必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): Shanxi

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): No.31,Jin-rong Street

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.70.42.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33025
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;1.70.42.152.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062701 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 27 23:21:23 CST 2019
;; MSG SIZE  rcvd: 115
HOST信息:
Host 152.42.70.1.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 152.42.70.1.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.51.30.252 attackspam
2020-07-24T11:02:47.4853041495-001 sshd[45042]: Invalid user software from 122.51.30.252 port 40932
2020-07-24T11:02:49.1005411495-001 sshd[45042]: Failed password for invalid user software from 122.51.30.252 port 40932 ssh2
2020-07-24T11:08:21.8732051495-001 sshd[45262]: Invalid user record from 122.51.30.252 port 37458
2020-07-24T11:08:21.8774171495-001 sshd[45262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.30.252
2020-07-24T11:08:21.8732051495-001 sshd[45262]: Invalid user record from 122.51.30.252 port 37458
2020-07-24T11:08:23.6752011495-001 sshd[45262]: Failed password for invalid user record from 122.51.30.252 port 37458 ssh2
...
2020-07-25 02:17:51
202.131.138.162 attackspambots
Unauthorized connection attempt from IP address 202.131.138.162 on Port 445(SMB)
2020-07-25 02:24:00
190.21.57.205 attackbotsspam
2020-07-24T01:54:13.157501hostname sshd[41694]: Failed password for invalid user newftpuser from 190.21.57.205 port 35652 ssh2
...
2020-07-25 02:24:55
116.247.81.99 attackbots
Jul 24 16:51:17 ip-172-31-61-156 sshd[21870]: Invalid user su from 116.247.81.99
...
2020-07-25 02:15:18
189.91.3.6 attackbotsspam
Jul 24 11:04:05 mail.srvfarm.net postfix/smtpd[2185298]: warning: unknown[189.91.3.6]: SASL PLAIN authentication failed: 
Jul 24 11:04:05 mail.srvfarm.net postfix/smtpd[2185298]: lost connection after AUTH from unknown[189.91.3.6]
Jul 24 11:04:31 mail.srvfarm.net postfix/smtps/smtpd[2191183]: warning: unknown[189.91.3.6]: SASL PLAIN authentication failed: 
Jul 24 11:04:31 mail.srvfarm.net postfix/smtps/smtpd[2191183]: lost connection after AUTH from unknown[189.91.3.6]
Jul 24 11:05:01 mail.srvfarm.net postfix/smtps/smtpd[2188750]: warning: unknown[189.91.3.6]: SASL PLAIN authentication failed:
2020-07-25 02:43:53
106.13.183.215 attackspambots
Invalid user gerrit2 from 106.13.183.215 port 43830
2020-07-25 02:27:49
138.197.21.218 attackspam
Failed password for invalid user admin from 138.197.21.218 port 48140 ssh2
2020-07-25 02:17:30
45.141.84.94 attack
Jul 24 20:09:37 debian-2gb-nbg1-2 kernel: \[17872696.461731\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.141.84.94 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=50089 PROTO=TCP SPT=49451 DPT=4228 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-25 02:11:03
59.92.62.174 attackspambots
1595598327 - 07/24/2020 15:45:27 Host: 59.92.62.174/59.92.62.174 Port: 445 TCP Blocked
2020-07-25 02:35:27
181.30.28.198 attack
Jul 24 17:24:30 scw-6657dc sshd[2317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.28.198
Jul 24 17:24:30 scw-6657dc sshd[2317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.28.198
Jul 24 17:24:32 scw-6657dc sshd[2317]: Failed password for invalid user adhi from 181.30.28.198 port 36132 ssh2
...
2020-07-25 02:25:11
52.173.245.34 attackbots
Attempted connection to port 3389.
2020-07-25 02:31:26
95.246.114.224 attackspambots
Honeypot attack, port: 445, PTR: host-95-246-114-224.retail.telecomitalia.it.
2020-07-25 02:20:57
139.155.90.88 attack
Jul 24 14:44:33 firewall sshd[8855]: Invalid user sheldon from 139.155.90.88
Jul 24 14:44:35 firewall sshd[8855]: Failed password for invalid user sheldon from 139.155.90.88 port 40294 ssh2
Jul 24 14:49:45 firewall sshd[9014]: Invalid user joni from 139.155.90.88
...
2020-07-25 02:22:39
113.255.224.209 attackbotsspam
1595598331 - 07/24/2020 15:45:31 Host: 113.255.224.209/113.255.224.209 Port: 445 TCP Blocked
2020-07-25 02:27:25
27.68.49.15 attack
Unauthorized connection attempt from IP address 27.68.49.15 on Port 445(SMB)
2020-07-25 02:36:23

最近上报的IP列表

183.82.184.34 40.73.244.133 113.43.147.235 223.145.167.204
117.45.234.228 14.184.108.251 152.179.122.31 153.141.174.184
2.50.10.176 211.169.217.184 70.130.87.128 94.98.75.65
109.72.65.116 177.92.245.6 142.93.155.191 54.191.226.166
68.49.254.168 148.49.110.133 81.30.54.202 117.163.70.103