必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
119.42.104.67 attack
Failed RDP login
2019-11-30 00:43:59
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.42.104.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1816
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.42.104.197.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030900 1800 900 604800 86400

;; Query time: 181 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 14:17:51 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 197.104.42.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 197.104.42.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
177.44.17.173 attack
Jun  8 05:34:22 mail.srvfarm.net postfix/smtpd[673236]: warning: unknown[177.44.17.173]: SASL PLAIN authentication failed: 
Jun  8 05:34:23 mail.srvfarm.net postfix/smtpd[673236]: lost connection after AUTH from unknown[177.44.17.173]
Jun  8 05:39:37 mail.srvfarm.net postfix/smtps/smtpd[674232]: warning: unknown[177.44.17.173]: SASL PLAIN authentication failed: 
Jun  8 05:39:37 mail.srvfarm.net postfix/smtps/smtpd[674232]: lost connection after AUTH from unknown[177.44.17.173]
Jun  8 05:43:44 mail.srvfarm.net postfix/smtpd[671308]: warning: unknown[177.44.17.173]: SASL PLAIN authentication failed:
2020-06-08 18:26:33
200.54.172.147 attackspam
Jun  8 05:12:37 web01.agentur-b-2.de postfix/smtpd[1315320]: NOQUEUE: reject: RCPT from 200-54-172-147.static.tie.cl[200.54.172.147]: 554 5.7.1 Service unavailable; Client host [200.54.172.147] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/200.54.172.147; from= to= proto=ESMTP helo=<124u.com>
Jun  8 05:12:39 web01.agentur-b-2.de postfix/smtpd[1315320]: NOQUEUE: reject: RCPT from 200-54-172-147.static.tie.cl[200.54.172.147]: 554 5.7.1 Service unavailable; Client host [200.54.172.147] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/200.54.172.147; from= to= proto=ESMTP helo=<124u.com>
Jun  8 05:12:41 web01.agentur-b-2.de postfix/smtpd[1315320]: NOQUEUE: reject: RCPT from 200-54-172-147.static.tie.cl[200.54.172.147]: 554 5.7.1 Service unavailable; Client host [200.54.172.147] blocked using zen.spamhaus.org; htt
2020-06-08 18:33:56
91.189.217.220 attackspambots
Jun  8 05:32:26 mail.srvfarm.net postfix/smtpd[669637]: warning: ip-91.189.217.220.skyware.pl[91.189.217.220]: SASL PLAIN authentication failed: 
Jun  8 05:32:26 mail.srvfarm.net postfix/smtpd[669637]: lost connection after AUTH from ip-91.189.217.220.skyware.pl[91.189.217.220]
Jun  8 05:32:55 mail.srvfarm.net postfix/smtpd[669637]: warning: ip-91.189.217.220.skyware.pl[91.189.217.220]: SASL PLAIN authentication failed: 
Jun  8 05:32:55 mail.srvfarm.net postfix/smtpd[669637]: lost connection after AUTH from ip-91.189.217.220.skyware.pl[91.189.217.220]
Jun  8 05:40:15 mail.srvfarm.net postfix/smtps/smtpd[674191]: warning: ip-91.189.217.220.skyware.pl[91.189.217.220]: SASL PLAIN authentication failed:
2020-06-08 18:29:10
138.68.24.88 attackspam
Jun  8 12:44:00 PorscheCustomer sshd[19582]: Failed password for root from 138.68.24.88 port 46674 ssh2
Jun  8 12:46:03 PorscheCustomer sshd[19618]: Failed password for root from 138.68.24.88 port 52520 ssh2
...
2020-06-08 18:59:51
88.199.41.50 attack
Unauthorized SMTP/IMAP/POP3 connection attempt
2020-06-08 18:30:01
186.216.71.107 attack
Jun  8 05:30:53 mail.srvfarm.net postfix/smtpd[673035]: warning: unknown[186.216.71.107]: SASL PLAIN authentication failed: 
Jun  8 05:30:53 mail.srvfarm.net postfix/smtpd[673035]: lost connection after AUTH from unknown[186.216.71.107]
Jun  8 05:39:04 mail.srvfarm.net postfix/smtps/smtpd[671665]: lost connection after CONNECT from unknown[186.216.71.107]
Jun  8 05:39:57 mail.srvfarm.net postfix/smtpd[673035]: warning: unknown[186.216.71.107]: SASL PLAIN authentication failed: 
Jun  8 05:39:58 mail.srvfarm.net postfix/smtpd[673035]: lost connection after AUTH from unknown[186.216.71.107]
