必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
119.42.72.31 attack
1593742241 - 07/03/2020 04:10:41 Host: 119.42.72.31/119.42.72.31 Port: 445 TCP Blocked
2020-07-03 22:21:10
119.42.72.156 attack
lfd: (smtpauth) Failed SMTP AUTH login from 119.42.72.156 (-): 5 in the last 3600 secs - Sat Jun  2 13:31:37 2018
2020-04-30 18:58:16
119.42.72.226 attack
1584941832 - 03/23/2020 06:37:12 Host: 119.42.72.226/119.42.72.226 Port: 445 TCP Blocked
2020-03-23 14:34:39
119.42.72.209 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 16:23:02
119.42.72.202 attackspambots
unauthorized connection attempt
2020-01-09 15:48:01
119.42.72.172 attackspam
1577255112 - 12/25/2019 07:25:12 Host: 119.42.72.172/119.42.72.172 Port: 445 TCP Blocked
2019-12-25 18:12:48
119.42.72.49 attackspambots
Unauthorized connection attempt from IP address 119.42.72.49 on Port 445(SMB)
2019-11-27 00:38:07
119.42.72.57 attackspambots
Unauthorised access (Nov  1) SRC=119.42.72.57 LEN=52 TTL=114 ID=4071 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-02 03:48:52
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.42.72.170
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58766
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.42.72.170.			IN	A

;; AUTHORITY SECTION:
.			0	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030900 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 14:49:48 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 170.72.42.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 170.72.42.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.139.56.133 attackspambots
Brute force SMTP login attempts.
2019-07-27 07:10:50
84.235.3.37 attack
Many RDP login attempts detected by IDS script
2019-07-27 07:00:39
178.128.21.32 attackspambots
SSH Brute-Force attacks
2019-07-27 07:07:08
88.218.16.164 attackspambots
Jul 27 00:30:21 vps647732 sshd[9237]: Failed password for root from 88.218.16.164 port 36626 ssh2
...
2019-07-27 06:47:15
46.176.85.125 attack
Unauthorised access (Jul 26) SRC=46.176.85.125 LEN=40 TOS=0x08 PREC=0x40 TTL=46 ID=12720 TCP DPT=23 WINDOW=8216 SYN
2019-07-27 06:24:51
203.160.132.4 attackspambots
Jul 26 22:49:05 localhost sshd\[35580\]: Invalid user mskim1 from 203.160.132.4 port 46550
Jul 26 22:49:05 localhost sshd\[35580\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.160.132.4
Jul 26 22:49:07 localhost sshd\[35580\]: Failed password for invalid user mskim1 from 203.160.132.4 port 46550 ssh2
Jul 26 22:54:25 localhost sshd\[35777\]: Invalid user 1q2w3e!@\#$ from 203.160.132.4 port 40824
Jul 26 22:54:25 localhost sshd\[35777\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.160.132.4
...
2019-07-27 07:08:37
58.76.223.206 attack
Jul 26 23:31:00 mail sshd\[4124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.76.223.206  user=root
Jul 26 23:31:02 mail sshd\[4124\]: Failed password for root from 58.76.223.206 port 40958 ssh2
...
2019-07-27 06:45:25
216.239.90.19 attack
Jul 26 19:48:46 MK-Soft-VM3 sshd\[28116\]: Invalid user admin from 216.239.90.19 port 50450
Jul 26 19:48:46 MK-Soft-VM3 sshd\[28116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.239.90.19
Jul 26 19:48:48 MK-Soft-VM3 sshd\[28116\]: Failed password for invalid user admin from 216.239.90.19 port 50450 ssh2
...
2019-07-27 06:56:32
173.216.198.183 attack
RDP Brute-Force (Grieskirchen RZ1)
2019-07-27 06:37:00
185.234.72.75 attackspambots
Jul 26 22:51:30 MK-Soft-Root2 sshd\[7752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.234.72.75  user=root
Jul 26 22:51:32 MK-Soft-Root2 sshd\[7752\]: Failed password for root from 185.234.72.75 port 34514 ssh2
Jul 26 22:55:41 MK-Soft-Root2 sshd\[8331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.234.72.75  user=root
...
2019-07-27 06:27:33
51.75.147.100 attackspambots
Jul 27 00:49:32 SilenceServices sshd[6246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.147.100
Jul 27 00:49:34 SilenceServices sshd[6246]: Failed password for invalid user ketan from 51.75.147.100 port 43762 ssh2
Jul 27 00:53:47 SilenceServices sshd[11170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.147.100
2019-07-27 07:09:55
42.238.48.243 attack
Jul 25 09:07:35 localhost kernel: [15304249.223106] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=42.238.48.243 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=32259 PROTO=TCP SPT=36058 DPT=52869 WINDOW=19184 RES=0x00 SYN URGP=0 
Jul 25 09:07:35 localhost kernel: [15304249.223132] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=42.238.48.243 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=32259 PROTO=TCP SPT=36058 DPT=52869 SEQ=758669438 ACK=0 WINDOW=19184 RES=0x00 SYN URGP=0 
Jul 26 15:49:00 localhost kernel: [15414733.497996] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=42.238.48.243 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=14063 PROTO=TCP SPT=32323 DPT=52869 WINDOW=19184 RES=0x00 SYN URGP=0 
Jul 26 15:49:00 localhost kernel: [15414733.498019] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=42.238.48.243 DST=[mungedIP2] LEN=40 TOS=0x0
2019-07-27 06:52:42
46.119.114.203 attackspam
Unauthorized access detected from banned ip
2019-07-27 06:33:26
190.85.145.162 attack
Jul 26 21:55:44 MK-Soft-VM3 sshd\[2100\]: Invalid user they from 190.85.145.162 port 50686
Jul 26 21:55:44 MK-Soft-VM3 sshd\[2100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.145.162
Jul 26 21:55:47 MK-Soft-VM3 sshd\[2100\]: Failed password for invalid user they from 190.85.145.162 port 50686 ssh2
...
2019-07-27 06:28:01
50.115.181.98 attackbotsspam
Jul 26 23:34:11 yabzik sshd[26925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.115.181.98
Jul 26 23:34:13 yabzik sshd[26925]: Failed password for invalid user service from 50.115.181.98 port 46617 ssh2
Jul 26 23:39:59 yabzik sshd[28831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.115.181.98
2019-07-27 07:14:38

最近上报的IP列表

119.42.72.17 119.42.72.174 57.204.20.128 119.42.72.177
119.42.72.181 119.42.72.183 119.42.72.184 119.42.72.188
65.4.220.190 119.42.72.19 52.140.60.83 119.42.72.190
119.42.72.192 119.42.72.194 119.42.72.197 119.42.72.204
119.42.72.210 119.42.72.212 119.42.72.214 119.42.72.215