必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.42.169.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1413
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.42.169.30.			IN	A

;; AUTHORITY SECTION:
.			506	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030900 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 14:42:46 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 30.169.42.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 30.169.42.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
193.112.197.85 attack
Dec  8 17:45:59 server sshd\[29344\]: Invalid user yuonkuang from 193.112.197.85
Dec  8 17:45:59 server sshd\[29344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.197.85 
Dec  8 17:46:01 server sshd\[29344\]: Failed password for invalid user yuonkuang from 193.112.197.85 port 45650 ssh2
Dec  8 18:02:37 server sshd\[1391\]: Invalid user barquin from 193.112.197.85
Dec  8 18:02:37 server sshd\[1391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.197.85 
...
2019-12-08 23:59:19
91.134.140.32 attack
Dec  8 16:28:00 lnxded63 sshd[24624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.140.32
2019-12-08 23:40:30
218.92.0.137 attackspam
$f2bV_matches
2019-12-08 23:58:14
213.32.67.160 attackbots
Dec  8 05:40:05 hpm sshd\[17336\]: Invalid user oz from 213.32.67.160
Dec  8 05:40:05 hpm sshd\[17336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.ip-213-32-67.eu
Dec  8 05:40:07 hpm sshd\[17336\]: Failed password for invalid user oz from 213.32.67.160 port 53648 ssh2
Dec  8 05:45:37 hpm sshd\[17852\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.ip-213-32-67.eu  user=root
Dec  8 05:45:39 hpm sshd\[17852\]: Failed password for root from 213.32.67.160 port 58220 ssh2
2019-12-08 23:45:44
185.176.27.98 attack
12/08/2019-15:57:26.484671 185.176.27.98 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-09 00:00:09
189.125.2.234 attackspambots
SSH Brute Force, server-1 sshd[1658]: Failed password for invalid user www from 189.125.2.234 port 50077 ssh2
2019-12-08 23:36:27
218.92.0.170 attackspambots
Dec  8 16:43:14 dcd-gentoo sshd[26405]: User root from 218.92.0.170 not allowed because none of user's groups are listed in AllowGroups
Dec  8 16:43:17 dcd-gentoo sshd[26405]: error: PAM: Authentication failure for illegal user root from 218.92.0.170
Dec  8 16:43:14 dcd-gentoo sshd[26405]: User root from 218.92.0.170 not allowed because none of user's groups are listed in AllowGroups
Dec  8 16:43:17 dcd-gentoo sshd[26405]: error: PAM: Authentication failure for illegal user root from 218.92.0.170
Dec  8 16:43:14 dcd-gentoo sshd[26405]: User root from 218.92.0.170 not allowed because none of user's groups are listed in AllowGroups
Dec  8 16:43:17 dcd-gentoo sshd[26405]: error: PAM: Authentication failure for illegal user root from 218.92.0.170
Dec  8 16:43:17 dcd-gentoo sshd[26405]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.170 port 5926 ssh2
...
2019-12-08 23:44:33
167.71.172.39 attackbots
167.71.172.39 - - [08/Dec/2019:15:55:49 +0100] "GET /wp-login.php HTTP/1.1" 200 1256 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.71.172.39 - - [08/Dec/2019:15:55:50 +0100] "POST /wp-login.php HTTP/1.1" 200 1651 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.71.172.39 - - [08/Dec/2019:15:55:50 +0100] "GET /wp-login.php HTTP/1.1" 200 1256 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.71.172.39 - - [08/Dec/2019:15:55:55 +0100] "POST /wp-login.php HTTP/1.1" 200 1629 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.71.172.39 - - [08/Dec/2019:15:56:00 +0100] "GET /wp-login.php HTTP/1.1" 200 1256 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.71.172.39 - - [08/Dec/2019:15:56:01 +0100] "POST /wp-login.php HTTP/1.1" 200 1626 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-12-09 00:03:59
176.31.43.255 attack
Dec  8 16:34:03 localhost sshd\[14930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.43.255  user=root
Dec  8 16:34:05 localhost sshd\[14930\]: Failed password for root from 176.31.43.255 port 36964 ssh2
Dec  8 16:39:11 localhost sshd\[15481\]: Invalid user florian from 176.31.43.255 port 51960
2019-12-08 23:50:09
182.61.49.179 attack
Dec  8 21:48:04 itv-usvr-01 sshd[29196]: Invalid user guest from 182.61.49.179
Dec  8 21:48:04 itv-usvr-01 sshd[29196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.49.179
Dec  8 21:48:04 itv-usvr-01 sshd[29196]: Invalid user guest from 182.61.49.179
Dec  8 21:48:06 itv-usvr-01 sshd[29196]: Failed password for invalid user guest from 182.61.49.179 port 39874 ssh2
Dec  8 21:56:09 itv-usvr-01 sshd[29502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.49.179  user=root
Dec  8 21:56:11 itv-usvr-01 sshd[29502]: Failed password for root from 182.61.49.179 port 37436 ssh2
2019-12-08 23:52:36
148.70.192.84 attackspambots
Brute-force attempt banned
2019-12-09 00:13:45
62.234.114.148 attackspambots
Mar 22 23:19:35 vtv3 sshd[14743]: Failed password for invalid user terminfo from 62.234.114.148 port 40036 ssh2
Mar 22 23:39:12 vtv3 sshd[22735]: Invalid user trac from 62.234.114.148 port 35066
Mar 22 23:39:12 vtv3 sshd[22735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.114.148
Mar 22 23:39:12 vtv3 sshd[22736]: Invalid user trac from 62.234.114.148 port 35072
Mar 22 23:39:12 vtv3 sshd[22736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.114.148
Mar 22 23:39:15 vtv3 sshd[22735]: Failed password for invalid user trac from 62.234.114.148 port 35066 ssh2
Mar 23 00:28:16 vtv3 sshd[10547]: Invalid user vnc from 62.234.114.148 port 36414
Mar 23 00:28:16 vtv3 sshd[10547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.114.148
Mar 23 00:28:16 vtv3 sshd[10548]: Invalid user vnc from 62.234.114.148 port 36416
Mar 23 00:28:16 vtv3 sshd[10548]: pam_unix(sshd:auth): authenti
2019-12-08 23:43:25
181.129.182.3 attack
Dec  8 16:44:58 meumeu sshd[2152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.182.3 
Dec  8 16:45:01 meumeu sshd[2152]: Failed password for invalid user albedo from 181.129.182.3 port 39896 ssh2
Dec  8 16:51:06 meumeu sshd[3197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.182.3 
...
2019-12-08 23:52:50
109.225.44.235 attackspam
Automatic report - Port Scan Attack
2019-12-09 00:01:55
185.36.81.78 attackspam
Dec  8 15:51:11 server1 postfix/smtpd\[23583\]: warning: unknown\[185.36.81.78\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Dec  8 16:03:03 server1 postfix/smtpd\[23907\]: warning: unknown\[185.36.81.78\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Dec  8 16:38:22 server1 postfix/smtpd\[25804\]: warning: unknown\[185.36.81.78\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-12-08 23:52:06

最近上报的IP列表

119.42.169.158 119.42.67.44 119.42.67.46 119.42.67.49
119.42.67.52 119.42.67.53 119.42.67.54 119.42.67.56
119.42.67.57 119.42.67.58 119.42.67.6 119.42.67.60
119.42.67.62 119.42.67.64 119.42.67.65 90.94.136.145
119.42.67.66 119.42.67.68 119.42.67.70 119.42.67.72