必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.198.42.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58399
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.198.42.117.			IN	A

;; AUTHORITY SECTION:
.			316	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022400 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 24 17:31:25 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 117.42.198.1.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 1.198.42.117.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.38.186.228 attack
Aug 10 06:38:29 vmd17057 sshd\[3149\]: Invalid user temp from 51.38.186.228 port 52056
Aug 10 06:38:29 vmd17057 sshd\[3149\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.228
Aug 10 06:38:31 vmd17057 sshd\[3149\]: Failed password for invalid user temp from 51.38.186.228 port 52056 ssh2
...
2019-08-10 17:06:27
149.56.13.165 attack
Aug 10 08:03:41 vps691689 sshd[31936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.13.165
Aug 10 08:03:43 vps691689 sshd[31936]: Failed password for invalid user coin from 149.56.13.165 port 38572 ssh2
Aug 10 08:08:03 vps691689 sshd[31962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.13.165
...
2019-08-10 17:02:33
139.219.133.155 attack
Automatic report - Banned IP Access
2019-08-10 16:54:31
218.92.0.194 attackbots
2019-08-10T08:17:46.227150abusebot-7.cloudsearch.cf sshd\[18875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.194  user=root
2019-08-10 16:21:20
184.105.247.234 attack
21/tcp 8443/tcp 443/udp...
[2019-06-10/08-10]49pkt,15pt.(tcp),2pt.(udp)
2019-08-10 17:02:59
69.64.45.37 attackbotsspam
WP_xmlrpc_attack
2019-08-10 16:58:23
71.88.252.84 attackspambots
Automatic report - Port Scan Attack
2019-08-10 16:52:22
218.92.0.167 attackspambots
Aug 10 08:50:15 animalibera sshd[27122]: Failed password for root from 218.92.0.167 port 63028 ssh2
Aug 10 08:50:18 animalibera sshd[27122]: Failed password for root from 218.92.0.167 port 63028 ssh2
Aug 10 08:50:21 animalibera sshd[27122]: Failed password for root from 218.92.0.167 port 63028 ssh2
Aug 10 08:50:24 animalibera sshd[27122]: Failed password for root from 218.92.0.167 port 63028 ssh2
Aug 10 08:50:27 animalibera sshd[27122]: Failed password for root from 218.92.0.167 port 63028 ssh2
...
2019-08-10 16:55:39
180.159.4.164 attackspam
Telnet Server BruteForce Attack
2019-08-10 16:44:18
128.199.252.144 attack
Aug 10 09:06:27 pkdns2 sshd\[4466\]: Address 128.199.252.144 maps to dev2.d-enabled.me, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Aug 10 09:06:27 pkdns2 sshd\[4466\]: Invalid user gu from 128.199.252.144Aug 10 09:06:29 pkdns2 sshd\[4466\]: Failed password for invalid user gu from 128.199.252.144 port 45247 ssh2Aug 10 09:11:20 pkdns2 sshd\[4669\]: Address 128.199.252.144 maps to dev2.d-enabled.me, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Aug 10 09:11:20 pkdns2 sshd\[4669\]: Invalid user sinus from 128.199.252.144Aug 10 09:11:21 pkdns2 sshd\[4669\]: Failed password for invalid user sinus from 128.199.252.144 port 40990 ssh2
...
2019-08-10 17:07:35
81.22.45.251 attack
Aug 10 08:38:39 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.251 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=10988 PROTO=TCP SPT=54047 DPT=3491 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-08-10 17:05:18
139.59.4.141 attackbotsspam
Aug 10 03:26:39 plusreed sshd[6611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.4.141  user=root
Aug 10 03:26:40 plusreed sshd[6611]: Failed password for root from 139.59.4.141 port 44574 ssh2
...
2019-08-10 16:54:07
46.3.96.69 attackspam
Multiport scan : 17 ports scanned 1564 1787 1879 1880 1887 1889 1899 10000 14000 15000 16000 21000 22000 24000 27000 28000 29000
2019-08-10 16:48:19
217.117.13.12 attack
Aug 10 04:33:29 SilenceServices sshd[5360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.117.13.12
Aug 10 04:33:31 SilenceServices sshd[5360]: Failed password for invalid user pi from 217.117.13.12 port 34317 ssh2
Aug 10 04:33:38 SilenceServices sshd[5449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.117.13.12
2019-08-10 16:26:05
95.49.235.118 attackbots
port scan and connect, tcp 22 (ssh)
2019-08-10 17:04:32

最近上报的IP列表

1.198.42.113 1.198.42.119 179.235.237.18 1.198.42.130
1.198.42.138 1.198.42.140 1.198.42.142 1.198.42.161
1.198.42.164 206.6.247.245 1.198.42.166 1.198.42.169
1.198.42.205 141.113.89.90 1.198.42.211 1.198.42.223
1.198.42.226 1.198.42.246 1.198.42.31 1.198.42.60