必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.40.142.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46952
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;131.40.142.42.			IN	A

;; AUTHORITY SECTION:
.			342	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 22:09:18 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 42.142.40.131.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 131.40.142.42.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.92.0.135 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.135  user=root
Failed password for root from 218.92.0.135 port 63006 ssh2
Failed password for root from 218.92.0.135 port 63006 ssh2
Failed password for root from 218.92.0.135 port 63006 ssh2
Failed password for root from 218.92.0.135 port 63006 ssh2
2019-07-11 05:42:00
132.232.39.15 attackbotsspam
SSH Brute-Forcing (ownc)
2019-07-11 05:40:02
202.120.45.202 attackspam
Jul 10 20:58:52 mailserver sshd[9284]: Invalid user lauren from 202.120.45.202
Jul 10 20:58:52 mailserver sshd[9284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.120.45.202
Jul 10 20:58:54 mailserver sshd[9284]: Failed password for invalid user lauren from 202.120.45.202 port 40692 ssh2
Jul 10 20:58:54 mailserver sshd[9284]: Received disconnect from 202.120.45.202 port 40692:11: Bye Bye [preauth]
Jul 10 20:58:54 mailserver sshd[9284]: Disconnected from 202.120.45.202 port 40692 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=202.120.45.202
2019-07-11 06:10:42
198.169.113.55 attack
Jul 10 21:01:39 localhost sshd\[5376\]: Invalid user vvv from 198.169.113.55
Jul 10 21:01:39 localhost sshd\[5376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.169.113.55
Jul 10 21:01:42 localhost sshd\[5376\]: Failed password for invalid user vvv from 198.169.113.55 port 46279 ssh2
Jul 10 21:06:04 localhost sshd\[5539\]: Invalid user support from 198.169.113.55
Jul 10 21:06:04 localhost sshd\[5539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.169.113.55
...
2019-07-11 05:42:23
91.211.228.14 attack
[portscan] Port scan
2019-07-11 06:10:00
190.223.26.38 attackspambots
Jul 10 19:02:07 ip-172-31-1-72 sshd\[1698\]: Invalid user sftp from 190.223.26.38
Jul 10 19:02:07 ip-172-31-1-72 sshd\[1698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.223.26.38
Jul 10 19:02:09 ip-172-31-1-72 sshd\[1698\]: Failed password for invalid user sftp from 190.223.26.38 port 12153 ssh2
Jul 10 19:04:43 ip-172-31-1-72 sshd\[1720\]: Invalid user john from 190.223.26.38
Jul 10 19:04:43 ip-172-31-1-72 sshd\[1720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.223.26.38
2019-07-11 06:21:22
190.147.159.34 attackspam
Jul 10 23:48:49 localhost sshd\[13091\]: Invalid user insserver from 190.147.159.34
Jul 10 23:48:49 localhost sshd\[13091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.147.159.34
Jul 10 23:48:51 localhost sshd\[13091\]: Failed password for invalid user insserver from 190.147.159.34 port 37011 ssh2
Jul 10 23:52:04 localhost sshd\[13314\]: Invalid user nq from 190.147.159.34
Jul 10 23:52:05 localhost sshd\[13314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.147.159.34
...
2019-07-11 05:52:52
210.221.220.68 attackspambots
SSH invalid-user multiple login try
2019-07-11 06:12:48
103.236.253.27 attackbotsspam
Automatic report - SSH Brute-Force Attack
2019-07-11 06:01:10
37.187.78.170 attack
Jul 10 21:03:08 MainVPS sshd[23582]: Invalid user katrina from 37.187.78.170 port 44037
Jul 10 21:03:08 MainVPS sshd[23582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.78.170
Jul 10 21:03:08 MainVPS sshd[23582]: Invalid user katrina from 37.187.78.170 port 44037
Jul 10 21:03:10 MainVPS sshd[23582]: Failed password for invalid user katrina from 37.187.78.170 port 44037 ssh2
Jul 10 21:05:55 MainVPS sshd[23874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.78.170  user=root
Jul 10 21:05:57 MainVPS sshd[23874]: Failed password for root from 37.187.78.170 port 61088 ssh2
...
2019-07-11 05:49:13
159.65.34.82 attackspam
2019-07-10T23:27:23.132607cavecanem sshd[7715]: Invalid user co from 159.65.34.82 port 54772
2019-07-10T23:27:23.135029cavecanem sshd[7715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.34.82
2019-07-10T23:27:23.132607cavecanem sshd[7715]: Invalid user co from 159.65.34.82 port 54772
2019-07-10T23:27:25.569321cavecanem sshd[7715]: Failed password for invalid user co from 159.65.34.82 port 54772 ssh2
2019-07-10T23:29:04.749038cavecanem sshd[8132]: Invalid user foo from 159.65.34.82 port 46686
2019-07-10T23:29:04.751491cavecanem sshd[8132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.34.82
2019-07-10T23:29:04.749038cavecanem sshd[8132]: Invalid user foo from 159.65.34.82 port 46686
2019-07-10T23:29:06.385056cavecanem sshd[8132]: Failed password for invalid user foo from 159.65.34.82 port 46686 ssh2
2019-07-10T23:30:23.724006cavecanem sshd[8541]: Invalid user nadmin from 159.65.34.82 port 
...
2019-07-11 06:00:49
109.74.196.234 attack
Jul 10 20:59:46 mailserver sshd[9348]: Invalid user pv from 109.74.196.234
Jul 10 20:59:46 mailserver sshd[9348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.74.196.234
Jul 10 20:59:48 mailserver sshd[9348]: Failed password for invalid user pv from 109.74.196.234 port 59200 ssh2
Jul 10 20:59:48 mailserver sshd[9348]: Received disconnect from 109.74.196.234 port 59200:11: Bye Bye [preauth]
Jul 10 20:59:48 mailserver sshd[9348]: Disconnected from 109.74.196.234 port 59200 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=109.74.196.234
2019-07-11 06:03:31
41.44.200.162 attackbots
Caught in portsentry honeypot
2019-07-11 06:08:13
14.63.219.66 attackbots
Jul 11 02:01:36 itv-usvr-02 sshd[5546]: Invalid user git from 14.63.219.66 port 44091
Jul 11 02:01:36 itv-usvr-02 sshd[5546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.219.66
Jul 11 02:01:36 itv-usvr-02 sshd[5546]: Invalid user git from 14.63.219.66 port 44091
Jul 11 02:01:38 itv-usvr-02 sshd[5546]: Failed password for invalid user git from 14.63.219.66 port 44091 ssh2
Jul 11 02:05:10 itv-usvr-02 sshd[5724]: Invalid user testing from 14.63.219.66 port 34006
2019-07-11 06:22:49
167.86.118.129 attackspam
(From fbhackpass.com@mails.wf) Own an Face book account really quickly with 7 cara hack facebook
2019-07-11 06:19:44

最近上报的IP列表

13.65.186.231 191.13.41.32 3.157.240.212 142.162.45.38
179.161.230.191 2.178.168.150 228.34.1.230 233.123.38.45
121.202.106.42 151.29.75.135 172.253.51.55 119.179.239.190
110.53.45.39 242.160.211.189 185.177.205.200 175.197.10.212
185.5.161.189 171.102.247.239 171.29.41.74 197.128.8.34