必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.125.246.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48839
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.125.246.42.			IN	A

;; AUTHORITY SECTION:
.			597	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 16:23:15 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 42.246.125.106.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.246.125.106.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
212.64.75.138 attackbots
Port scan on 2 port(s): 8080 9200
2019-10-07 20:57:35
51.15.211.148 attackbots
Oct  7 11:43:44 localhost sshd\[107740\]: Invalid user 123Serial from 51.15.211.148 port 39996
Oct  7 11:43:44 localhost sshd\[107740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.211.148
Oct  7 11:43:45 localhost sshd\[107740\]: Failed password for invalid user 123Serial from 51.15.211.148 port 39996 ssh2
Oct  7 11:47:38 localhost sshd\[107859\]: Invalid user Passwort@12 from 51.15.211.148 port 52306
Oct  7 11:47:38 localhost sshd\[107859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.211.148
...
2019-10-07 20:47:27
202.122.23.70 attack
Oct  7 02:48:09 hpm sshd\[10312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.122.23.70  user=root
Oct  7 02:48:11 hpm sshd\[10312\]: Failed password for root from 202.122.23.70 port 24038 ssh2
Oct  7 02:52:41 hpm sshd\[10706\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.122.23.70  user=root
Oct  7 02:52:43 hpm sshd\[10706\]: Failed password for root from 202.122.23.70 port 46668 ssh2
Oct  7 02:57:10 hpm sshd\[11086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.122.23.70  user=root
2019-10-07 21:05:46
220.119.203.83 attackbotsspam
Fail2Ban - FTP Abuse Attempt
2019-10-07 20:51:28
198.108.66.84 attack
" "
2019-10-07 21:11:48
107.13.186.21 attackspam
*Port Scan* detected from 107.13.186.21 (US/United States/mta-107-13-186-21.nc.rr.com). 4 hits in the last 30 seconds
2019-10-07 20:59:25
188.158.180.75 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/188.158.180.75/ 
 IR - 1H : (80)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : IR 
 NAME ASN : ASN39501 
 
 IP : 188.158.180.75 
 
 CIDR : 188.158.160.0/19 
 
 PREFIX COUNT : 91 
 
 UNIQUE IP COUNT : 203776 
 
 
 WYKRYTE ATAKI Z ASN39501 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 4 
 
 DateTime : 2019-10-07 13:47:32 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-07 20:51:50
167.86.77.87 attackbotsspam
Automatic report - Banned IP Access
2019-10-07 21:07:30
182.171.245.130 attack
Oct  7 12:38:28 thevastnessof sshd[16344]: Failed password for root from 182.171.245.130 port 63161 ssh2
...
2019-10-07 20:58:56
118.27.39.224 attackbotsspam
Oct  7 11:02:07 euve59663 sshd[13415]: Failed password for r.r from 11=
8.27.39.224 port 33838 ssh2
Oct  7 11:02:07 euve59663 sshd[13415]: Received disconnect from 118.27.=
39.224: 11: Bye Bye [preauth]
Oct  7 11:21:26 euve59663 sshd[13614]: Failed password for r.r from 11=
8.27.39.224 port 41568 ssh2
Oct  7 11:21:26 euve59663 sshd[13614]: Received disconnect from 118.27.=
39.224: 11: Bye Bye [preauth]
Oct  7 11:25:55 euve59663 sshd[13643]: Failed password for r.r from 11=
8.27.39.224 port 56110 ssh2
Oct  7 11:25:55 euve59663 sshd[13643]: Received disconnect from 118.27.=
39.224: 11: Bye Bye [preauth]
Oct  7 11:30:36 euve59663 sshd[5333]: Failed password for r.r from 118=
.27.39.224 port 42416 ssh2
Oct  7 11:30:36 euve59663 sshd[5333]: Received disconnect from 118.27.3=
9.224: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=118.27.39.224
2019-10-07 21:17:45
42.85.7.210 attackspambots
Unauthorised access (Oct  7) SRC=42.85.7.210 LEN=40 TTL=49 ID=31434 TCP DPT=8080 WINDOW=47621 SYN
2019-10-07 21:02:38
114.235.209.138 attack
Unauthorised access (Oct  7) SRC=114.235.209.138 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=2116 TCP DPT=8080 WINDOW=58383 SYN 
Unauthorised access (Oct  6) SRC=114.235.209.138 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=61651 TCP DPT=8080 WINDOW=38853 SYN 
Unauthorised access (Oct  6) SRC=114.235.209.138 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=32135 TCP DPT=8080 WINDOW=47254 SYN 
Unauthorised access (Oct  6) SRC=114.235.209.138 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=61246 TCP DPT=8080 WINDOW=29244 SYN
2019-10-07 20:56:35
201.235.19.122 attackspambots
Oct  7 02:29:08 auw2 sshd\[30442\]: Invalid user Game123 from 201.235.19.122
Oct  7 02:29:08 auw2 sshd\[30442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122-19-235-201.fibertel.com.ar
Oct  7 02:29:10 auw2 sshd\[30442\]: Failed password for invalid user Game123 from 201.235.19.122 port 43277 ssh2
Oct  7 02:34:33 auw2 sshd\[30879\]: Invalid user Kitty@2017 from 201.235.19.122
Oct  7 02:34:33 auw2 sshd\[30879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122-19-235-201.fibertel.com.ar
2019-10-07 20:43:30
47.74.244.144 attackspambots
Connection by 47.74.244.144 on port: 5900 got caught by honeypot at 10/7/2019 6:13:35 AM
2019-10-07 21:16:51
78.129.240.214 attack
Automated report (2019-10-07T11:47:29+00:00). Probe detected.
2019-10-07 20:55:08

最近上报的IP列表

106.125.246.35 106.125.246.48 106.125.246.26 106.125.246.52
106.125.246.5 106.125.246.68 106.125.246.71 106.125.246.98
106.125.247.110 106.125.246.82 106.125.246.47 106.125.247.112
106.125.247.121 106.125.247.114 106.125.247.149 247.163.30.66
106.125.247.123 106.125.247.151 106.125.247.180 106.125.247.165