必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.42.38.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24618
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.42.38.132.			IN	A

;; AUTHORITY SECTION:
.			57	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 21:19:32 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 132.38.42.117.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 132.38.42.117.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
117.158.200.49 attackspam
Invalid user butter from 117.158.200.49 port 43548
2019-12-13 08:49:29
179.56.172.164 attackbotsspam
Unauthorized connection attempt from IP address 179.56.172.164 on Port 445(SMB)
2019-12-13 09:06:43
104.248.37.88 attackbots
Dec 12 14:27:09 php1 sshd\[30307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.37.88  user=bin
Dec 12 14:27:11 php1 sshd\[30307\]: Failed password for bin from 104.248.37.88 port 59112 ssh2
Dec 12 14:31:53 php1 sshd\[30717\]: Invalid user webadmin from 104.248.37.88
Dec 12 14:31:53 php1 sshd\[30717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.37.88
Dec 12 14:31:56 php1 sshd\[30717\]: Failed password for invalid user webadmin from 104.248.37.88 port 32880 ssh2
2019-12-13 08:46:41
49.88.112.62 attackspambots
Dec 12 14:17:29 php1 sshd\[29381\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.62  user=root
Dec 12 14:17:30 php1 sshd\[29381\]: Failed password for root from 49.88.112.62 port 51335 ssh2
Dec 12 14:17:45 php1 sshd\[29397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.62  user=root
Dec 12 14:17:47 php1 sshd\[29397\]: Failed password for root from 49.88.112.62 port 19360 ssh2
Dec 12 14:17:50 php1 sshd\[29397\]: Failed password for root from 49.88.112.62 port 19360 ssh2
2019-12-13 08:43:31
191.55.50.194 attackbots
Unauthorized connection attempt from IP address 191.55.50.194 on Port 445(SMB)
2019-12-13 09:05:44
106.12.42.110 attack
Dec 13 00:37:18 zeus sshd[24277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.42.110 
Dec 13 00:37:20 zeus sshd[24277]: Failed password for invalid user server from 106.12.42.110 port 47822 ssh2
Dec 13 00:43:09 zeus sshd[24526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.42.110 
Dec 13 00:43:11 zeus sshd[24526]: Failed password for invalid user david from 106.12.42.110 port 43098 ssh2
2019-12-13 08:58:04
150.95.217.109 attack
SSH-BruteForce
2019-12-13 09:03:01
115.124.64.126 attackbots
Dec 12 23:45:56 ArkNodeAT sshd\[4134\]: Invalid user gilbreth from 115.124.64.126
Dec 12 23:45:56 ArkNodeAT sshd\[4134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.124.64.126
Dec 12 23:45:59 ArkNodeAT sshd\[4134\]: Failed password for invalid user gilbreth from 115.124.64.126 port 40404 ssh2
2019-12-13 09:06:11
101.255.81.91 attackbotsspam
Invalid user colden from 101.255.81.91 port 38978
2019-12-13 09:12:44
202.77.122.67 attackspambots
Unauthorized connection attempt from IP address 202.77.122.67 on Port 445(SMB)
2019-12-13 09:13:14
138.68.99.46 attackbotsspam
Dec 12 14:31:26 php1 sshd\[30689\]: Invalid user ftp_user from 138.68.99.46
Dec 12 14:31:26 php1 sshd\[30689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.99.46
Dec 12 14:31:28 php1 sshd\[30689\]: Failed password for invalid user ftp_user from 138.68.99.46 port 50902 ssh2
Dec 12 14:38:18 php1 sshd\[31332\]: Invalid user user1 from 138.68.99.46
Dec 12 14:38:18 php1 sshd\[31332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.99.46
2019-12-13 08:55:37
159.203.122.149 attackspam
Dec 12 19:24:56 ny01 sshd[5758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.122.149
Dec 12 19:24:58 ny01 sshd[5758]: Failed password for invalid user rodlun from 159.203.122.149 port 51788 ssh2
Dec 12 19:30:08 ny01 sshd[6820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.122.149
2019-12-13 08:38:21
116.7.28.191 attackbotsspam
Unauthorized connection attempt from IP address 116.7.28.191 on Port 445(SMB)
2019-12-13 09:03:49
211.26.187.128 attackspam
Dec 13 01:26:08 wh01 sshd[17679]: Invalid user amrita from 211.26.187.128 port 60530
Dec 13 01:26:08 wh01 sshd[17679]: Failed password for invalid user amrita from 211.26.187.128 port 60530 ssh2
Dec 13 01:26:09 wh01 sshd[17679]: Received disconnect from 211.26.187.128 port 60530:11: Bye Bye [preauth]
Dec 13 01:26:09 wh01 sshd[17679]: Disconnected from 211.26.187.128 port 60530 [preauth]
Dec 13 01:29:42 wh01 sshd[17952]: Invalid user guest from 211.26.187.128 port 36636
Dec 13 01:29:42 wh01 sshd[17952]: Failed password for invalid user guest from 211.26.187.128 port 36636 ssh2
2019-12-13 08:54:25
125.236.200.160 attackspam
TCP Port Scanning
2019-12-13 08:37:19

最近上报的IP列表

117.42.38.1 117.42.38.141 117.42.38.152 117.42.38.160
117.42.38.166 117.42.38.162 117.42.38.234 117.42.38.18
117.42.38.222 117.42.38.194 117.42.38.238 117.42.38.249
117.42.38.225 117.42.38.46 117.42.38.29 114.224.55.36
117.42.38.70 117.42.38.80 117.42.38.84 117.42.38.74