必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 11.42.129.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2185
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;11.42.129.6.			IN	A

;; AUTHORITY SECTION:
.			453	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024010601 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 07 04:32:52 CST 2024
;; MSG SIZE  rcvd: 104
HOST信息:
Host 6.129.42.11.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 6.129.42.11.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
42.114.121.152 attack
kidness.family 42.114.121.152 [04/Jun/2020:05:58:59 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4265 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
kidness.family 42.114.121.152 [04/Jun/2020:05:59:03 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4265 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
2020-06-04 12:09:58
61.175.121.76 attackbots
(sshd) Failed SSH login from 61.175.121.76 (CN/China/76.121.175.61.dial.hu.zj.dynamic.163data.com.cn): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun  4 07:02:09 s1 sshd[23250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.175.121.76  user=root
Jun  4 07:02:11 s1 sshd[23250]: Failed password for root from 61.175.121.76 port 16670 ssh2
Jun  4 07:11:43 s1 sshd[23406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.175.121.76  user=root
Jun  4 07:11:45 s1 sshd[23406]: Failed password for root from 61.175.121.76 port 65150 ssh2
Jun  4 07:15:38 s1 sshd[23514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.175.121.76  user=root
2020-06-04 12:27:54
181.191.9.107 attack
2020-06-04 12:45:52
116.213.168.212 attack
2020-06-04T05:56:19.751274rocketchat.forhosting.nl sshd[14345]: Failed password for root from 116.213.168.212 port 46437 ssh2
2020-06-04T05:58:28.889468rocketchat.forhosting.nl sshd[14354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.213.168.212  user=root
2020-06-04T05:58:30.794908rocketchat.forhosting.nl sshd[14354]: Failed password for root from 116.213.168.212 port 59257 ssh2
...
2020-06-04 12:31:56
128.199.254.89 attackbots
$f2bV_matches
2020-06-04 12:46:45
101.91.160.243 attack
Jun  4 06:09:40 localhost sshd\[32557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.91.160.243  user=root
Jun  4 06:09:42 localhost sshd\[32557\]: Failed password for root from 101.91.160.243 port 42498 ssh2
Jun  4 06:12:24 localhost sshd\[32725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.91.160.243  user=root
Jun  4 06:12:26 localhost sshd\[32725\]: Failed password for root from 101.91.160.243 port 43132 ssh2
Jun  4 06:15:13 localhost sshd\[500\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.91.160.243  user=root
...
2020-06-04 12:24:47
104.248.117.234 attackspambots
Jun  3 22:08:26 server1 sshd\[28144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.117.234  user=root
Jun  3 22:08:27 server1 sshd\[28144\]: Failed password for root from 104.248.117.234 port 51940 ssh2
Jun  3 22:11:35 server1 sshd\[29124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.117.234  user=root
Jun  3 22:11:37 server1 sshd\[29124\]: Failed password for root from 104.248.117.234 port 55338 ssh2
Jun  3 22:14:54 server1 sshd\[29977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.117.234  user=root
...
2020-06-04 12:26:45
222.186.175.163 attack
Jun  4 05:59:05 vmi345603 sshd[32049]: Failed password for root from 222.186.175.163 port 61910 ssh2
Jun  4 05:59:09 vmi345603 sshd[32049]: Failed password for root from 222.186.175.163 port 61910 ssh2
...
2020-06-04 12:08:03
218.92.0.184 attackbots
Jun  4 06:13:23 prod4 sshd\[12384\]: Failed password for root from 218.92.0.184 port 18628 ssh2
Jun  4 06:13:26 prod4 sshd\[12384\]: Failed password for root from 218.92.0.184 port 18628 ssh2
Jun  4 06:13:30 prod4 sshd\[12384\]: Failed password for root from 218.92.0.184 port 18628 ssh2
...
2020-06-04 12:25:28
37.70.217.215 attackspambots
Jun  4 06:10:56 vps647732 sshd[26013]: Failed password for root from 37.70.217.215 port 46018 ssh2
...
2020-06-04 12:18:54
1.47.239.48 attackbots
kidness.family 1.47.239.48 [04/Jun/2020:05:58:21 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4265 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
kidness.family 1.47.239.48 [04/Jun/2020:05:58:25 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4265 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
2020-06-04 12:37:27
119.200.186.168 attackbotsspam
Jun  4 00:57:53 vps46666688 sshd[30763]: Failed password for root from 119.200.186.168 port 47882 ssh2
...
2020-06-04 12:22:00
23.80.97.32 attack
REQUESTED PAGE: /wp-json/contact-form-7/v1/contact-forms/4/feedback
2020-06-04 12:40:44
94.103.82.197 attackbotsspam
"XSS Filter - Category 2: Event Handler Vector - Matched Data: 102;ONBAO = found within ARGS:message[0"
2020-06-04 12:32:23
112.85.42.187 attackspam
Jun  4 09:35:59 dhoomketu sshd[476378]: Failed password for root from 112.85.42.187 port 57978 ssh2
Jun  4 09:37:52 dhoomketu sshd[476390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.187  user=root
Jun  4 09:37:54 dhoomketu sshd[476390]: Failed password for root from 112.85.42.187 port 53228 ssh2
Jun  4 09:39:45 dhoomketu sshd[476479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.187  user=root
Jun  4 09:39:47 dhoomketu sshd[476479]: Failed password for root from 112.85.42.187 port 37662 ssh2
...
2020-06-04 12:17:46

最近上报的IP列表

11.42.25.128 11.42.222.175 11.41.227.135 11.41.235.233
11.45.127.150 11.41.191.132 11.41.115.88 11.41.37.147
11.40.98.2 11.41.212.179 11.44.87.220 11.40.205.138
11.42.22.156 11.40.186.160 11.46.102.64 11.44.196.52
11.41.61.141 11.40.14.163 11.40.135.34 11.40.187.16