必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
119.42.122.239 attack
srvr1: (mod_security) mod_security (id:942100) triggered by 119.42.122.239 (TH/-/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/08/21 12:03:52 [error] 482759#0: *840352 [client 119.42.122.239] ModSecurity: Access denied with code 406 (phase 2).  [file "/etc/modsecurity.d/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"] [line "45"] [id "942100"] [rev ""] [msg ""] [redacted] [severity "0"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-sqli"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/152/248/66"] [tag "PCI/6.5.2"] [redacted] [uri "/forum/viewthread.php"] [unique_id "159801143266.523321"] [ref ""], client: 119.42.122.239, [redacted] request: "GET /forum/viewthread.php?thread_id=1122%27+AND+++9747+%3D+0 HTTP/1.1" [redacted]
2020-08-22 00:21:11
119.42.122.85 attackspambots
Unauthorized IMAP connection attempt
2020-06-10 19:09:26
119.42.122.151 attack
Unauthorized connection attempt detected from IP address 119.42.122.151 to port 445
2019-12-23 15:08:49
119.42.122.196 attackbots
119.42.122.196 has been banned from MailServer for Abuse
...
2019-10-12 20:16:45
119.42.122.244 attackbots
445/tcp
[2019-06-27]1pkt
2019-06-27 21:22:50
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.42.122.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22269
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.42.122.248.			IN	A

;; AUTHORITY SECTION:
.			411	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030900 1800 900 604800 86400

;; Query time: 119 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 14:37:24 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 248.122.42.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 248.122.42.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
197.161.142.31 attackbots
Lines containing failures of 197.161.142.31
Sep 16 10:17:56 shared10 sshd[10698]: Invalid user admin from 197.161.142.31 port 37925
Sep 16 10:17:56 shared10 sshd[10698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.161.142.31
Sep 16 10:17:59 shared10 sshd[10698]: Failed password for invalid user admin from 197.161.142.31 port 37925 ssh2
Sep 16 10:17:59 shared10 sshd[10698]: Connection closed by invalid user admin 197.161.142.31 port 37925 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=197.161.142.31
2019-09-16 22:24:37
212.129.35.92 attackspambots
2019-09-16 15:51:09,699 fail2ban.actions: WARNING [ssh] Ban 212.129.35.92
2019-09-16 23:15:11
79.188.68.90 attackbots
Sep 16 04:18:15 TORMINT sshd\[17200\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.188.68.90  user=root
Sep 16 04:18:16 TORMINT sshd\[17200\]: Failed password for root from 79.188.68.90 port 35364 ssh2
Sep 16 04:23:23 TORMINT sshd\[17521\]: Invalid user cfabllc from 79.188.68.90
Sep 16 04:23:23 TORMINT sshd\[17521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.188.68.90
...
2019-09-16 22:36:39
185.142.236.34 attack
port scan and connect, tcp 22 (ssh)
2019-09-16 23:10:44
41.235.65.92 attackbotsspam
port scan and connect, tcp 23 (telnet)
2019-09-16 22:49:30
81.18.35.18 attackbots
Automatic report - Port Scan Attack
2019-09-16 23:02:52
93.123.3.253 attackbots
" "
2019-09-16 22:47:22
175.150.106.241 attackbotsspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/175.150.106.241/ 
 CN - 1H : (339)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4837 
 
 IP : 175.150.106.241 
 
 CIDR : 175.148.0.0/14 
 
 PREFIX COUNT : 1262 
 
 UNIQUE IP COUNT : 56665856 
 
 
 WYKRYTE ATAKI Z ASN4837 :  
  1H - 7 
  3H - 10 
  6H - 25 
 12H - 49 
 24H - 90 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery
2019-09-16 22:26:24
139.178.46.47 attackspam
Sep 16 10:20:27 mxgate1 postfix/postscreen[23159]: CONNECT from [139.178.46.47]:62709 to [176.31.12.44]:25
Sep 16 10:20:27 mxgate1 postfix/dnsblog[23283]: addr 139.178.46.47 listed by domain zen.spamhaus.org as 127.0.0.4
Sep 16 10:20:27 mxgate1 postfix/dnsblog[23286]: addr 139.178.46.47 listed by domain cbl.abuseat.org as 127.0.0.2
Sep 16 10:20:27 mxgate1 postfix/dnsblog[23284]: addr 139.178.46.47 listed by domain bl.spamcop.net as 127.0.0.2
Sep 16 10:20:27 mxgate1 postfix/dnsblog[23285]: addr 139.178.46.47 listed by domain b.barracudacentral.org as 127.0.0.2
Sep 16 10:20:33 mxgate1 postfix/postscreen[23159]: DNSBL rank 5 for [139.178.46.47]:62709
Sep x@x
Sep 16 10:20:33 mxgate1 postfix/postscreen[23159]: HANGUP after 0.49 from [139.178.46.47]:62709 in tests after SMTP handshake
Sep 16 10:20:33 mxgate1 postfix/postscreen[23159]: DISCONNECT [139.178.46.47]:62709


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=139.178.46.47
2019-09-16 22:31:49
144.217.84.164 attackspam
Sep 16 14:26:17 MK-Soft-VM3 sshd\[17785\]: Invalid user erman from 144.217.84.164 port 41184
Sep 16 14:26:17 MK-Soft-VM3 sshd\[17785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.84.164
Sep 16 14:26:19 MK-Soft-VM3 sshd\[17785\]: Failed password for invalid user erman from 144.217.84.164 port 41184 ssh2
...
2019-09-16 23:22:43
157.230.220.159 attack
Sep 16 10:10:52 aat-srv002 sshd[15860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.220.159
Sep 16 10:10:54 aat-srv002 sshd[15860]: Failed password for invalid user giter from 157.230.220.159 port 55760 ssh2
Sep 16 10:15:14 aat-srv002 sshd[15954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.220.159
Sep 16 10:15:16 aat-srv002 sshd[15954]: Failed password for invalid user agosti from 157.230.220.159 port 44828 ssh2
...
2019-09-16 23:34:55
154.70.200.112 attackspambots
Sep 16 13:33:15 MK-Soft-Root2 sshd\[22317\]: Invalid user xl from 154.70.200.112 port 45371
Sep 16 13:33:15 MK-Soft-Root2 sshd\[22317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.70.200.112
Sep 16 13:33:18 MK-Soft-Root2 sshd\[22317\]: Failed password for invalid user xl from 154.70.200.112 port 45371 ssh2
...
2019-09-16 22:39:14
222.189.186.67 attackspambots
Unauthorized IMAP connection attempt
2019-09-16 22:42:42
120.92.119.155 attackbots
2019-09-16 12:11:45,227 fail2ban.actions: WARNING [ssh] Ban 120.92.119.155
2019-09-16 22:50:55
94.23.208.211 attack
Automatic report - Banned IP Access
2019-09-16 23:46:47

最近上报的IP列表

119.42.122.247 119.42.122.25 119.42.122.250 119.42.122.254
119.42.122.26 119.42.122.28 119.42.122.30 119.42.122.32
119.42.122.34 119.42.122.36 119.42.122.37 119.42.122.38
119.42.122.4 119.42.122.40 119.42.122.42 119.42.122.44
119.42.122.46 119.42.122.48 119.42.122.50 119.42.122.51