必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.94.255.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48165
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.94.255.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 11:19:08 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 42.255.94.117.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.255.94.117.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.98.51.222 attack
...
2019-08-29 07:56:17
140.143.57.159 attackspambots
Aug 28 20:27:53 bouncer sshd\[20946\]: Invalid user fr from 140.143.57.159 port 59260
Aug 28 20:27:53 bouncer sshd\[20946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.57.159 
Aug 28 20:27:55 bouncer sshd\[20946\]: Failed password for invalid user fr from 140.143.57.159 port 59260 ssh2
...
2019-08-29 07:28:03
193.171.202.150 attackspam
Aug 28 16:09:58 rotator sshd\[21592\]: Failed password for root from 193.171.202.150 port 38251 ssh2Aug 28 16:10:01 rotator sshd\[21592\]: Failed password for root from 193.171.202.150 port 38251 ssh2Aug 28 16:10:03 rotator sshd\[21592\]: Failed password for root from 193.171.202.150 port 38251 ssh2Aug 28 16:10:06 rotator sshd\[21592\]: Failed password for root from 193.171.202.150 port 38251 ssh2Aug 28 16:10:08 rotator sshd\[21592\]: Failed password for root from 193.171.202.150 port 38251 ssh2Aug 28 16:10:10 rotator sshd\[21592\]: Failed password for root from 193.171.202.150 port 38251 ssh2
...
2019-08-29 07:35:47
8.209.67.241 attackbots
" "
2019-08-29 08:03:33
218.92.1.142 attack
Aug 28 19:11:28 TORMINT sshd\[14325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.1.142  user=root
Aug 28 19:11:30 TORMINT sshd\[14325\]: Failed password for root from 218.92.1.142 port 55226 ssh2
Aug 28 19:19:11 TORMINT sshd\[14918\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.1.142  user=root
...
2019-08-29 07:31:21
139.162.115.221 attackspam
firewall-block, port(s): 9000/tcp
2019-08-29 07:23:11
123.142.192.18 attackbots
Aug 28 13:35:50 wbs sshd\[4896\]: Invalid user clark from 123.142.192.18
Aug 28 13:35:50 wbs sshd\[4896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.142.192.18
Aug 28 13:35:52 wbs sshd\[4896\]: Failed password for invalid user clark from 123.142.192.18 port 38382 ssh2
Aug 28 13:40:54 wbs sshd\[5413\]: Invalid user applmgr from 123.142.192.18
Aug 28 13:40:54 wbs sshd\[5413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.142.192.18
2019-08-29 07:50:05
139.59.80.65 attackspambots
(sshd) Failed SSH login from 139.59.80.65 (-): 5 in the last 3600 secs
2019-08-29 07:41:39
36.230.90.84 attackbotsspam
23/tcp
[2019-08-28]1pkt
2019-08-29 07:45:21
132.232.18.128 attackspam
Aug 28 19:19:37 xtremcommunity sshd\[7731\]: Invalid user usbmuxd from 132.232.18.128 port 34874
Aug 28 19:19:37 xtremcommunity sshd\[7731\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.18.128
Aug 28 19:19:38 xtremcommunity sshd\[7731\]: Failed password for invalid user usbmuxd from 132.232.18.128 port 34874 ssh2
Aug 28 19:24:35 xtremcommunity sshd\[7913\]: Invalid user dylan from 132.232.18.128 port 51692
Aug 28 19:24:35 xtremcommunity sshd\[7913\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.18.128
...
2019-08-29 07:29:50
96.57.28.210 attackspam
2019-08-28T16:55:25.852436mizuno.rwx.ovh sshd[5489]: Connection from 96.57.28.210 port 43812 on 78.46.61.178 port 22
2019-08-28T16:55:26.534032mizuno.rwx.ovh sshd[5489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.57.28.210  user=root
2019-08-28T16:55:28.126107mizuno.rwx.ovh sshd[5489]: Failed password for root from 96.57.28.210 port 43812 ssh2
2019-08-28T17:02:20.135056mizuno.rwx.ovh sshd[6624]: Connection from 96.57.28.210 port 58142 on 78.46.61.178 port 22
2019-08-28T17:02:20.778989mizuno.rwx.ovh sshd[6624]: Invalid user tester from 96.57.28.210 port 58142
...
2019-08-29 07:55:31
141.98.9.205 attackbots
Aug 29 01:52:46 relay postfix/smtpd\[7649\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 29 01:53:01 relay postfix/smtpd\[3470\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 29 01:53:49 relay postfix/smtpd\[32400\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 29 01:54:05 relay postfix/smtpd\[3471\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 29 01:54:52 relay postfix/smtpd\[3595\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-08-29 08:01:21
103.21.148.51 attackbotsspam
Aug 28 19:19:57 bouncer sshd\[20730\]: Invalid user hxhtftp from 103.21.148.51 port 58518
Aug 28 19:19:57 bouncer sshd\[20730\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.21.148.51 
Aug 28 19:19:59 bouncer sshd\[20730\]: Failed password for invalid user hxhtftp from 103.21.148.51 port 58518 ssh2
...
2019-08-29 07:26:22
91.203.224.5 attack
[portscan] Port scan
2019-08-29 07:56:51
106.13.149.88 attackbotsspam
"Fail2Ban detected SSH brute force attempt"
2019-08-29 07:37:10

最近上报的IP列表

230.112.141.219 43.81.100.218 82.219.139.163 167.206.170.173
190.87.13.120 103.187.47.222 215.212.237.133 234.226.100.91
2.201.33.209 58.4.254.90 75.197.254.90 98.222.133.148
147.55.222.52 18.77.184.202 87.43.78.233 199.107.149.91
208.193.168.42 97.22.198.40 101.39.91.122 55.113.155.36