必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.186.21.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29041
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.186.21.42.			IN	A

;; AUTHORITY SECTION:
.			427	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 130 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 17:36:43 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
42.21.186.122.in-addr.arpa domain name pointer nsg-corporate-42.21.186.122.airtel.in.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.21.186.122.in-addr.arpa	name = nsg-corporate-42.21.186.122.airtel.in.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.24.128.143 attack
Automatic report - Port Scan Attack
2019-09-21 19:57:14
212.129.34.72 attackspam
Sep 21 02:14:25 sachi sshd\[20914\]: Invalid user bianka from 212.129.34.72
Sep 21 02:14:25 sachi sshd\[20914\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.34.72
Sep 21 02:14:27 sachi sshd\[20914\]: Failed password for invalid user bianka from 212.129.34.72 port 36519 ssh2
Sep 21 02:18:59 sachi sshd\[21271\]: Invalid user reinaldo from 212.129.34.72
Sep 21 02:18:59 sachi sshd\[21271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.34.72
2019-09-21 20:22:17
37.187.178.245 attackspam
Sep 21 13:13:03 nextcloud sshd\[14823\]: Invalid user chang from 37.187.178.245
Sep 21 13:13:03 nextcloud sshd\[14823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.178.245
Sep 21 13:13:06 nextcloud sshd\[14823\]: Failed password for invalid user chang from 37.187.178.245 port 46902 ssh2
...
2019-09-21 20:05:38
59.152.237.118 attack
Sep 20 15:06:55 indra sshd[52108]: Invalid user rpc from 59.152.237.118
Sep 20 15:06:55 indra sshd[52108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.152.237.118 
Sep 20 15:06:57 indra sshd[52108]: Failed password for invalid user rpc from 59.152.237.118 port 58612 ssh2
Sep 20 15:06:58 indra sshd[52108]: Received disconnect from 59.152.237.118: 11: Bye Bye [preauth]
Sep 20 15:19:18 indra sshd[54732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.152.237.118  user=r.r
Sep 20 15:19:19 indra sshd[54732]: Failed password for r.r from 59.152.237.118 port 59854 ssh2
Sep 20 15:19:20 indra sshd[54732]: Received disconnect from 59.152.237.118: 11: Bye Bye [preauth]
Sep 20 15:23:46 indra sshd[55661]: Invalid user vagrant from 59.152.237.118
Sep 20 15:23:46 indra sshd[55661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.152.237.118 
Sep 20 15:2........
-------------------------------
2019-09-21 20:17:15
18.220.105.221 attackbots
Multiple failed RDP login attempts
2019-09-21 20:21:54
201.48.206.146 attackbots
Unauthorized SSH login attempts
2019-09-21 20:42:12
222.186.15.65 attackbots
Sep 21 08:01:52 debian sshd\[24107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.65  user=root
Sep 21 08:01:54 debian sshd\[24107\]: Failed password for root from 222.186.15.65 port 52908 ssh2
Sep 21 08:01:59 debian sshd\[24107\]: Failed password for root from 222.186.15.65 port 52908 ssh2
...
2019-09-21 20:03:36
139.99.67.111 attackspambots
Jul 31 20:44:55 vtv3 sshd\[10454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111  user=root
Jul 31 20:44:57 vtv3 sshd\[10454\]: Failed password for root from 139.99.67.111 port 36912 ssh2
Jul 31 20:50:04 vtv3 sshd\[12871\]: Invalid user sophie from 139.99.67.111 port 33554
Jul 31 20:50:04 vtv3 sshd\[12871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111
Jul 31 20:50:06 vtv3 sshd\[12871\]: Failed password for invalid user sophie from 139.99.67.111 port 33554 ssh2
Jul 31 21:04:49 vtv3 sshd\[20055\]: Invalid user student from 139.99.67.111 port 50804
