必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Sai Buri

省份(region): Pattani

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
119.42.81.149 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 19-09-2019 20:33:19.
2019-09-20 05:25:14
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.42.81.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44435
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.42.81.70.			IN	A

;; AUTHORITY SECTION:
.			515	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031201 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 13 10:16:44 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 70.81.42.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.81.42.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
176.40.4.72 attackbots
unauthorized connection attempt
2020-01-17 19:05:46
181.44.59.246 attack
Unauthorized connection attempt detected from IP address 181.44.59.246 to port 81 [J]
2020-01-17 19:05:30
92.39.70.30 attack
unauthorized connection attempt
2020-01-17 19:27:48
2.236.209.242 attackspam
unauthorized connection attempt
2020-01-17 19:15:07
80.17.58.61 attack
unauthorized connection attempt
2020-01-17 19:13:32
189.15.174.195 attackbotsspam
unauthorized connection attempt
2020-01-17 19:18:48
85.185.2.198 attackspambots
unauthorized connection attempt
2020-01-17 19:11:37
165.227.89.212 attackspambots
165.227.89.212 - - \[17/Jan/2020:10:27:51 +0100\] "POST /wp-login.php HTTP/1.0" 200 6699 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
165.227.89.212 - - \[17/Jan/2020:10:27:57 +0100\] "POST /wp-login.php HTTP/1.0" 200 6499 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
165.227.89.212 - - \[17/Jan/2020:10:28:04 +0100\] "POST /wp-login.php HTTP/1.0" 200 6515 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-01-17 19:20:51
180.242.215.0 attackbotsspam
unauthorized connection attempt
2020-01-17 19:41:04
103.137.142.72 attackspambots
unauthorized connection attempt
2020-01-17 19:09:46
183.80.89.24 attack
unauthorized connection attempt
2020-01-17 19:19:54
121.186.129.84 attack
unauthorized connection attempt
2020-01-17 19:07:38
2.238.147.220 attackspam
unauthorized connection attempt
2020-01-17 19:01:55
82.247.200.185 attackbotsspam
Jan 16 22:54:00 eddieflores sshd\[32138\]: Invalid user pi from 82.247.200.185
Jan 16 22:54:00 eddieflores sshd\[32139\]: Invalid user pi from 82.247.200.185
Jan 16 22:54:00 eddieflores sshd\[32138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cha86-1-82-247-200-185.fbx.proxad.net
Jan 16 22:54:00 eddieflores sshd\[32139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cha86-1-82-247-200-185.fbx.proxad.net
Jan 16 22:54:01 eddieflores sshd\[32139\]: Failed password for invalid user pi from 82.247.200.185 port 33686 ssh2
Jan 16 22:54:01 eddieflores sshd\[32138\]: Failed password for invalid user pi from 82.247.200.185 port 33678 ssh2
2020-01-17 19:28:49
45.182.137.255 attack
Automatic report - Port Scan Attack
2020-01-17 19:33:37

最近上报的IP列表

119.42.123.104 119.42.81.97 119.42.82.210 119.42.81.4
119.41.160.108 119.42.82.166 119.42.81.32 119.42.82.182
119.42.81.75 119.42.81.43 119.42.81.89 119.42.81.73
119.42.81.77 119.42.81.52 119.41.160.54 119.42.81.83
119.42.81.60 119.42.81.48 119.42.81.56 119.42.81.64