必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Liège

省份(region): Wallonia

国家(country): Belgium

运营商(isp): Proximus

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.137.93.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39327
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.137.93.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 08:11:52 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 42.93.137.109.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.93.137.109.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.231.110.35 attack
10:22:57.956 1 ACCOUNT(james) login(SMTP) from [114.231.110.35] failed. Error Code=incorrect password
10:23:17.962 1 ACCOUNT(james) login(SMTP) from [114.231.110.35] failed. Error Code=incorrect password
...
2020-08-09 19:36:27
74.82.47.35 attackspambots
srv02 Mass scanning activity detected Target: 53413  ..
2020-08-09 19:54:05
183.16.100.180 attackbots
Port probing on unauthorized port 4899
2020-08-09 19:43:19
122.51.200.252 attackbotsspam
Aug  6 18:27:58 ovpn sshd[11652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.200.252  user=r.r
Aug  6 18:28:00 ovpn sshd[11652]: Failed password for r.r from 122.51.200.252 port 34538 ssh2
Aug  6 18:28:00 ovpn sshd[11652]: Received disconnect from 122.51.200.252 port 34538:11: Bye Bye [preauth]
Aug  6 18:28:00 ovpn sshd[11652]: Disconnected from 122.51.200.252 port 34538 [preauth]
Aug  6 18:38:08 ovpn sshd[19135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.200.252  user=r.r
Aug  6 18:38:10 ovpn sshd[19135]: Failed password for r.r from 122.51.200.252 port 55870 ssh2
Aug  6 18:38:11 ovpn sshd[19135]: Received disconnect from 122.51.200.252 port 55870:11: Bye Bye [preauth]
Aug  6 18:38:11 ovpn sshd[19135]: Disconnected from 122.51.200.252 port 55870 [preauth]
Aug  6 18:41:19 ovpn sshd[21716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruse........
------------------------------
2020-08-09 19:35:50
129.226.170.181 attack
(sshd) Failed SSH login from 129.226.170.181 (SG/Singapore/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug  9 08:02:27 elude sshd[5091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.170.181  user=root
Aug  9 08:02:29 elude sshd[5091]: Failed password for root from 129.226.170.181 port 52224 ssh2
Aug  9 08:18:05 elude sshd[7432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.170.181  user=root
Aug  9 08:18:06 elude sshd[7432]: Failed password for root from 129.226.170.181 port 46934 ssh2
Aug  9 08:34:10 elude sshd[9752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.170.181  user=root
2020-08-09 20:09:10
49.234.28.148 attackbots
$f2bV_matches
2020-08-09 19:44:40
59.46.189.242 attackbots
Unauthorized connection attempt from IP address 59.46.189.242 on Port 445(SMB)
2020-08-09 20:03:31
195.154.53.237 attack
[2020-08-09 07:33:43] NOTICE[1248][C-00005119] chan_sip.c: Call from '' (195.154.53.237:55617) to extension '011972595725668' rejected because extension not found in context 'public'.
[2020-08-09 07:33:43] SECURITY[1275] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-09T07:33:43.373-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011972595725668",SessionID="0x7f27203c7888",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/195.154.53.237/55617",ACLName="no_extension_match"
[2020-08-09 07:35:52] NOTICE[1248][C-0000511c] chan_sip.c: Call from '' (195.154.53.237:63524) to extension '011972595725668' rejected because extension not found in context 'public'.
[2020-08-09 07:35:52] SECURITY[1275] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-09T07:35:52.880-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011972595725668",SessionID="0x7f2720302028",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/U
...
2020-08-09 20:00:35
218.85.119.92 attackspambots
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-08-09 19:57:44
120.92.109.67 attackspambots
2020-08-09T02:31:56.043582linuxbox-skyline sshd[30757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.109.67  user=root
2020-08-09T02:31:58.683613linuxbox-skyline sshd[30757]: Failed password for root from 120.92.109.67 port 14644 ssh2
...
2020-08-09 19:57:10
106.12.185.18 attack
Aug  9 11:48:45 icinga sshd[45147]: Failed password for root from 106.12.185.18 port 41706 ssh2
Aug  9 11:54:04 icinga sshd[53528]: Failed password for root from 106.12.185.18 port 58096 ssh2
...
2020-08-09 19:33:11
78.128.113.116 attack
2020-08-09 13:38:33 dovecot_login authenticator failed for \(ip-113-116.4vendeta.com.\) \[78.128.113.116\]: 535 Incorrect authentication data \(set_id=ben@benjaminhauck.com\)
2020-08-09 13:38:39 dovecot_login authenticator failed for \(ip-113-116.4vendeta.com.\) \[78.128.113.116\]: 535 Incorrect authentication data
2020-08-09 13:38:48 dovecot_login authenticator failed for \(ip-113-116.4vendeta.com.\) \[78.128.113.116\]: 535 Incorrect authentication data
2020-08-09 13:38:53 dovecot_login authenticator failed for \(ip-113-116.4vendeta.com.\) \[78.128.113.116\]: 535 Incorrect authentication data
2020-08-09 13:42:21 dovecot_login authenticator failed for \(ip-113-116.4vendeta.com.\) \[78.128.113.116\]: 535 Incorrect authentication data \(set_id=adminadmin@no-server.de\)
...
2020-08-09 19:47:33
103.217.219.1 attackspambots
Attempted connection to port 445.
2020-08-09 19:48:11
36.92.152.74 attackbots
Unauthorized connection attempt from IP address 36.92.152.74 on Port 445(SMB)
2020-08-09 20:08:16
122.227.25.26 attackspam
Unauthorized connection attempt from IP address 122.227.25.26 on Port 445(SMB)
2020-08-09 20:02:42

最近上报的IP列表

3.63.23.221 168.187.247.98 38.217.143.104 132.23.233.38
157.45.228.238 68.253.199.41 114.245.7.77 65.220.109.244
222.249.101.142 223.235.61.248 14.182.34.89 202.107.179.234
248.125.142.183 25.185.1.207 153.193.243.213 16.144.186.241
101.125.241.129 227.157.57.116 229.73.225.120 29.43.156.130