必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.42.80.96
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37928
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;107.42.80.96.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 07:42:19 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 96.80.42.107.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 96.80.42.107.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
143.0.177.230 attackspambots
Invalid user lw from 143.0.177.230 port 60554
2019-07-11 21:38:07
41.233.76.183 attackbotsspam
Caught in portsentry honeypot
2019-07-11 21:57:34
14.239.188.198 attackbotsspam
Jul 11 10:25:54 venus sshd[17112]: User admin from 14.239.188.198 not allowed because not listed in AllowUsers
Jul 11 10:25:54 venus sshd[17112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.239.188.198  user=admin
Jul 11 10:25:56 venus sshd[17112]: Failed password for invalid user admin from 14.239.188.198 port 33174 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.239.188.198
2019-07-11 21:26:20
45.175.97.149 attack
8080/tcp
[2019-07-11]1pkt
2019-07-11 21:11:11
185.10.68.147 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-11 21:40:31
128.199.211.118 attack
php WP PHPmyadamin ABUSE blocked for 12h
2019-07-11 21:32:15
31.170.58.50 attackbotsspam
SMTP-sasl brute force
...
2019-07-11 21:38:59
165.22.60.159 attackbotsspam
Port scan attempt detected by AWS-CCS, CTS, India
2019-07-11 21:21:49
185.176.26.14 attack
11.07.2019 11:41:23 Connection to port 4000 blocked by firewall
2019-07-11 20:58:07
139.59.75.241 attackbotsspam
Jul 11 10:20:44 XXXXXX sshd[65182]: Invalid user bugzilla from 139.59.75.241 port 44088
2019-07-11 21:36:20
1.65.216.88 attack
23/tcp
[2019-07-11]1pkt
2019-07-11 21:17:47
46.34.180.190 attackspam
Jul 10 23:39:44 web1 postfix/smtpd[17746]: warning: unknown[46.34.180.190]: SASL PLAIN authentication failed: authentication failure
...
2019-07-11 21:35:42
182.139.134.107 attackbots
Unauthorized connection attempt from IP address 182.139.134.107 on Port 445(SMB)
2019-07-11 21:31:48
183.154.170.16 attack
FTP/21 MH Probe, BF, Hack -
2019-07-11 21:08:24
31.27.128.108 attackbotsspam
port scan and connect, tcp 81 (hosts2-ns)
2019-07-11 21:33:32

最近上报的IP列表

95.155.48.251 196.124.196.167 175.208.197.37 234.50.230.117
66.221.89.48 106.219.200.237 66.209.218.107 9.226.210.166
224.118.133.61 143.246.148.252 234.165.223.217 41.240.154.68
59.99.139.108 99.223.207.64 70.108.244.191 33.12.42.208
186.209.136.195 156.221.158.226 26.50.3.247 95.150.137.223