必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 0.230.120.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22661
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;0.230.120.42.			IN	A

;; AUTHORITY SECTION:
.			189	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110100 1800 900 604800 86400

;; Query time: 347 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 02 01:05:05 CST 2019
;; MSG SIZE  rcvd: 116
HOST信息:
Host 42.120.230.0.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.120.230.0.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.199.66.206 attackspambots
Dec  6 23:03:59 mail sshd[1437]: Failed password for root from 139.199.66.206 port 52504 ssh2
Dec  6 23:10:11 mail sshd[3129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.66.206 
Dec  6 23:10:13 mail sshd[3129]: Failed password for invalid user aclocal from 139.199.66.206 port 43720 ssh2
2019-12-07 13:26:58
106.13.45.243 attack
Dec  7 05:39:47 Ubuntu-1404-trusty-64-minimal sshd\[27135\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.45.243  user=root
Dec  7 05:39:49 Ubuntu-1404-trusty-64-minimal sshd\[27135\]: Failed password for root from 106.13.45.243 port 52796 ssh2
Dec  7 05:54:47 Ubuntu-1404-trusty-64-minimal sshd\[2353\]: Invalid user server from 106.13.45.243
Dec  7 05:54:47 Ubuntu-1404-trusty-64-minimal sshd\[2353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.45.243
Dec  7 05:54:49 Ubuntu-1404-trusty-64-minimal sshd\[2353\]: Failed password for invalid user server from 106.13.45.243 port 53442 ssh2
2019-12-07 13:29:23
182.61.37.144 attackspambots
2019-12-07T06:47:30.309105scmdmz1 sshd\[572\]: Invalid user pi from 182.61.37.144 port 50694
2019-12-07T06:47:30.311754scmdmz1 sshd\[572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.37.144
2019-12-07T06:47:31.914047scmdmz1 sshd\[572\]: Failed password for invalid user pi from 182.61.37.144 port 50694 ssh2
...
2019-12-07 13:54:24
2.59.116.162 attackspambots
Dec  7 04:52:46   TCP Attack: SRC=2.59.116.162 DST=[Masked] LEN=40 TOS=0x00 PREC=0x00 TTL=240  PROTO=TCP SPT=40403 DPT=24664 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-07 13:37:56
49.232.37.191 attackbotsspam
Dec  6 19:07:30 auw2 sshd\[21122\]: Invalid user rpm from 49.232.37.191
Dec  6 19:07:30 auw2 sshd\[21122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.37.191
Dec  6 19:07:32 auw2 sshd\[21122\]: Failed password for invalid user rpm from 49.232.37.191 port 51618 ssh2
Dec  6 19:14:06 auw2 sshd\[21893\]: Invalid user ww from 49.232.37.191
Dec  6 19:14:06 auw2 sshd\[21893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.37.191
2019-12-07 13:48:28
51.158.104.58 attack
2019-12-07T05:02:16.167757homeassistant sshd[32384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.104.58  user=root
2019-12-07T05:02:18.188205homeassistant sshd[32384]: Failed password for root from 51.158.104.58 port 45454 ssh2
...
2019-12-07 13:40:08
80.53.245.245 attackbotsspam
3389BruteforceFW23
2019-12-07 13:25:07
178.128.42.36 attackspam
firewall-block, port(s): 3392/tcp
2019-12-07 13:32:13
137.74.167.250 attack
Dec  6 19:38:20 php1 sshd\[9961\]: Invalid user guest from 137.74.167.250
Dec  6 19:38:20 php1 sshd\[9961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.167.250
Dec  6 19:38:22 php1 sshd\[9961\]: Failed password for invalid user guest from 137.74.167.250 port 43396 ssh2
Dec  6 19:43:41 php1 sshd\[10553\]: Invalid user mtichell from 137.74.167.250
Dec  6 19:43:41 php1 sshd\[10553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.167.250
2019-12-07 13:49:19
167.71.6.221 attack
Dec  7 05:54:31 pornomens sshd\[9009\]: Invalid user uuidd from 167.71.6.221 port 35764
Dec  7 05:54:31 pornomens sshd\[9009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.6.221
Dec  7 05:54:33 pornomens sshd\[9009\]: Failed password for invalid user uuidd from 167.71.6.221 port 35764 ssh2
...
2019-12-07 13:43:34
210.212.194.113 attack
Dec  7 00:31:20 plusreed sshd[24197]: Invalid user natsui from 210.212.194.113
...
2019-12-07 13:34:48
112.85.42.195 attackbots
$f2bV_matches
2019-12-07 13:31:03
218.92.0.147 attack
Dec  7 07:34:28 server sshd\[22316\]: User root from 218.92.0.147 not allowed because listed in DenyUsers
Dec  7 07:34:28 server sshd\[22316\]: Failed none for invalid user root from 218.92.0.147 port 28507 ssh2
Dec  7 07:34:28 server sshd\[22316\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.147  user=root
Dec  7 07:34:31 server sshd\[22316\]: Failed password for invalid user root from 218.92.0.147 port 28507 ssh2
Dec  7 07:34:34 server sshd\[22316\]: Failed password for invalid user root from 218.92.0.147 port 28507 ssh2
2019-12-07 13:38:26
123.20.89.1 attack
Dec  6 23:05:58 mail postfix/smtpd[895]: warning: unknown[123.20.89.1]: SASL PLAIN authentication failed: 
Dec  6 23:05:59 mail postfix/smtpd[1887]: warning: unknown[123.20.89.1]: SASL PLAIN authentication failed: 
Dec  6 23:14:08 mail postfix/smtpd[3727]: warning: unknown[123.20.89.1]: SASL PLAIN authentication failed:
2019-12-07 13:27:50
201.93.87.189 attackspam
2019-12-07T05:30:25.516394shield sshd\[9016\]: Invalid user qk from 201.93.87.189 port 37186
2019-12-07T05:30:25.520612shield sshd\[9016\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201-93-87-189.dial-up.telesp.net.br
2019-12-07T05:30:27.416488shield sshd\[9016\]: Failed password for invalid user qk from 201.93.87.189 port 37186 ssh2
2019-12-07T05:37:40.990906shield sshd\[11391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201-93-87-189.dial-up.telesp.net.br  user=sync
2019-12-07T05:37:43.268406shield sshd\[11391\]: Failed password for sync from 201.93.87.189 port 45966 ssh2
2019-12-07 13:56:19

最近上报的IP列表

166.35.141.83 32.217.148.166 70.239.99.254 7.190.93.175
217.38.64.48 80.91.79.192 19.242.131.33 34.66.240.166
215.186.102.151 123.40.221.155 100.194.46.152 134.109.168.116
226.87.53.6 114.69.176.136 131.135.163.30 12.178.23.208
90.85.50.5 107.86.154.127 15.32.191.55 95.35.164.144