必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
100.42.228.2 attack
RDP Bruteforce
2020-01-22 13:54:18
100.42.228.2 attackbots
3389BruteforceFW22
2019-11-17 22:34:36
100.42.228.2 attack
RDP Bruteforce
2019-10-28 05:18:38
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       100.42.224.0 - 100.42.239.255
CIDR:           100.42.224.0/20
NetName:        SOLIDTOOLSTECH
NetHandle:      NET-100-42-224-0-1
Parent:         NET100 (NET-100-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   SolidTools Technology, Inc. (ST-47)
RegDate:        2011-12-16
Updated:        2011-12-16
Comment:        http://www.solidtools.com 
Comment:        Standard NOC hours are 9am to 12pm PST
Ref:            https://rdap.arin.net/registry/ip/100.42.224.0


OrgName:        SolidTools Technology, Inc.
OrgId:          ST-47
Address:        1600 Gomes Rd
City:           Fremont
StateProv:      CA
PostalCode:     94539
Country:        US
RegDate:        2011-10-26
Updated:        2024-11-25
Comment:        http://www.solidtools.com 
Comment:        Standard NOC hours are 9am to 12pm PST
Ref:            https://rdap.arin.net/registry/entity/ST-47

ReferralServer:  rwhois://65.49.89.187:4321

OrgTechHandle: SUNPE1-ARIN
OrgTechName:   Sun, Peter 
OrgTechPhone:  +1-925-621-8081 
OrgTechEmail:  support@solidtools.com
OrgTechRef:    https://rdap.arin.net/registry/entity/SUNPE1-ARIN

OrgAbuseHandle: SUNPE1-ARIN
OrgAbuseName:   Sun, Peter 
OrgAbusePhone:  +1-925-621-8081 
OrgAbuseEmail:  support@solidtools.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/SUNPE1-ARIN

OrgNOCHandle: SUNPE1-ARIN
OrgNOCName:   Sun, Peter 
OrgNOCPhone:  +1-925-621-8081 
OrgNOCEmail:  support@solidtools.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/SUNPE1-ARIN

# end


# start

NetRange:       100.42.228.96 - 100.42.228.111
CIDR:           100.42.228.96/28
NetName:        2S-NET
NetHandle:      NET-100-42-228-96-1
Parent:         SOLIDTOOLSTECH (NET-100-42-224-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       2S.NET (C03223315)
RegDate:        2012-12-05
Updated:        2012-12-05
Comment:        daichi@2s.net
Ref:            https://rdap.arin.net/registry/ip/100.42.228.96


CustName:       2S.NET
Address:        115 Sansome Street Suite 101
City:           San Francisco
StateProv:      CA
PostalCode:     94104
Country:        US
RegDate:        2012-12-05
Updated:        2012-12-05
Ref:            https://rdap.arin.net/registry/entity/C03223315

OrgTechHandle: SUNPE1-ARIN
OrgTechName:   Sun, Peter 
OrgTechPhone:  +1-925-621-8081 
OrgTechEmail:  support@solidtools.com
OrgTechRef:    https://rdap.arin.net/registry/entity/SUNPE1-ARIN

OrgAbuseHandle: SUNPE1-ARIN
OrgAbuseName:   Sun, Peter 
OrgAbusePhone:  +1-925-621-8081 
OrgAbuseEmail:  support@solidtools.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/SUNPE1-ARIN

OrgNOCHandle: SUNPE1-ARIN
OrgNOCName:   Sun, Peter 
OrgNOCPhone:  +1-925-621-8081 
OrgNOCEmail:  support@solidtools.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/SUNPE1-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



