必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.42.93.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57523
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.42.93.6.			IN	A

;; AUTHORITY SECTION:
.			361	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030900 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 15:13:03 CST 2022
;; MSG SIZE  rcvd: 104
HOST信息:
Host 6.93.42.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 6.93.42.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.12.186.130 attackbotsspam
fail2ban -- 106.12.186.130
...
2020-08-09 07:40:48
106.54.86.87 attackbotsspam
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-08-09 07:17:50
111.229.165.57 attack
Aug  8 23:19:19 124388 sshd[1095]: Failed password for root from 111.229.165.57 port 51628 ssh2
Aug  8 23:21:27 124388 sshd[1334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.165.57  user=root
Aug  8 23:21:29 124388 sshd[1334]: Failed password for root from 111.229.165.57 port 53446 ssh2
Aug  8 23:23:36 124388 sshd[1442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.165.57  user=root
Aug  8 23:23:39 124388 sshd[1442]: Failed password for root from 111.229.165.57 port 55268 ssh2
2020-08-09 07:38:52
153.127.52.17 attack
Lines containing failures of 153.127.52.17
Aug  5 19:13:46 neweola sshd[13793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.127.52.17  user=r.r
Aug  5 19:13:48 neweola sshd[13793]: Failed password for r.r from 153.127.52.17 port 39616 ssh2
Aug  5 19:13:50 neweola sshd[13793]: Received disconnect from 153.127.52.17 port 39616:11: Bye Bye [preauth]
Aug  5 19:13:50 neweola sshd[13793]: Disconnected from authenticating user r.r 153.127.52.17 port 39616 [preauth]
Aug  5 19:19:49 neweola sshd[14012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.127.52.17  user=r.r
Aug  5 19:19:50 neweola sshd[14012]: Failed password for r.r from 153.127.52.17 port 43534 ssh2
Aug  5 19:19:51 neweola sshd[14012]: Received disconnect from 153.127.52.17 port 43534:11: Bye Bye [preauth]
Aug  5 19:19:51 neweola sshd[14012]: Disconnected from authenticating user r.r 153.127.52.17 port 43534 [preauth]
Aug  5........
------------------------------
2020-08-09 07:20:26
194.26.29.10 attack
Aug  9 01:21:30 debian-2gb-nbg1-2 kernel: \[19187334.520528\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.10 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=50485 PROTO=TCP SPT=55391 DPT=22222 WINDOW=1024 RES=0x00 SYN URGP=0
2020-08-09 07:33:03
81.182.254.124 attackbots
*Port Scan* detected from 81.182.254.124 (HU/Hungary/Budapest/Budapest/dsl51B6FE7C.fixip.t-online.hu). 4 hits in the last 110 seconds
2020-08-09 07:18:10
121.122.81.195 attackbots
DATE:2020-08-08 22:56:33,IP:121.122.81.195,MATCHES:10,PORT:ssh
2020-08-09 07:30:46
82.64.225.32 attackbots
Honeypot hit.
2020-08-09 07:29:44
106.12.46.179 attackbots
SSH Brute Force
2020-08-09 07:18:41
3.248.205.235 attackbotsspam
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: ec2-3-248-205-235.eu-west-1.compute.amazonaws.com.
2020-08-09 07:20:06
39.104.163.128 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 19 - port: 26324 proto: tcp cat: Misc Attackbytes: 60
2020-08-09 07:43:04
157.230.153.203 attack
157.230.153.203 - - [09/Aug/2020:01:17:49 +0200] "GET /wp-login.php HTTP/1.1" 200 6310 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.230.153.203 - - [09/Aug/2020:01:17:51 +0200] "POST /wp-login.php HTTP/1.1" 200 6561 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.230.153.203 - - [09/Aug/2020:01:17:53 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-09 07:46:24
49.69.151.236 attackspambots
20 attempts against mh-ssh on storm
2020-08-09 07:50:05
45.95.168.77 attack
2020-08-09 01:29:35 dovecot_login authenticator failed for slot0.banhats.com \(USER\) \[45.95.168.77\]: 535 Incorrect authentication data \(set_id=contact@nopcommerce.it\)
2020-08-09 01:31:40 dovecot_login authenticator failed for slot0.banhats.com \(USER\) \[45.95.168.77\]: 535 Incorrect authentication data \(set_id=contact@nophost.com\)
2020-08-09 01:31:40 dovecot_login authenticator failed for slot0.banhats.com \(USER\) \[45.95.168.77\]: 535 Incorrect authentication data \(set_id=contact@opso.it\)
2020-08-09 01:36:06 dovecot_login authenticator failed for slot0.banhats.com \(USER\) \[45.95.168.77\]: 535 Incorrect authentication data \(set_id=contact@nopcommerce.it\)
2020-08-09 01:38:09 dovecot_login authenticator failed for slot0.banhats.com \(USER\) \[45.95.168.77\]: 535 Incorrect authentication data \(set_id=contact@opso.it\)
2020-08-09 01:38:09 dovecot_login authenticator failed for slot0.banhats.com \(USER\) \[45.95.168.77\]: 535 Incorrect authentication data \(set_id=contact@nophost.com\)
2020-08-09 07:50:35
148.255.15.214 attack
Lines containing failures of 148.255.15.214
Aug  6 10:17:28 newdogma sshd[29647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.255.15.214  user=r.r
Aug  6 10:17:31 newdogma sshd[29647]: Failed password for r.r from 148.255.15.214 port 38842 ssh2
Aug  6 10:17:32 newdogma sshd[29647]: Received disconnect from 148.255.15.214 port 38842:11: Bye Bye [preauth]
Aug  6 10:17:32 newdogma sshd[29647]: Disconnected from authenticating user r.r 148.255.15.214 port 38842 [preauth]
Aug  6 10:22:05 newdogma sshd[29870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.255.15.214  user=r.r
Aug  6 10:22:08 newdogma sshd[29870]: Failed password for r.r from 148.255.15.214 port 44458 ssh2
Aug  6 10:22:09 newdogma sshd[29870]: Received disconnect from 148.255.15.214 port 44458:11: Bye Bye [preauth]
Aug  6 10:22:09 newdogma sshd[29870]: Disconnected from authenticating user r.r 148.255.15.214 port 44458........
------------------------------
2020-08-09 07:45:56

最近上报的IP列表

119.42.93.58 119.42.93.61 119.42.93.62 119.42.93.64
119.42.93.66 119.42.93.69 119.42.93.71 119.42.93.72
119.42.93.74 119.42.93.77 119.42.93.8 119.42.93.81
119.42.93.82 119.42.93.85 119.42.93.88 119.42.93.90
119.42.93.92 119.42.93.95 119.42.93.96 119.42.94.102