必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
119.42.81.149 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 19-09-2019 20:33:19.
2019-09-20 05:25:14
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.42.81.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19788
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.42.81.162.			IN	A

;; AUTHORITY SECTION:
.			236	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031201 1800 900 604800 86400

;; Query time: 128 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 13 07:41:58 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 162.81.42.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 162.81.42.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
186.216.67.194 attackbots
smtp probe/invalid login attempt
2020-06-14 09:30:29
113.172.197.66 attackbotsspam
Jun 13 22:57:18 venus sshd[7734]: User admin from 113.172.197.66 not allowed because not listed in AllowUsers
Jun 13 22:57:18 venus sshd[7734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.172.197.66  user=admin
Jun 13 22:57:20 venus sshd[7734]: Failed password for invalid user admin from 113.172.197.66 port 37342 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.172.197.66
2020-06-14 09:29:22
189.89.213.4 attackbots
Jun 13 16:58:35 server1 sshd\[32226\]: Invalid user test from 189.89.213.4
Jun 13 16:58:35 server1 sshd\[32226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.89.213.4 
Jun 13 16:58:38 server1 sshd\[32226\]: Failed password for invalid user test from 189.89.213.4 port 51581 ssh2
Jun 13 17:02:18 server1 sshd\[2299\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.89.213.4  user=root
Jun 13 17:02:20 server1 sshd\[2299\]: Failed password for root from 189.89.213.4 port 35807 ssh2
Jun 13 17:06:06 server1 sshd\[4953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.89.213.4  user=root
Jun 13 17:06:08 server1 sshd\[4953\]: Failed password for root from 189.89.213.4 port 36464 ssh2
...
2020-06-14 09:19:59
61.185.114.130 attack
2020-06-14T02:27:35.947413vps751288.ovh.net sshd\[2090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.185.114.130  user=root
2020-06-14T02:27:38.300798vps751288.ovh.net sshd\[2090\]: Failed password for root from 61.185.114.130 port 54978 ssh2
2020-06-14T02:34:20.106098vps751288.ovh.net sshd\[2126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.185.114.130  user=root
2020-06-14T02:34:22.058282vps751288.ovh.net sshd\[2126\]: Failed password for root from 61.185.114.130 port 60808 ssh2
2020-06-14T02:36:54.158180vps751288.ovh.net sshd\[2158\]: Invalid user csgo from 61.185.114.130 port 40410
2020-06-14 09:19:47
46.101.245.176 attack
$f2bV_matches
2020-06-14 12:37:27
167.71.225.244 attackspambots
Jun 14 09:45:23 localhost sshd[2921536]: Connection closed by 167.71.225.244 port 20296 [preauth]
...
2020-06-14 09:28:12
18.205.139.250 attackbots
18.205.139.250 - - [14/Jun/2020:00:10:55 +0200] "POST /xmlrpc.php HTTP/1.1" 403 207342 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
18.205.139.250 - - [14/Jun/2020:00:33:56 +0200] "POST /xmlrpc.php HTTP/1.1" 403 461 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-14 09:31:11
197.15.230.125 attack
Automatic report - Port Scan Attack
2020-06-14 09:25:15
5.15.237.198 attackspambots
RO_AS8708-MNT_<177>1592106994 [1:2403312:57977] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 7 [Classification: Misc Attack] [Priority: 2]:  {TCP} 5.15.237.198:18645
2020-06-14 12:07:45
178.128.72.80 attackspambots
Scanned 3 times in the last 24 hours on port 22
2020-06-14 09:25:51
79.137.163.43 attack
Jun 14 09:10:00 gw1 sshd[3480]: Failed password for root from 79.137.163.43 port 36366 ssh2
Jun 14 09:14:40 gw1 sshd[3585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.163.43
...
2020-06-14 12:33:50
77.122.171.25 attackbotsspam
Jun 14 03:46:48 vlre-nyc-1 sshd\[7535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.122.171.25  user=root
Jun 14 03:46:50 vlre-nyc-1 sshd\[7535\]: Failed password for root from 77.122.171.25 port 36742 ssh2
Jun 14 03:51:34 vlre-nyc-1 sshd\[7639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.122.171.25  user=root
Jun 14 03:51:36 vlre-nyc-1 sshd\[7639\]: Failed password for root from 77.122.171.25 port 58896 ssh2
Jun 14 03:56:04 vlre-nyc-1 sshd\[7732\]: Invalid user tjc from 77.122.171.25
...
2020-06-14 12:27:16
51.75.142.122 attackspambots
Jun 14 00:01:30 NPSTNNYC01T sshd[10155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.142.122
Jun 14 00:01:32 NPSTNNYC01T sshd[10155]: Failed password for invalid user cat from 51.75.142.122 port 41580 ssh2
Jun 14 00:04:54 NPSTNNYC01T sshd[10435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.142.122
...
2020-06-14 12:11:11
49.233.170.202 attackspambots
Jun 14 06:08:48 haigwepa sshd[20975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.170.202 
Jun 14 06:08:50 haigwepa sshd[20975]: Failed password for invalid user pup from 49.233.170.202 port 37990 ssh2
...
2020-06-14 12:11:26
192.144.155.63 attackbotsspam
Jun 14 09:44:47 dhoomketu sshd[732386]: Failed password for root from 192.144.155.63 port 54534 ssh2
Jun 14 09:46:46 dhoomketu sshd[732429]: Invalid user admin from 192.144.155.63 port 45052
Jun 14 09:46:46 dhoomketu sshd[732429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.155.63 
Jun 14 09:46:46 dhoomketu sshd[732429]: Invalid user admin from 192.144.155.63 port 45052
Jun 14 09:46:48 dhoomketu sshd[732429]: Failed password for invalid user admin from 192.144.155.63 port 45052 ssh2
...
2020-06-14 12:36:57

最近上报的IP列表

119.42.80.90 119.42.80.92 119.42.81.16 119.42.80.84
157.72.7.51 119.42.81.158 119.42.81.13 119.42.81.164
119.42.80.88 119.42.81.141 119.42.80.94 119.42.80.87
119.41.164.107 119.42.122.72 119.42.115.210 119.42.123.91
119.42.67.31 119.42.122.80 119.42.76.196 119.42.70.166