必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.42.205.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40390
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.42.205.64.			IN	A

;; AUTHORITY SECTION:
.			108	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 16:30:15 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 64.205.42.117.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 64.205.42.117.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
95.71.125.50 attack
proto=tcp  .  spt=37069  .  dpt=25  .     (listed on Dark List de Sep 15)     (23)
2019-09-16 13:29:55
86.183.148.162 attack
Sep 14 04:10:09 web1 sshd[16507]: Invalid user informix from 86.183.148.162
Sep 14 04:10:11 web1 sshd[16507]: Failed password for invalid user informix from 86.183.148.162 port 37826 ssh2
Sep 14 04:10:11 web1 sshd[16507]: Received disconnect from 86.183.148.162: 11: Bye Bye [preauth]
Sep 14 04:38:39 web1 sshd[9921]: Invalid user boss from 86.183.148.162
Sep 14 04:38:42 web1 sshd[9921]: Failed password for invalid user boss from 86.183.148.162 port 43404 ssh2
Sep 14 04:38:42 web1 sshd[9921]: Received disconnect from 86.183.148.162: 11: Bye Bye [preauth]
Sep 14 04:43:35 web1 sshd[10312]: Failed password for r.r from 86.183.148.162 port 54354 ssh2
Sep 14 04:43:38 web1 sshd[10312]: Received disconnect from 86.183.148.162: 11: Bye Bye [preauth]
Sep 14 04:48:23 web1 sshd[10678]: Invalid user gh from 86.183.148.162
Sep 14 04:48:25 web1 sshd[10678]: Failed password for invalid user gh from 86.183.148.162 port 37004 ssh2
Sep 14 04:48:28 web1 sshd[10678]: Received disconnect from........
-------------------------------
2019-09-16 13:46:34
89.248.160.193 attackbots
09/16/2019-01:14:20.941055 89.248.160.193 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-16 13:24:41
150.95.187.89 attackspam
fail2ban
2019-09-16 12:50:42
192.99.32.86 attackspambots
Sep 15 17:05:11 lcprod sshd\[4195\]: Invalid user charcoal from 192.99.32.86
Sep 15 17:05:11 lcprod sshd\[4195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns517943.ip-192-99-32.net
Sep 15 17:05:14 lcprod sshd\[4195\]: Failed password for invalid user charcoal from 192.99.32.86 port 59438 ssh2
Sep 15 17:08:54 lcprod sshd\[4518\]: Invalid user puja from 192.99.32.86
Sep 15 17:08:54 lcprod sshd\[4518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns517943.ip-192-99-32.net
2019-09-16 13:09:48
103.205.133.77 attackbots
Sep 15 17:42:46 lcprod sshd\[7715\]: Invalid user vnc from 103.205.133.77
Sep 15 17:42:46 lcprod sshd\[7715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.205.133.77
Sep 15 17:42:48 lcprod sshd\[7715\]: Failed password for invalid user vnc from 103.205.133.77 port 44264 ssh2
Sep 15 17:47:41 lcprod sshd\[8133\]: Invalid user ia from 103.205.133.77
Sep 15 17:47:41 lcprod sshd\[8133\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.205.133.77
2019-09-16 13:23:28
162.144.93.159 attackbots
Invalid user admin from 162.144.93.159 port 40102
2019-09-16 13:13:08
178.128.54.223 attack
Sep 16 06:49:56 vps647732 sshd[8984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.54.223
Sep 16 06:49:57 vps647732 sshd[8984]: Failed password for invalid user testftp from 178.128.54.223 port 56042 ssh2
...
2019-09-16 12:53:32
220.130.178.36 attackbotsspam
Sep 16 02:18:22 Ubuntu-1404-trusty-64-minimal sshd\[12464\]: Invalid user 111111 from 220.130.178.36
Sep 16 02:18:22 Ubuntu-1404-trusty-64-minimal sshd\[12464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.178.36
Sep 16 02:18:24 Ubuntu-1404-trusty-64-minimal sshd\[12464\]: Failed password for invalid user 111111 from 220.130.178.36 port 44658 ssh2
Sep 16 02:27:32 Ubuntu-1404-trusty-64-minimal sshd\[19611\]: Invalid user HoloBot from 220.130.178.36
Sep 16 02:27:32 Ubuntu-1404-trusty-64-minimal sshd\[19611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.178.36
2019-09-16 13:54:49
141.255.79.230 attackspambots
Telnet Server BruteForce Attack
2019-09-16 13:16:50
112.217.225.61 attackspam
Sep 15 20:05:05 ws12vmsma01 sshd[56619]: Invalid user admin from 112.217.225.61
Sep 15 20:05:08 ws12vmsma01 sshd[56619]: Failed password for invalid user admin from 112.217.225.61 port 49254 ssh2
Sep 15 20:13:34 ws12vmsma01 sshd[57868]: Invalid user admin from 112.217.225.61
...
2019-09-16 13:53:42
188.11.66.9 attackspambots
Automatic report - Port Scan Attack
2019-09-16 13:40:04
145.239.87.109 attackspam
Sep 15 18:32:58 php1 sshd\[1787\]: Invalid user server from 145.239.87.109
Sep 15 18:32:58 php1 sshd\[1787\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.87.109
Sep 15 18:33:01 php1 sshd\[1787\]: Failed password for invalid user server from 145.239.87.109 port 46848 ssh2
Sep 15 18:37:31 php1 sshd\[2186\]: Invalid user ux from 145.239.87.109
Sep 15 18:37:31 php1 sshd\[2186\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.87.109
2019-09-16 12:51:51
211.150.122.20 attackbotsspam
CN - 1H : (343)  Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN9803 
 
 IP : 211.150.122.20 
 
 CIDR : 211.150.122.0/24 
 
 PREFIX COUNT : 36 
 
 UNIQUE IP COUNT : 57856 
 
 
 WYKRYTE ATAKI Z ASN9803 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery 
  https://help-dysk.pl
2019-09-16 13:16:17
41.202.66.3 attack
Sep 14 05:35:14 durga sshd[324304]: reveeclipse mapping checking getaddrinfo for ochostname-41.202.66.3.orange-chostname.ci [41.202.66.3] failed - POSSIBLE BREAK-IN ATTEMPT!
Sep 14 05:35:14 durga sshd[324304]: Invalid user sradido from 41.202.66.3
Sep 14 05:35:14 durga sshd[324304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.202.66.3 
Sep 14 05:35:16 durga sshd[324304]: Failed password for invalid user sradido from 41.202.66.3 port 12776 ssh2
Sep 14 05:35:16 durga sshd[324304]: Received disconnect from 41.202.66.3: 11: Bye Bye [preauth]
Sep 14 05:46:31 durga sshd[327278]: reveeclipse mapping checking getaddrinfo for ochostname-41.202.66.3.orange-chostname.ci [41.202.66.3] failed - POSSIBLE BREAK-IN ATTEMPT!
Sep 14 05:46:31 durga sshd[327278]: Invalid user ud from 41.202.66.3
Sep 14 05:46:31 durga sshd[327278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.202.66.3 
Sep 14 05:46:........
-------------------------------
2019-09-16 13:39:07

最近上报的IP列表

117.40.114.98 117.44.160.172 117.44.160.4 210.156.155.71
117.44.163.9 117.44.113.17 117.44.162.193 117.44.167.115
117.44.163.170 117.44.160.147 117.44.165.117 117.44.172.227
117.45.165.155 117.44.190.10 117.45.200.170 117.45.200.2
117.45.146.205 117.44.171.95 117.44.50.46 117.5.109.151