必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
119.42.72.31 attack
1593742241 - 07/03/2020 04:10:41 Host: 119.42.72.31/119.42.72.31 Port: 445 TCP Blocked
2020-07-03 22:21:10
119.42.72.156 attack
lfd: (smtpauth) Failed SMTP AUTH login from 119.42.72.156 (-): 5 in the last 3600 secs - Sat Jun  2 13:31:37 2018
2020-04-30 18:58:16
119.42.72.226 attack
1584941832 - 03/23/2020 06:37:12 Host: 119.42.72.226/119.42.72.226 Port: 445 TCP Blocked
2020-03-23 14:34:39
119.42.72.209 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 16:23:02
119.42.72.202 attackspambots
unauthorized connection attempt
2020-01-09 15:48:01
119.42.72.172 attackspam
1577255112 - 12/25/2019 07:25:12 Host: 119.42.72.172/119.42.72.172 Port: 445 TCP Blocked
2019-12-25 18:12:48
119.42.72.49 attackspambots
Unauthorized connection attempt from IP address 119.42.72.49 on Port 445(SMB)
2019-11-27 00:38:07
119.42.72.57 attackspambots
Unauthorised access (Nov  1) SRC=119.42.72.57 LEN=52 TTL=114 ID=4071 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-02 03:48:52
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.42.72.84
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61939
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.42.72.84.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030900 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 14:53:12 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 84.72.42.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 84.72.42.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
92.63.194.26 attack
Jan 31 20:34:27 ns381471 sshd[1936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.26
Jan 31 20:34:29 ns381471 sshd[1936]: Failed password for invalid user admin from 92.63.194.26 port 49876 ssh2
2020-02-01 03:46:53
51.178.51.37 attack
Jan 31 19:59:48 legacy sshd[30597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.51.37
Jan 31 19:59:50 legacy sshd[30597]: Failed password for invalid user xguest from 51.178.51.37 port 39842 ssh2
Jan 31 20:09:17 legacy sshd[30966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.51.37
...
2020-02-01 03:21:55
49.248.164.114 attack
Unauthorized connection attempt from IP address 49.248.164.114 on Port 445(SMB)
2020-02-01 03:10:44
37.187.16.30 attack
Unauthorized connection attempt detected from IP address 37.187.16.30 to port 2220 [J]
2020-02-01 03:38:41
119.92.194.35 attackbotsspam
firewall-block, port(s): 445/tcp
2020-02-01 03:42:50
176.109.248.122 attack
Unauthorized connection attempt detected from IP address 176.109.248.122 to port 23 [J]
2020-02-01 03:41:01
209.17.96.194 attack
IP: 209.17.96.194
Ports affected
    http protocol over TLS/SSL (443) 
Abuse Confidence rating 100%
Found in DNSBL('s)
ASN Details
   AS174 Cogent Communications
   United States (US)
   CIDR 209.17.96.0/20
Log Date: 31/01/2020 4:40:01 PM UTC
2020-02-01 03:39:00
208.115.109.42 attackspambots
ET SCAN Sipvicious User-Agent Detected (friendly-scanner) - port: 5060 proto: UDP cat: Attempted Information Leak
2020-02-01 03:35:44
216.151.184.185 attackspam
SIP-5060-Unauthorized
2020-02-01 03:22:30
80.234.33.138 attack
Unauthorized connection attempt from IP address 80.234.33.138 on Port 445(SMB)
2020-02-01 03:30:54
45.77.33.152 attackbotsspam
Automatic report - XMLRPC Attack
2020-02-01 03:27:47
35.183.199.38 attackspam
404 NOT FOUND
2020-02-01 03:45:48
180.218.106.34 attack
firewall-block, port(s): 1433/tcp
2020-02-01 03:39:49
187.190.218.48 attack
Unauthorized connection attempt from IP address 187.190.218.48 on Port 445(SMB)
2020-02-01 03:36:40
194.179.44.140 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 31-01-2020 17:30:17.
2020-02-01 03:36:05

最近上报的IP列表

119.42.72.82 119.42.72.87 119.42.72.91 116.170.35.1
119.42.72.97 119.42.73.102 119.42.73.112 119.42.73.114
119.42.73.116 119.42.73.129 119.42.73.140 119.42.73.142
119.42.73.148 119.42.73.157 119.42.73.170 90.221.174.240
119.42.73.172 119.42.73.180 119.42.73.19 119.42.73.194