Found a referral to 65.49.89.187:4321.
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 100.42.228.102
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40168
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;100.42.228.102.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025100800 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 08 21:14:52 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 102.228.42.100.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 100.42.228.102.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
50.100.113.207 attack
2020-05-15T14:17:42.459328vt3.awoom.xyz sshd[22911]: Invalid user alvan from 50.100.113.207 port 56286
2020-05-15T14:17:42.463002vt3.awoom.xyz sshd[22911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=bras-base-mtrlpq3704w-grc-11-50-100-113-207.dsl.bell.ca
2020-05-15T14:17:42.459328vt3.awoom.xyz sshd[22911]: Invalid user alvan from 50.100.113.207 port 56286
2020-05-15T14:17:44.583413vt3.awoom.xyz sshd[22911]: Failed password for invalid user alvan from 50.100.113.207 port 56286 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=50.100.113.207
2020-05-16 03:02:07
70.115.255.150 attack
Unauthorized connection attempt detected from IP address 70.115.255.150 to port 8080
2020-05-16 02:45:34
23.100.232.233 attackbotsspam
abuseConfidenceScore blocked for 12h
2020-05-16 03:00:31
186.225.43.94 attack
Sql/code injection probe
2020-05-16 02:46:51
171.7.225.248 attackspam
May 15 14:13:30 b-admin sshd[6727]: Did not receive identification string from 171.7.225.248 port 2626
May 15 14:13:34 b-admin sshd[6732]: Invalid user noc from 171.7.225.248 port 3020
May 15 14:13:34 b-admin sshd[6732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.7.225.248
May 15 14:13:36 b-admin sshd[6732]: Failed password for invalid user noc from 171.7.225.248 port 3020 ssh2
May 15 14:13:36 b-admin sshd[6732]: Connection closed by 171.7.225.248 port 3020 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=171.7.225.248
2020-05-16 02:35:10
197.156.104.163 attackbotsspam
Port scanning
2020-05-16 02:56:46
106.13.116.203 attackspam
2020-05-14 23:03:55 server sshd[51808]: Failed password for invalid user ubuntu from 106.13.116.203 port 59036 ssh2
2020-05-16 02:23:49
64.227.37.93 attackspam
May 15 21:01:26 vmd48417 sshd[24764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.37.93
2020-05-16 03:08:13
78.37.17.226 attackbotsspam
Lines containing failures of 78.37.17.226
May 15 14:14:37 shared07 sshd[4205]: Did not receive identification string from 78.37.17.226 port 17253
May 15 14:14:41 shared07 sshd[4216]: Invalid user Adminixxxr from 78.37.17.226 port 11031
May 15 14:14:41 shared07 sshd[4216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.37.17.226
May 15 14:14:43 shared07 sshd[4216]: Failed password for invalid user Adminixxxr from 78.37.17.226 port 11031 ssh2
May 15 14:14:43 shared07 sshd[4216]: Connection closed by invalid user Adminixxxr 78.37.17.226 port 11031 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=78.37.17.226
2020-05-16 02:39:05
51.75.70.30 attackspambots
May 15 23:09:45 NG-HHDC-SVS-001 sshd[11756]: Invalid user oscar from 51.75.70.30
...
2020-05-16 02:35:57
113.176.100.176 attackbotsspam
Lines containing failures of 113.176.100.176
May 15 14:16:19 shared05 sshd[452]: Did not receive identification string from 113.176.100.176 port 62285
May 15 14:16:25 shared05 sshd[457]: Invalid user system from 113.176.100.176 port 62982
May 15 14:16:25 shared05 sshd[457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.176.100.176
May 15 14:16:26 shared05 sshd[457]: Failed password for invalid user system from 113.176.100.176 port 62982 ssh2
May 15 14:16:27 shared05 sshd[457]: Connection closed by invalid user system 113.176.100.176 port 62982 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.176.100.176
2020-05-16 02:53:43
206.189.3.176 attack
"fail2ban match"
2020-05-16 02:24:58
218.78.54.84 attack
May 15 14:13:21 srv-ubuntu-dev3 sshd[19130]: Invalid user nagios from 218.78.54.84
May 15 14:13:21 srv-ubuntu-dev3 sshd[19130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.54.84
May 15 14:13:21 srv-ubuntu-dev3 sshd[19130]: Invalid user nagios from 218.78.54.84
May 15 14:13:23 srv-ubuntu-dev3 sshd[19130]: Failed password for invalid user nagios from 218.78.54.84 port 51758 ssh2
May 15 14:17:01 srv-ubuntu-dev3 sshd[20602]: Invalid user ubuntu from 218.78.54.84
May 15 14:17:01 srv-ubuntu-dev3 sshd[20602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.54.84
May 15 14:17:01 srv-ubuntu-dev3 sshd[20602]: Invalid user ubuntu from 218.78.54.84
May 15 14:17:03 srv-ubuntu-dev3 sshd[20602]: Failed password for invalid user ubuntu from 218.78.54.84 port 49156 ssh2
May 15 14:20:57 srv-ubuntu-dev3 sshd[21227]: Invalid user webmaster from 218.78.54.84
...
2020-05-16 03:03:00
139.59.69.76 attackbotsspam
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-05-16 02:49:27
89.127.12.78 attack
Brute force SMTP login attempted.
...
2020-05-16 03:04:40

最近上报的IP列表

36.41.69.114 36.41.65.20 194.187.176.95 194.187.176.57
125.122.33.126 38.60.241.177 3.72.132.98 185.180.140.10
172.200.99.12 216.180.246.44 14.213.49.207 199.45.154.134
124.132.21.237 182.119.0.227 3.252.213.65 185.180.141.17
185.132.53.243 167.99.189.38 2a10:50c0:c001::296d:7602 192.168.0.192