必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
119.42.122.239 attack
srvr1: (mod_security) mod_security (id:942100) triggered by 119.42.122.239 (TH/-/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/08/21 12:03:52 [error] 482759#0: *840352 [client 119.42.122.239] ModSecurity: Access denied with code 406 (phase 2).  [file "/etc/modsecurity.d/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"] [line "45"] [id "942100"] [rev ""] [msg ""] [redacted] [severity "0"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-sqli"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/152/248/66"] [tag "PCI/6.5.2"] [redacted] [uri "/forum/viewthread.php"] [unique_id "159801143266.523321"] [ref ""], client: 119.42.122.239, [redacted] request: "GET /forum/viewthread.php?thread_id=1122%27+AND+++9747+%3D+0 HTTP/1.1" [redacted]
2020-08-22 00:21:11
119.42.122.85 attackspambots
Unauthorized IMAP connection attempt
2020-06-10 19:09:26
119.42.122.151 attack
Unauthorized connection attempt detected from IP address 119.42.122.151 to port 445
2019-12-23 15:08:49
119.42.122.196 attackbots
119.42.122.196 has been banned from MailServer for Abuse
...
2019-10-12 20:16:45
119.42.122.244 attackbots
445/tcp
[2019-06-27]1pkt
2019-06-27 21:22:50
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.42.122.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58482
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.42.122.194.			IN	A

;; AUTHORITY SECTION:
.			360	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030900 1800 900 604800 86400

;; Query time: 173 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 14:36:00 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 194.122.42.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 194.122.42.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
82.196.3.212 attackbots
82.196.3.212 - - [24/Jan/2020:04:51:32 +0000] "POST /wp-login.php HTTP/1.1" 200 6409 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
82.196.3.212 - - [24/Jan/2020:04:51:38 +0000] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-01-24 20:08:42
49.88.112.67 attack
Jan 24 13:37:26 v22018053744266470 sshd[32089]: Failed password for root from 49.88.112.67 port 50424 ssh2
Jan 24 13:38:20 v22018053744266470 sshd[32148]: Failed password for root from 49.88.112.67 port 24390 ssh2
...
2020-01-24 20:54:06
61.96.71.51 attack
SIP/5060 Probe, BF, Hack -
2020-01-24 20:47:18
118.172.17.201 attack
1579841472 - 01/24/2020 05:51:12 Host: 118.172.17.201/118.172.17.201 Port: 445 TCP Blocked
2020-01-24 20:25:16
123.20.172.142 attack
Brute force attempt
2020-01-24 20:26:40
45.235.94.194 attack
1579841495 - 01/24/2020 05:51:35 Host: 45.235.94.194/45.235.94.194 Port: 445 TCP Blocked
2020-01-24 20:10:36
212.237.21.179 attack
Unauthorized connection attempt detected from IP address 212.237.21.179 to port 2220 [J]
2020-01-24 20:06:44
94.23.255.92 attackbots
Jan 24 13:39:26 debian-2gb-nbg1-2 kernel: \[2128842.671946\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.23.255.92 DST=195.201.40.59 LEN=52 TOS=0x00 PREC=0x00 TTL=115 ID=61311 DF PROTO=TCP SPT=61084 DPT=3389 WINDOW=64240 RES=0x00 SYN URGP=0
2020-01-24 20:45:16
185.156.73.52 attackbots
01/24/2020-07:43:10.871066 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-01-24 20:47:48
106.12.34.56 attack
Unauthorized connection attempt detected from IP address 106.12.34.56 to port 2220 [J]
2020-01-24 20:22:32
209.97.155.95 attackbots
209.97.155.95 - - \[24/Jan/2020:13:39:05 +0100\] "POST /wp-login.php HTTP/1.0" 200 6699 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
209.97.155.95 - - \[24/Jan/2020:13:39:16 +0100\] "POST /wp-login.php HTTP/1.0" 200 6669 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
209.97.155.95 - - \[24/Jan/2020:13:39:19 +0100\] "POST /wp-login.php HTTP/1.0" 200 6701 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-01-24 20:49:41
125.129.83.208 attackspam
Jan 24 12:43:53 meumeu sshd[11315]: Failed password for root from 125.129.83.208 port 47198 ssh2
Jan 24 12:46:27 meumeu sshd[11659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.129.83.208 
Jan 24 12:46:29 meumeu sshd[11659]: Failed password for invalid user link from 125.129.83.208 port 42968 ssh2
...
2020-01-24 20:06:24
180.252.143.168 attackspam
Jan 24 13:39:17 sd-53420 sshd\[18789\]: Invalid user it from 180.252.143.168
Jan 24 13:39:17 sd-53420 sshd\[18789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.252.143.168
Jan 24 13:39:19 sd-53420 sshd\[18789\]: Failed password for invalid user it from 180.252.143.168 port 54226 ssh2
Jan 24 13:39:21 sd-53420 sshd\[18804\]: Invalid user it from 180.252.143.168
Jan 24 13:39:21 sd-53420 sshd\[18804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.252.143.168
...
2020-01-24 20:48:05
129.211.130.37 attackspam
2020-01-24T07:53:27.022884shield sshd\[6886\]: Invalid user leon from 129.211.130.37 port 53515
2020-01-24T07:53:27.028168shield sshd\[6886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.130.37
2020-01-24T07:53:29.070496shield sshd\[6886\]: Failed password for invalid user leon from 129.211.130.37 port 53515 ssh2
2020-01-24T07:55:59.320016shield sshd\[7244\]: Invalid user student from 129.211.130.37 port 36402
2020-01-24T07:55:59.326398shield sshd\[7244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.130.37
2020-01-24 20:38:46
36.81.6.55 attack
1579841461 - 01/24/2020 05:51:01 Host: 36.81.6.55/36.81.6.55 Port: 445 TCP Blocked
2020-01-24 20:34:10

最近上报的IP列表

119.42.122.192 119.42.122.198 119.42.122.2 119.42.122.20
119.42.122.200 119.42.122.202 119.42.122.206 119.42.122.208
119.42.122.210 119.42.122.212 119.42.122.214 119.42.122.216
119.42.122.219 119.42.122.22 119.42.122.220 119.42.122.222
119.42.122.224 119.42.122.226 119.42.122.228 119.42.122.230