必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.42.216.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30063
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;131.42.216.211.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 12:38:03 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
b'Host 211.216.42.131.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 131.42.216.211.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
81.210.92.245 attackbots
RUSSIAN PORN SPAM !
2020-06-17 20:12:32
49.12.32.6 attackspam
Jun 17 19:02:14 itv-usvr-02 sshd[15985]: Invalid user zyn from 49.12.32.6 port 53618
Jun 17 19:02:14 itv-usvr-02 sshd[15985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.12.32.6
Jun 17 19:02:14 itv-usvr-02 sshd[15985]: Invalid user zyn from 49.12.32.6 port 53618
Jun 17 19:02:16 itv-usvr-02 sshd[15985]: Failed password for invalid user zyn from 49.12.32.6 port 53618 ssh2
Jun 17 19:05:34 itv-usvr-02 sshd[16120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.12.32.6  user=root
Jun 17 19:05:36 itv-usvr-02 sshd[16120]: Failed password for root from 49.12.32.6 port 56618 ssh2
2020-06-17 20:17:35
128.1.34.12 attackbots
Jun 17 14:00:26 mxgate1 postfix/postscreen[9373]: CONNECT from [128.1.34.12]:63893 to [176.31.12.44]:25
Jun 17 14:00:26 mxgate1 postfix/dnsblog[9423]: addr 128.1.34.12 listed by domain zen.spamhaus.org as 127.0.0.4
Jun 17 14:00:26 mxgate1 postfix/dnsblog[9424]: addr 128.1.34.12 listed by domain cbl.abuseat.org as 127.0.0.2
Jun 17 14:00:32 mxgate1 postfix/postscreen[9373]: DNSBL rank 3 for [128.1.34.12]:63893
Jun 17 14:00:32 mxgate1 postfix/postscreen[9373]: NOQUEUE: reject: RCPT from [128.1.34.12]:63893: 550 5.7.1 Service unavailable; client [128.1.34.12] blocked using zen.spamhaus.org; from=x@x helo=
Jun 17 14:00:32 mxgate1 postfix/postscreen[9373]: DISCONNECT [128.1.34.12]:63893


