:20\] NOTICE\[1948\] chan_sip.c: Registration from '"651" \' failed for '94.177.243.130:5184' - Wrong password
\[2019-09-26 23:56:20\] SECURITY\[2006\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-09-26T23:56:20.061-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="651",SessionID="0x7f1e1c2bed58",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/9
2019-09-27 12:16:52
187.58.139.189 attackbots
Automatic report - Banned IP Access
2019-09-27 10:00:39
49.145.129.248 attack
Unauthorised access (Sep 27) SRC=49.145.129.248 LEN=52 TOS=0x08 PREC=0x20 TTL=106 ID=13049 DF TCP DPT=445 WINDOW=8192 SYN
2019-09-27 12:11:12
119.75.24.68 attackspam
(sshd) Failed SSH login from 119.75.24.68 (-): 5 in the last 3600 secs
2019-09-27 12:30:16
14.102.17.34 attack
2019-09-26T23:29:29.5638651495-001 sshd\[1171\]: Failed password for invalid user matt from 14.102.17.34 port 42991 ssh2
2019-09-26T23:41:38.9630761495-001 sshd\[2136\]: Invalid user user04 from 14.102.17.34 port 55365
2019-09-26T23:41:38.9700201495-001 sshd\[2136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.102.17.34
2019-09-26T23:41:40.5380871495-001 sshd\[2136\]: Failed password for invalid user user04 from 14.102.17.34 port 55365 ssh2
2019-09-26T23:47:30.7965831495-001 sshd\[2565\]: Invalid user fedora from 14.102.17.34 port 47428
2019-09-26T23:47:30.8035481495-001 sshd\[2565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.102.17.34
...
2019-09-27 12:11:55

最近上报的IP列表

60.106.79.110 117.204.180.29 69.188.115.116 161.64.208.107
17.48.196.55 162.84.99.53 194.232.41.21 187.3.35.15
64.209.168.156 209.112.144.70 178.172.13.132 68.182.231.177
9.11.166.159 227.245.144.232 224.173.60.71 19.118.1.197
207.108.28.34 32.62.141.164 41.129.203.109 44.116.40.181