2020-06-08 18:24:27
49.235.156.47 attack
DATE:2020-06-08 07:49:53, IP:49.235.156.47, PORT:ssh SSH brute force auth (docker-dc)
2020-06-08 18:58:36
94.177.229.123 attack
Jun  8 12:34:14 relay postfix/smtpd\[28882\]: warning: unknown\[94.177.229.123\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  8 12:34:32 relay postfix/smtpd\[28882\]: warning: unknown\[94.177.229.123\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  8 12:34:50 relay postfix/smtpd\[2217\]: warning: unknown\[94.177.229.123\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  8 12:35:08 relay postfix/smtpd\[2217\]: warning: unknown\[94.177.229.123\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  8 12:35:26 relay postfix/smtpd\[2214\]: warning: unknown\[94.177.229.123\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-08 18:46:11
2a01:7a7:2:27d4:225:90ff:fe51:e396 attackspambots
2020/06/08 05:23:34 [error] 2029#2029: *44247 open() "/usr/share/nginx/html/wp-login.php" failed (2: No such file or directory), client: 2a01:7a7:2:27d4:225:90ff:fe51:e396, server: _, request: "GET /wp-login.php HTTP/1.1", host: "richtsfeld-gruppe.de"
2020/06/08 05:23:34 [error] 2029#2029: *44248 open() "/usr/share/nginx/html/wp-login.php" failed (2: No such file or directory), client: 2a01:7a7:2:27d4:225:90ff:fe51:e396, server: _, request: "GET /wp-login.php HTTP/1.1", host: "richtsfeld.biz"
2020-06-08 18:32:02
200.3.16.245 attackbotsspam
$f2bV_matches
2020-06-08 18:34:08
189.126.187.147 attackspambots
Jun  8 05:12:23 mail.srvfarm.net postfix/smtpd[652511]: warning: unknown[189.126.187.147]: SASL PLAIN authentication failed: 
Jun  8 05:12:24 mail.srvfarm.net postfix/smtpd[652511]: lost connection after AUTH from unknown[189.126.187.147]
Jun  8 05:13:16 mail.srvfarm.net postfix/smtpd[653267]: warning: unknown[189.126.187.147]: SASL PLAIN authentication failed: 
Jun  8 05:13:17 mail.srvfarm.net postfix/smtpd[653267]: lost connection after AUTH from unknown[189.126.187.147]
Jun  8 05:19:25 mail.srvfarm.net postfix/smtpd[669637]: warning: unknown[189.126.187.147]: SASL PLAIN authentication failed:
2020-06-08 18:35:38
185.83.146.218 spamattack
test serar
2020-06-08 18:38:46
185.180.130.15 attack
Jun  8 05:34:48 mail.srvfarm.net postfix/smtpd[673035]: warning: unknown[185.180.130.15]: SASL PLAIN authentication failed: 
Jun  8 05:34:48 mail.srvfarm.net postfix/smtpd[673035]: lost connection after AUTH from unknown[185.180.130.15]
Jun  8 05:37:09 mail.srvfarm.net postfix/smtps/smtpd[671713]: warning: unknown[185.180.130.15]: SASL PLAIN authentication failed: 
Jun  8 05:37:09 mail.srvfarm.net postfix/smtps/smtpd[671713]: lost connection after AUTH from unknown[185.180.130.15]
Jun  8 05:42:56 mail.srvfarm.net postfix/smtpd[671307]: warning: unknown[185.180.130.15]: SASL PLAIN authentication failed:
2020-06-08 18:25:12
94.219.146.20 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-06-08 18:20:24
170.0.48.177 attack
Jun  8 05:16:23 mail.srvfarm.net postfix/smtpd[669639]: warning: unknown[170.0.48.177]: SASL PLAIN authentication failed: 
Jun  8 05:16:23 mail.srvfarm.net postfix/smtpd[669639]: lost connection after AUTH from unknown[170.0.48.177]
Jun  8 05:17:09 mail.srvfarm.net postfix/smtpd[671308]: warning: unknown[170.0.48.177]: SASL PLAIN authentication failed: 
Jun  8 05:17:09 mail.srvfarm.net postfix/smtpd[671308]: lost connection after AUTH from unknown[170.0.48.177]
Jun  8 05:25:47 mail.srvfarm.net postfix/smtps/smtpd[671676]: warning: unknown[170.0.48.177]: SASL PLAIN authentication failed:
2020-06-08 18:41:50

最近上报的IP列表

119.42.104.188 119.42.104.201 119.42.104.212 119.42.104.217
117.47.27.143 119.42.104.230 119.42.104.234 119.42.104.241
119.42.104.245 119.42.104.29 119.42.104.48 119.42.104.6
119.42.104.8 119.42.104.80 119.42.105.128 119.42.105.135
119.42.105.149 119.42.105.153 119.42.105.165 119.42.105.166