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=128.1.34.12
2020-06-17 20:25:56
120.71.147.115 attackbots
Jun 17 14:01:52 vps639187 sshd\[27696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.71.147.115  user=root
Jun 17 14:01:54 vps639187 sshd\[27696\]: Failed password for root from 120.71.147.115 port 50926 ssh2
Jun 17 14:05:40 vps639187 sshd\[27745\]: Invalid user account from 120.71.147.115 port 43490
Jun 17 14:05:40 vps639187 sshd\[27745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.71.147.115
...
2020-06-17 20:13:46
46.101.200.68 attack
21 attempts against mh-ssh on cloud
2020-06-17 20:11:49
58.210.197.234 attackbotsspam
Jun 17 08:18:57 NPSTNNYC01T sshd[29012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.210.197.234
Jun 17 08:19:00 NPSTNNYC01T sshd[29012]: Failed password for invalid user wendi from 58.210.197.234 port 38870 ssh2
Jun 17 08:23:41 NPSTNNYC01T sshd[29465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.210.197.234
...
2020-06-17 20:24:32
93.75.38.205 attackspam
0,47-01/23 [bc01/m24] PostRequest-Spammer scoring: lisboa
2020-06-17 20:02:45
195.54.161.26 attack
Jun 17 14:05:41 debian-2gb-nbg1-2 kernel: \[14654239.524941\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.54.161.26 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=61893 PROTO=TCP SPT=53736 DPT=11114 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-17 20:13:10
2.80.168.28 attack
Jun 17 14:05:44 sip sshd[683009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.80.168.28 
Jun 17 14:05:44 sip sshd[683009]: Invalid user devuser from 2.80.168.28 port 35956
Jun 17 14:05:46 sip sshd[683009]: Failed password for invalid user devuser from 2.80.168.28 port 35956 ssh2
...
2020-06-17 20:10:51
218.92.0.251 attack
2020-06-17T08:19:53.463415xentho-1 sshd[384385]: Failed password for root from 218.92.0.251 port 52543 ssh2
2020-06-17T08:19:57.445411xentho-1 sshd[384385]: Failed password for root from 218.92.0.251 port 52543 ssh2
2020-06-17T08:19:32.374511xentho-1 sshd[384385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.251  user=root
2020-06-17T08:19:34.340953xentho-1 sshd[384385]: Failed password for root from 218.92.0.251 port 52543 ssh2
2020-06-17T08:19:39.325392xentho-1 sshd[384385]: Failed password for root from 218.92.0.251 port 52543 ssh2
2020-06-17T08:19:43.448653xentho-1 sshd[384385]: Failed password for root from 218.92.0.251 port 52543 ssh2
2020-06-17T08:19:48.791089xentho-1 sshd[384385]: Failed password for root from 218.92.0.251 port 52543 ssh2
2020-06-17T08:19:53.463415xentho-1 sshd[384385]: Failed password for root from 218.92.0.251 port 52543 ssh2
2020-06-17T08:19:57.445411xentho-1 sshd[384385]: Failed password for root from 218.
...
2020-06-17 20:31:20
91.121.221.195 attack
Jun 17 14:15:47 vps sshd[774022]: Failed password for invalid user jenny from 91.121.221.195 port 44774 ssh2
Jun 17 14:19:18 vps sshd[786286]: Invalid user ubuntu from 91.121.221.195 port 46524
Jun 17 14:19:18 vps sshd[786286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3105478.ip-91-121-221.eu
Jun 17 14:19:20 vps sshd[786286]: Failed password for invalid user ubuntu from 91.121.221.195 port 46524 ssh2
Jun 17 14:22:43 vps sshd[802814]: Invalid user gitlab from 91.121.221.195 port 48290
...
2020-06-17 20:30:21
111.231.32.127 attackbotsspam
2020-06-17T12:19:31.028420shield sshd\[4889\]: Invalid user test from 111.231.32.127 port 54980
2020-06-17T12:19:31.033299shield sshd\[4889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.32.127
2020-06-17T12:19:33.194213shield sshd\[4889\]: Failed password for invalid user test from 111.231.32.127 port 54980 ssh2
2020-06-17T12:24:18.305154shield sshd\[5619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.32.127  user=root
2020-06-17T12:24:20.199981shield sshd\[5619\]: Failed password for root from 111.231.32.127 port 48224 ssh2
2020-06-17 20:29:06
222.186.30.35 attackbots
Jun 17 14:24:56 vpn01 sshd[27525]: Failed password for root from 222.186.30.35 port 44833 ssh2
...
2020-06-17 20:42:19
189.203.72.138 attackspambots
2020-06-17T14:11:30+0200 Failed SSH Authentication/Brute Force Attack. (Server 9)
2020-06-17 20:12:12
185.143.75.81 attackspam
(smtpauth) Failed SMTP AUTH login from 185.143.75.81 (GB/United Kingdom/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SMTPAUTH; Logs: 2020-06-17 14:09:32 login authenticator failed for (User) [185.143.75.81]: 535 Incorrect authentication data (set_id=m.jp@forhosting.nl)
2020-06-17 14:10:04 login authenticator failed for (User) [185.143.75.81]: 535 Incorrect authentication data (set_id=m.jp@forhosting.nl)
2020-06-17 14:10:22 login authenticator failed for (User) [185.143.75.81]: 535 Incorrect authentication data (set_id=webdev@forhosting.nl)
2020-06-17 14:10:54 login authenticator failed for (User) [185.143.75.81]: 535 Incorrect authentication data (set_id=webdev@forhosting.nl)
2020-06-17 14:11:10 login authenticator failed for (User) [185.143.75.81]: 535 Incorrect authentication data (set_id=fsk@forhosting.nl)
2020-06-17 20:11:18

最近上报的IP列表

99.57.126.43 29.219.188.195 66.182.97.50 107.155.202.104
99.217.204.36 126.4.226.155 58.201.34.145 193.61.210.169
134.119.232.112 247.151.250.143 91.90.73.220 181.16.227.54
254.235.163.99 74.118.24.185 7.124.35.12 17.142.242.248
57.107.180.30 146.146.201.59 122.29.94.165 87.2.1.65