Jul 31 21:04:49 vtv3 sshd\[20055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111
Jul 31 21:04:51 vtv3 sshd\[20055\]: Failed password for invalid user student from 139.99.67.111 port 50804 ssh2
Jul 31 21:09:46 vtv3 sshd\[22473\]: Invalid user guest1 from 139.99.67.111 port 47374
Jul 31 21:09
2019-09-21 20:10:48
104.248.114.58 attack
Invalid user managerstock from 104.248.114.58 port 51500
2019-09-21 20:15:10
139.59.95.216 attackbots
Sep 20 21:34:19 web1 sshd\[26288\]: Invalid user sonar from 139.59.95.216
Sep 20 21:34:19 web1 sshd\[26288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.95.216
Sep 20 21:34:21 web1 sshd\[26288\]: Failed password for invalid user sonar from 139.59.95.216 port 54214 ssh2
Sep 20 21:40:28 web1 sshd\[26959\]: Invalid user admin from 139.59.95.216
Sep 20 21:40:28 web1 sshd\[26959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.95.216
2019-09-21 20:18:18
139.155.71.154 attack
Sep 19 18:10:48 nbi-636 sshd[20103]: Invalid user carloxxxxxxx from 139.155.71.154 port 58558
Sep 19 18:10:50 nbi-636 sshd[20103]: Failed password for invalid user carloxxxxxxx from 139.155.71.154 port 58558 ssh2
Sep 19 18:10:50 nbi-636 sshd[20103]: Received disconnect from 139.155.71.154 port 58558:11: Bye Bye [preauth]
Sep 19 18:10:50 nbi-636 sshd[20103]: Disconnected from 139.155.71.154 port 58558 [preauth]
Sep 19 18:16:23 nbi-636 sshd[21764]: Invalid user tomaso from 139.155.71.154 port 34400
Sep 19 18:16:25 nbi-636 sshd[21764]: Failed password for invalid user tomaso from 139.155.71.154 port 34400 ssh2
Sep 19 18:16:25 nbi-636 sshd[21764]: Received disconnect from 139.155.71.154 port 34400:11: Bye Bye [preauth]
Sep 19 18:16:25 nbi-636 sshd[21764]: Disconnected from 139.155.71.154 port 34400 [preauth]
Sep 19 18:19:21 nbi-636 sshd[22508]: Invalid user hj from 139.155.71.154 port 54550
Sep 19 18:19:24 nbi-636 sshd[22508]: Failed password for invalid user hj from 139.15........
-------------------------------
2019-09-21 20:20:58
183.252.11.19 attack
Sep 21 07:03:26 tuotantolaitos sshd[29008]: Failed password for mysql from 183.252.11.19 port 49875 ssh2
...
2019-09-21 20:35:03
139.59.102.155 attackspam
$f2bV_matches
2019-09-21 20:11:06
113.10.156.189 attackbots
Sep 21 02:05:29 aiointranet sshd\[7352\]: Invalid user columbia from 113.10.156.189
Sep 21 02:05:29 aiointranet sshd\[7352\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.10.156.189
Sep 21 02:05:32 aiointranet sshd\[7352\]: Failed password for invalid user columbia from 113.10.156.189 port 49070 ssh2
Sep 21 02:10:14 aiointranet sshd\[7831\]: Invalid user kav from 113.10.156.189
Sep 21 02:10:14 aiointranet sshd\[7831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.10.156.189
2019-09-21 20:13:19
51.15.182.231 attackbots
Sep 20 18:17:45 lcdev sshd\[24047\]: Invalid user zs from 51.15.182.231
Sep 20 18:17:45 lcdev sshd\[24047\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.182.231
Sep 20 18:17:47 lcdev sshd\[24047\]: Failed password for invalid user zs from 51.15.182.231 port 37266 ssh2
Sep 20 18:22:27 lcdev sshd\[24430\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.182.231  user=daemon
Sep 20 18:22:29 lcdev sshd\[24430\]: Failed password for daemon from 51.15.182.231 port 49904 ssh2
2019-09-21 20:31:00

最近上报的IP列表

140.93.107.236 218.71.199.167 138.50.5.162 207.88.65.7
185.230.149.40 197.202.62.156 139.220.157.116 209.72.226.210
99.18.220.195 150.157.138.9 156.107.131.153 120.40.157.91
238.16.140.157 134.237.242.50 201.95.168.11 144.76.104.194
235.92.159.70 54.242.27.125 179.56.106.73 95.82.46.154