必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Piscataway

省份(region): New Jersey

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.6.42.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15566
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;128.6.42.133.			IN	A

;; AUTHORITY SECTION:
.			225	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121301 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 14 04:17:41 CST 2019
;; MSG SIZE  rcvd: 116
HOST信息:
Host 133.42.6.128.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 133.42.6.128.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
124.119.120.139 attack
Telnet Honeypot -> Telnet Bruteforce / Login
2020-06-08 01:53:13
78.128.113.114 attack
Jun  7 14:57:07 web01.agentur-b-2.de postfix/smtps/smtpd[1020336]: lost connection after CONNECT from unknown[78.128.113.114]
Jun  7 14:57:10 web01.agentur-b-2.de postfix/smtps/smtpd[1020352]: warning: unknown[78.128.113.114]: SASL PLAIN authentication failed: 
Jun  7 14:57:10 web01.agentur-b-2.de postfix/smtps/smtpd[1020352]: lost connection after AUTH from unknown[78.128.113.114]
Jun  7 14:57:15 web01.agentur-b-2.de postfix/smtps/smtpd[1020336]: lost connection after AUTH from unknown[78.128.113.114]
Jun  7 14:57:20 web01.agentur-b-2.de postfix/smtps/smtpd[1020352]: lost connection after AUTH from unknown[78.128.113.114]
2020-06-08 01:24:39
51.83.171.10 attackspambots
Jun  7 16:19:33 debian-2gb-nbg1-2 kernel: \[13798317.207390\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=51.83.171.10 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=12643 PROTO=TCP SPT=56838 DPT=3391 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-08 01:34:17
125.214.60.222 attackbotsspam
1591531497 - 06/07/2020 14:04:57 Host: 125.214.60.222/125.214.60.222 Port: 445 TCP Blocked
2020-06-08 01:29:51
106.13.140.83 attackspam
2020-06-07T09:20:30.1469141495-001 sshd[15835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.140.83  user=root
2020-06-07T09:20:31.8061351495-001 sshd[15835]: Failed password for root from 106.13.140.83 port 33186 ssh2
2020-06-07T09:22:27.2234201495-001 sshd[15932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.140.83  user=root
2020-06-07T09:22:29.2789681495-001 sshd[15932]: Failed password for root from 106.13.140.83 port 57574 ssh2
2020-06-07T09:24:35.6510631495-001 sshd[16042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.140.83  user=root
2020-06-07T09:24:38.2787211495-001 sshd[16042]: Failed password for root from 106.13.140.83 port 53730 ssh2
...
2020-06-08 01:40:26
114.98.236.124 attack
Jun  7 09:01:02 vps46666688 sshd[5184]: Failed password for root from 114.98.236.124 port 57012 ssh2
...
2020-06-08 01:48:25
144.34.153.49 attackbots
Jun  7 17:59:52 buvik sshd[29387]: Failed password for root from 144.34.153.49 port 47864 ssh2
Jun  7 18:06:36 buvik sshd[30810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.34.153.49  user=root
Jun  7 18:06:39 buvik sshd[30810]: Failed password for root from 144.34.153.49 port 41388 ssh2
...
2020-06-08 01:27:52
222.186.180.130 attack
Jun  7 19:17:36 PorscheCustomer sshd[11325]: Failed password for root from 222.186.180.130 port 30103 ssh2
Jun  7 19:18:09 PorscheCustomer sshd[11335]: Failed password for root from 222.186.180.130 port 47297 ssh2
...
2020-06-08 01:31:29
218.92.0.212 attackspambots
2020-06-07T19:29:16+0200 Failed SSH Authentication/Brute Force Attack. (Server 10)
2020-06-08 01:56:06
179.171.103.134 attack
Jun  7 09:04:59 ws12vmsma01 sshd[28536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.171.103.134  user=root
Jun  7 09:05:01 ws12vmsma01 sshd[28536]: Failed password for root from 179.171.103.134 port 38053 ssh2
Jun  7 09:05:02 ws12vmsma01 sshd[28545]: Invalid user ubnt from 179.171.103.134
...
2020-06-08 01:22:18
222.186.175.154 attackspambots
Jun  7 19:47:05 legacy sshd[16104]: Failed password for root from 222.186.175.154 port 53492 ssh2
Jun  7 19:47:14 legacy sshd[16104]: Failed password for root from 222.186.175.154 port 53492 ssh2
Jun  7 19:47:17 legacy sshd[16104]: Failed password for root from 222.186.175.154 port 53492 ssh2
Jun  7 19:47:17 legacy sshd[16104]: error: maximum authentication attempts exceeded for root from 222.186.175.154 port 53492 ssh2 [preauth]
...
2020-06-08 01:48:44
37.49.226.35 attackspambots
Jun  7 09:33:31 propaganda sshd[12441]: Disconnected from 37.49.226.35 port 47024 [preauth]
2020-06-08 01:55:51
114.67.90.149 attack
$f2bV_matches
2020-06-08 01:52:45
195.54.160.107 attackspam
Jun  7 19:55:21 debian-2gb-nbg1-2 kernel: \[13811264.284977\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.54.160.107 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=42388 PROTO=TCP SPT=8080 DPT=6062 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-08 01:56:36
85.13.91.209 attackspam
Lines containing failures of 85.13.91.209 (max 1000)
Jun  7 11:57:49 jomu postfix/smtpd[8089]: connect from host-85-13-91-209.lidos.cz[85.13.91.209]
Jun  7 11:57:53 jomu postfix/smtpd[8089]: warning: host-85-13-91-209.lidos.cz[85.13.91.209]: SASL PLAIN authentication failed:
Jun  7 11:57:53 jomu postfix/smtpd[8089]: lost connection after AUTH from host-85-13-91-209.lidos.cz[85.13.91.209]
Jun  7 11:57:53 jomu postfix/smtpd[8089]: disconnect from host-85-13-91-209.lidos.cz[85.13.91.209] ehlo=1 auth=0/1 commands=1/2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=85.13.91.209
2020-06-08 01:57:11

最近上报的IP列表

129.97.83.104 164.217.156.44 50.51.112.202 93.151.136.165
104.144.142.227 176.120.122.203 56.182.8.121 179.236.87.211
46.85.49.176 0.97.186.172 97.177.165.215 200.212.81.163
176.251.25.220 39.97.235.30 183.21.169.64 206.66.130.113
121.139.245.145 84.10.214.148 104.175.104.188 179.43.178.70