必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Australia

运营商(isp): Telstra

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.130.221.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53616
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;1.130.221.42.			IN	A

;; AUTHORITY SECTION:
.			249	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020061001 1800 900 604800 86400

;; Query time: 101 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 11 07:32:06 CST 2020
;; MSG SIZE  rcvd: 116
HOST信息:
Host 42.221.130.1.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.221.130.1.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
221.120.163.94 attackspam
SSH Bruteforce Attempt (failed auth)
2020-10-11 22:11:35
191.235.98.36 attackspam
4 SSH login attempts.
2020-10-11 22:19:33
45.142.124.149 attackbotsspam
Oct  7 09:24:21 cumulus sshd[27112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.142.124.149  user=r.r
Oct  7 09:24:23 cumulus sshd[27112]: Failed password for r.r from 45.142.124.149 port 48816 ssh2
Oct  7 09:24:23 cumulus sshd[27112]: Received disconnect from 45.142.124.149 port 48816:11: Bye Bye [preauth]
Oct  7 09:24:23 cumulus sshd[27112]: Disconnected from 45.142.124.149 port 48816 [preauth]
Oct  7 09:31:06 cumulus sshd[27642]: Connection closed by 45.142.124.149 port 39582 [preauth]
Oct  7 09:34:53 cumulus sshd[27979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.142.124.149  user=r.r
Oct  7 09:34:55 cumulus sshd[27979]: Failed password for r.r from 45.142.124.149 port 34710 ssh2
Oct  7 09:34:55 cumulus sshd[27979]: Received disconnect from 45.142.124.149 port 34710:11: Bye Bye [preauth]
Oct  7 09:34:55 cumulus sshd[27979]: Disconnected from 45.142.124.149 port 34710 [pre........
-------------------------------
2020-10-11 22:17:18
128.199.207.142 attackspambots
Oct 11 06:45:23 doubuntu sshd[13511]: Invalid user normann from 128.199.207.142 port 48748
Oct 11 06:45:23 doubuntu sshd[13511]: Disconnected from invalid user normann 128.199.207.142 port 48748 [preauth]
...
2020-10-11 22:10:05
159.69.241.38 attackspam
2020-10-11T13:17:04.943339abusebot-4.cloudsearch.cf sshd[29828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=static.38.241.69.159.clients.your-server.de  user=root
2020-10-11T13:17:07.108135abusebot-4.cloudsearch.cf sshd[29828]: Failed password for root from 159.69.241.38 port 50640 ssh2
2020-10-11T13:23:32.440415abusebot-4.cloudsearch.cf sshd[29907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=static.38.241.69.159.clients.your-server.de  user=root
2020-10-11T13:23:34.538977abusebot-4.cloudsearch.cf sshd[29907]: Failed password for root from 159.69.241.38 port 35048 ssh2
2020-10-11T13:26:49.650020abusebot-4.cloudsearch.cf sshd[29985]: Invalid user phil from 159.69.241.38 port 43284
2020-10-11T13:26:49.656182abusebot-4.cloudsearch.cf sshd[29985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=static.38.241.69.159.clients.your-server.de
2020-10-11T13:26:49.6500
...
2020-10-11 22:17:43
112.85.42.85 attackspam
Oct 11 15:37:46 hosting sshd[32408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.85  user=root
Oct 11 15:37:48 hosting sshd[32408]: Failed password for root from 112.85.42.85 port 12246 ssh2
...
2020-10-11 22:04:47
190.145.192.106 attack
Oct 11 06:24:11 pixelmemory sshd[2294484]: Failed password for root from 190.145.192.106 port 44582 ssh2
Oct 11 06:27:36 pixelmemory sshd[2312916]: Invalid user haruki from 190.145.192.106 port 41296
Oct 11 06:27:36 pixelmemory sshd[2312916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.192.106 
Oct 11 06:27:36 pixelmemory sshd[2312916]: Invalid user haruki from 190.145.192.106 port 41296
Oct 11 06:27:38 pixelmemory sshd[2312916]: Failed password for invalid user haruki from 190.145.192.106 port 41296 ssh2
...
2020-10-11 22:09:47
167.172.38.238 attackbotsspam
Oct 12 00:49:07 localhost sshd[2527766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.38.238  user=root
Oct 12 00:49:09 localhost sshd[2527766]: Failed password for root from 167.172.38.238 port 47108 ssh2
...
2020-10-11 22:00:42
87.251.77.206 attackbots
port scan and connect, tcp 22 (ssh)
2020-10-11 22:01:27
49.234.99.246 attack
(sshd) Failed SSH login from 49.234.99.246 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 11 09:37:17 server sshd[23364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.99.246  user=root
Oct 11 09:37:19 server sshd[23364]: Failed password for root from 49.234.99.246 port 39334 ssh2
Oct 11 09:53:45 server sshd[27904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.99.246  user=root
Oct 11 09:53:47 server sshd[27904]: Failed password for root from 49.234.99.246 port 35750 ssh2
Oct 11 09:57:52 server sshd[29075]: Invalid user web from 49.234.99.246 port 51500
2020-10-11 22:25:50
194.87.138.206 attack
5x Failed Password
2020-10-11 22:31:42
175.215.52.222 attackspam
SSH login attempts.
2020-10-11 22:29:03
49.235.190.177 attackbots
SSH login attempts.
2020-10-11 22:14:30
141.98.9.31 attackbotsspam
2020-10-11T14:31:09.155840abusebot-4.cloudsearch.cf sshd[30823]: Invalid user 1234 from 141.98.9.31 port 51082
2020-10-11T14:31:09.162673abusebot-4.cloudsearch.cf sshd[30823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.31
2020-10-11T14:31:09.155840abusebot-4.cloudsearch.cf sshd[30823]: Invalid user 1234 from 141.98.9.31 port 51082
2020-10-11T14:31:10.877267abusebot-4.cloudsearch.cf sshd[30823]: Failed password for invalid user 1234 from 141.98.9.31 port 51082 ssh2
2020-10-11T14:31:31.659063abusebot-4.cloudsearch.cf sshd[30884]: Invalid user user from 141.98.9.31 port 60610
2020-10-11T14:31:31.668829abusebot-4.cloudsearch.cf sshd[30884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.31
2020-10-11T14:31:31.659063abusebot-4.cloudsearch.cf sshd[30884]: Invalid user user from 141.98.9.31 port 60610
2020-10-11T14:31:33.403456abusebot-4.cloudsearch.cf sshd[30884]: Failed password for inval
...
2020-10-11 22:34:48
167.172.133.221 attackbots
TCP port : 460
2020-10-11 22:32:10

最近上报的IP列表

82.52.75.187 76.247.161.120 3.126.13.237 172.105.158.111
40.141.64.171 141.156.245.47 124.95.197.9 109.248.84.137
209.158.151.164 219.7.178.152 197.97.203.192 173.232.226.177
83.220.64.47 133.80.137.149 173.246.203.135 184.60.208.189
190.20.232.132 63.25.166.122 122.134.71.108 76.87.235.136