必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.42.46.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10273
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.42.46.34.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025092800 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 28 16:02:41 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 34.46.42.120.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.46.42.120.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.41.145.123 attackbots
Lines containing failures of 178.41.145.123
Jun 25 19:14:50 server01 postfix/smtpd[28461]: connect from bband-dyn123.178-41-145.t-com.sk[178.41.145.123]
Jun x@x
Jun x@x
Jun 25 19:14:52 server01 postfix/policy-spf[28472]: : Policy action=PREPEND Received-SPF: none (sunwacork.com: No applicable sender policy available) receiver=x@x
Jun x@x
Jun 25 19:14:53 server01 postfix/smtpd[28461]: lost connection after DATA from bband-dyn123.178-41-145.t-com.sk[178.41.145.123]
Jun 25 19:14:53 server01 postfix/smtpd[28461]: disconnect from bband-dyn123.178-41-145.t-com.sk[178.41.145.123]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=178.41.145.123
2019-06-26 03:11:05
159.65.148.241 attackspambots
Jun 25 20:45:25 localhost sshd\[26176\]: Invalid user toto from 159.65.148.241 port 39012
Jun 25 20:45:25 localhost sshd\[26176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.148.241
Jun 25 20:45:28 localhost sshd\[26176\]: Failed password for invalid user toto from 159.65.148.241 port 39012 ssh2
2019-06-26 03:06:36
103.224.186.133 attack
port scan and connect, tcp 23 (telnet)
2019-06-26 03:10:12
218.232.104.101 attack
Jun 25 19:22:20 Ubuntu-1404-trusty-64-minimal sshd\[22296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.232.104.101  user=root
Jun 25 19:22:21 Ubuntu-1404-trusty-64-minimal sshd\[22302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.232.104.101  user=root
Jun 25 19:22:21 Ubuntu-1404-trusty-64-minimal sshd\[22296\]: Failed password for root from 218.232.104.101 port 38586 ssh2
Jun 25 19:22:23 Ubuntu-1404-trusty-64-minimal sshd\[22302\]: Failed password for root from 218.232.104.101 port 40506 ssh2
Jun 25 19:22:25 Ubuntu-1404-trusty-64-minimal sshd\[22298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.232.104.101  user=root
2019-06-26 02:50:39
42.56.70.108 attack
Jun 25 19:23:09 dedicated sshd[27584]: Invalid user admin2 from 42.56.70.108 port 33155
2019-06-26 02:31:01
174.138.56.93 attackbotsspam
Jun 25 10:22:56 cac1d2 sshd\[25814\]: Invalid user conciergerie from 174.138.56.93 port 44876
Jun 25 10:22:56 cac1d2 sshd\[25814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.56.93
Jun 25 10:22:58 cac1d2 sshd\[25814\]: Failed password for invalid user conciergerie from 174.138.56.93 port 44876 ssh2
...
2019-06-26 02:34:19
119.29.135.217 attackspam
Jun 25 19:07:21 Ubuntu-1404-trusty-64-minimal sshd\[10826\]: Invalid user neww from 119.29.135.217
Jun 25 19:07:21 Ubuntu-1404-trusty-64-minimal sshd\[10826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.135.217
Jun 25 19:07:23 Ubuntu-1404-trusty-64-minimal sshd\[10826\]: Failed password for invalid user neww from 119.29.135.217 port 59686 ssh2
Jun 25 19:20:59 Ubuntu-1404-trusty-64-minimal sshd\[21123\]: Invalid user apache from 119.29.135.217
Jun 25 19:20:59 Ubuntu-1404-trusty-64-minimal sshd\[21123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.135.217
2019-06-26 03:19:20
184.105.139.72 attack
¯\_(ツ)_/¯
2019-06-26 02:56:07
193.8.80.224 attack
NAME : SRVC-POLD CIDR : 193.8.80.0/23 DDoS attack Hong Kong - block certain countries :) IP: 193.8.80.224  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-26 02:42:17
211.38.244.205 attack
Jun 25 20:31:44 [host] sshd[30948]: Invalid user ckodhek from 211.38.244.205
Jun 25 20:31:44 [host] sshd[30948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.38.244.205
Jun 25 20:31:46 [host] sshd[30948]: Failed password for invalid user ckodhek from 211.38.244.205 port 50504 ssh2
2019-06-26 02:57:39
191.53.221.252 attackbotsspam
Distributed brute force attack
2019-06-26 03:17:54
52.249.205.53 attackbotsspam
Jun 25 13:22:58 localhost kernel: [12727571.533601] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=52.249.205.53 DST=[mungedIP2] LEN=68 TOS=0x00 PREC=0x00 TTL=244 ID=48542 PROTO=UDP SPT=30233 DPT=111 LEN=48 
Jun 25 13:22:58 localhost kernel: [12727571.533634] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=52.249.205.53 DST=[mungedIP2] LEN=68 TOS=0x00 PREC=0x00 TTL=244 ID=48542 PROTO=UDP SPT=30233 DPT=111 LEN=48 
Jun 25 13:22:58 localhost kernel: [12727571.541551] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=52.249.205.53 DST=[mungedIP2] LEN=68 TOS=0x00 PREC=0x00 TTL=244 ID=51636 PROTO=UDP SPT=30233 DPT=111 LEN=48 
Jun 25 13:22:58 localhost kernel: [12727571.541574] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=52.249.205.53 DST=[mungedIP2] LEN=68 TOS=0x00 PREC=0x00 TTL=244 ID=51636 PROTO=UDP SPT=30233 DPT=111 LEN=48 
Jun 25 13:22:58 localhost kernel: [1
2019-06-26 02:34:39
37.79.36.40 attackbots
TCP Port: 25 _    invalid blocked abuseat-org barracudacentral _  _  _ _ (1250)
2019-06-26 02:43:53
104.248.170.27 attackbots
Automatic report - Web App Attack
2019-06-26 03:04:42
45.13.36.35 attackbots
Jun 25 20:45:52 dev postfix/smtpd\[26538\]: warning: unknown\[45.13.36.35\]: SASL LOGIN authentication failed: authentication failure
Jun 25 20:46:01 dev postfix/smtpd\[26580\]: warning: unknown\[45.13.36.35\]: SASL LOGIN authentication failed: authentication failure
Jun 25 20:46:09 dev postfix/smtpd\[25846\]: warning: unknown\[45.13.36.35\]: SASL LOGIN authentication failed: authentication failure
Jun 25 20:46:18 dev postfix/smtpd\[25007\]: warning: unknown\[45.13.36.35\]: SASL LOGIN authentication failed: authentication failure
Jun 25 20:46:26 dev postfix/smtpd\[26580\]: warning: unknown\[45.13.36.35\]: SASL LOGIN authentication failed: authentication failure
2019-06-26 03:02:30

最近上报的IP列表

10.20.28.153 110.40.186.63 77.232.152.225 216.180.246.96
14.103.70.72 59.62.114.124 27.47.85.64 223.90.52.182
209.38.77.224 195.96.129.16 193.32.126.214 176.65.149.218
170.106.187.106 117.65.140.240 204.0.18.208 45.149.173.225
27.189.130.146 223.150.100.180 183.162.114.70 111.226.157.138