必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
119.42.72.31 attack
1593742241 - 07/03/2020 04:10:41 Host: 119.42.72.31/119.42.72.31 Port: 445 TCP Blocked
2020-07-03 22:21:10
119.42.72.156 attack
lfd: (smtpauth) Failed SMTP AUTH login from 119.42.72.156 (-): 5 in the last 3600 secs - Sat Jun  2 13:31:37 2018
2020-04-30 18:58:16
119.42.72.226 attack
1584941832 - 03/23/2020 06:37:12 Host: 119.42.72.226/119.42.72.226 Port: 445 TCP Blocked
2020-03-23 14:34:39
119.42.72.209 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 16:23:02
119.42.72.202 attackspambots
unauthorized connection attempt
2020-01-09 15:48:01
119.42.72.172 attackspam
1577255112 - 12/25/2019 07:25:12 Host: 119.42.72.172/119.42.72.172 Port: 445 TCP Blocked
2019-12-25 18:12:48
119.42.72.49 attackspambots
Unauthorized connection attempt from IP address 119.42.72.49 on Port 445(SMB)
2019-11-27 00:38:07
119.42.72.57 attackspambots
Unauthorised access (Nov  1) SRC=119.42.72.57 LEN=52 TTL=114 ID=4071 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-02 03:48:52
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.42.72.228
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 301
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.42.72.228.			IN	A

;; AUTHORITY SECTION:
.			89	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030900 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 14:50:45 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 228.72.42.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 228.72.42.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
156.255.64.59 attackbotsspam
2019-09-15 18:11:03 H=(PC201809271411) [156.255.64.59]:55752 I=[192.147.25.65]:25 sender verify fail for <933110@traftracer.com>: Unrouteable address
2019-09-15 18:11:03 H=(PC201809271411) [156.255.64.59]:55752 I=[192.147.25.65]:25 F=<933110@traftracer.com> rejected RCPT : Sender verify failed
2019-09-15 18:11:05 H=(PC201809271411) [156.255.64.59]:55811 I=[192.147.25.65]:25 sender verify fail for <933110@traftracer.com>: Unrouteable address
2019-09-15 18:11:05 H=(PC201809271411) [156.255.64.59]:55811 I=[192.147.25.65]:25 F=<933110@traftracer.com> rejected RCPT : Sender verify failed
...
2019-09-16 15:41:11
124.53.62.145 attack
Invalid user admin from 124.53.62.145 port 53848
2019-09-16 15:58:36
91.235.227.94 attackbots
[portscan] Port scan
2019-09-16 16:16:16
178.128.48.92 attackspambots
Sep 12 07:22:51 itv-usvr-01 sshd[3620]: Invalid user user1 from 178.128.48.92
Sep 12 07:22:51 itv-usvr-01 sshd[3620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.48.92
Sep 12 07:22:51 itv-usvr-01 sshd[3620]: Invalid user user1 from 178.128.48.92
Sep 12 07:22:53 itv-usvr-01 sshd[3620]: Failed password for invalid user user1 from 178.128.48.92 port 44460 ssh2
Sep 12 07:30:02 itv-usvr-01 sshd[3952]: Invalid user odoo from 178.128.48.92
2019-09-16 15:34:55
94.177.240.218 attack
Sep 16 01:10:37 mail kernel: [2559360.496984] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=94.177.240.218 DST=77.73.69.240 LEN=434 TOS=0x00 PREC=0x00 TTL=57 ID=54998 DF PROTO=UDP SPT=5110 DPT=1169 LEN=414 
Sep 16 01:10:37 mail kernel: [2559360.497041] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=94.177.240.218 DST=77.73.69.240 LEN=434 TOS=0x00 PREC=0x00 TTL=57 ID=55000 DF PROTO=UDP SPT=5110 DPT=1171 LEN=414 
Sep 16 01:10:37 mail kernel: [2559360.497061] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=94.177.240.218 DST=77.73.69.240 LEN=433 TOS=0x00 PREC=0x00 TTL=57 ID=54999 DF PROTO=UDP SPT=5110 DPT=1170 LEN=413 
Sep 16 01:10:37 mail kernel: [2559360.497202] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=94.177.240.218 DST=77.73.69.240 LEN=435 TOS=0x00 PREC=0x00 TTL=56 ID=54997 DF PROTO=UDP SPT=5110 DPT=1168 LEN=415 
Sep 16 01:10:37 mail kernel: [2559360.497388] [UFW BLOCK] IN=eth0 OUT= MAC=00:16
2019-09-16 15:59:58
182.48.84.6 attackbots
$f2bV_matches
2019-09-16 16:15:03
142.93.186.245 attack
Sep 16 09:23:12 jane sshd[27853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.186.245 
Sep 16 09:23:14 jane sshd[27853]: Failed password for invalid user developers from 142.93.186.245 port 39082 ssh2
...
2019-09-16 15:50:00
104.199.174.199 attackbots
Sep 16 05:19:29 MainVPS sshd[12253]: Invalid user marta from 104.199.174.199 port 22331
Sep 16 05:19:29 MainVPS sshd[12253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.199.174.199
Sep 16 05:19:29 MainVPS sshd[12253]: Invalid user marta from 104.199.174.199 port 22331
Sep 16 05:19:31 MainVPS sshd[12253]: Failed password for invalid user marta from 104.199.174.199 port 22331 ssh2
Sep 16 05:23:10 MainVPS sshd[12516]: Invalid user alenda from 104.199.174.199 port 64551
...
2019-09-16 15:42:10
50.233.42.98 attackbotsspam
xmlrpc attack
2019-09-16 16:07:02
123.31.47.20 attack
web-1 [ssh] SSH Attack
2019-09-16 15:52:31
197.44.122.175 attack
Chat Spam
2019-09-16 16:05:16
35.231.6.102 attackbotsspam
Sep 15 21:06:55 ny01 sshd[19644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.231.6.102
Sep 15 21:06:56 ny01 sshd[19644]: Failed password for invalid user rashid from 35.231.6.102 port 39964 ssh2
Sep 15 21:10:59 ny01 sshd[20388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.231.6.102
2019-09-16 15:46:52
181.29.31.157 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-16 16:10:35
202.188.101.106 attackbotsspam
Unauthorized SSH login attempts
2019-09-16 15:54:31
27.124.231.60 attackspambots
Hacking game accounts
2019-09-16 15:56:32

最近上报的IP列表

119.42.72.227 119.42.72.230 119.42.72.234 119.42.72.237
119.42.72.238 119.42.72.24 119.42.72.244 119.42.72.247
119.42.72.251 119.42.72.253 119.42.72.254 119.42.72.26
119.42.72.3 119.42.72.30 119.42.72.32 92.81.70.221
55.120.51.236 119.42.72.35 119.42.72.36 119.42.72.38