必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.30.221.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21801
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;136.30.221.42.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019073002 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jul 31 11:15:17 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
42.221.30.136.in-addr.arpa domain name pointer 42.221.30.136.in-addr.arpa.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
42.221.30.136.in-addr.arpa	name = 42.221.30.136.in-addr.arpa.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.100.86.128 attack
"Restricted File Access Attempt - Matched Data: wp-config.php found within REQUEST_FILENAME: /wp-config.php.bk"
2020-06-15 15:23:00
191.254.132.180 attackbots
[Mon Jun 15 10:53:00.347457 2020] [:error] [pid 14881:tid 140416430409472] [client 191.254.132.180:35243] [client 191.254.132.180] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197:80"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "XubwnCkSlPgyt-kn6anvlQAAAfA"]
...
2020-06-15 15:34:29
40.72.97.22 attackbots
Jun 15 07:58:49 abendstille sshd\[23699\]: Invalid user randy from 40.72.97.22
Jun 15 07:58:49 abendstille sshd\[23699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.72.97.22
Jun 15 07:58:51 abendstille sshd\[23699\]: Failed password for invalid user randy from 40.72.97.22 port 54642 ssh2
Jun 15 08:02:13 abendstille sshd\[27244\]: Invalid user rtest from 40.72.97.22
Jun 15 08:02:13 abendstille sshd\[27244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.72.97.22
...
2020-06-15 15:36:35
154.83.17.149 attack
Jun 15 05:55:10 ns382633 sshd\[26566\]: Invalid user testuser from 154.83.17.149 port 54855
Jun 15 05:55:10 ns382633 sshd\[26566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.83.17.149
Jun 15 05:55:11 ns382633 sshd\[26566\]: Failed password for invalid user testuser from 154.83.17.149 port 54855 ssh2
Jun 15 06:08:23 ns382633 sshd\[29017\]: Invalid user warehouse from 154.83.17.149 port 46955
Jun 15 06:08:23 ns382633 sshd\[29017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.83.17.149
2020-06-15 15:21:17
61.133.232.250 attack
Jun 15 08:26:41 zulu412 sshd\[21638\]: Invalid user denis from 61.133.232.250 port 40681
Jun 15 08:26:41 zulu412 sshd\[21638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.250
Jun 15 08:26:43 zulu412 sshd\[21638\]: Failed password for invalid user denis from 61.133.232.250 port 40681 ssh2
...
2020-06-15 15:13:26
64.227.9.252 attackspam
Jun 15 08:37:13 ncomp sshd[5453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.9.252  user=root
Jun 15 08:37:15 ncomp sshd[5453]: Failed password for root from 64.227.9.252 port 35972 ssh2
Jun 15 09:02:08 ncomp sshd[6163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.9.252  user=root
Jun 15 09:02:11 ncomp sshd[6163]: Failed password for root from 64.227.9.252 port 52918 ssh2
2020-06-15 15:24:57
185.220.103.6 attackbots
"Restricted File Access Attempt - Matched Data: wp-config.php found within REQUEST_FILENAME: /wp-config.phppr"
2020-06-15 15:26:36
113.184.216.127 attackbots
20/6/14@23:53:02: FAIL: Alarm-Network address from=113.184.216.127
20/6/14@23:53:02: FAIL: Alarm-Network address from=113.184.216.127
...
2020-06-15 15:30:26
190.167.16.241 attack
20 attempts against mh-ssh on echoip
2020-06-15 14:59:07
189.42.239.34 attackbotsspam
Jun 15 07:37:13 eventyay sshd[12460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.42.239.34
Jun 15 07:37:15 eventyay sshd[12460]: Failed password for invalid user fran from 189.42.239.34 port 46422 ssh2
Jun 15 07:39:27 eventyay sshd[12607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.42.239.34
...
2020-06-15 15:18:03
138.68.106.62 attack
Jun 14 23:36:58 pixelmemory sshd[1485085]: Failed password for root from 138.68.106.62 port 48970 ssh2
Jun 14 23:40:12 pixelmemory sshd[1491073]: Invalid user niki from 138.68.106.62 port 50206
Jun 14 23:40:12 pixelmemory sshd[1491073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.106.62 
Jun 14 23:40:12 pixelmemory sshd[1491073]: Invalid user niki from 138.68.106.62 port 50206
Jun 14 23:40:14 pixelmemory sshd[1491073]: Failed password for invalid user niki from 138.68.106.62 port 50206 ssh2
...
2020-06-15 15:11:14
77.158.71.118 attackspambots
(sshd) Failed SSH login from 77.158.71.118 (FR/France/118.71.158.77.rev.sfr.net): 5 in the last 3600 secs
2020-06-15 15:07:29
24.172.172.2 attackspambots
Jun 15 02:49:58 mail sshd\[45401\]: Invalid user teamspeak3-user from 24.172.172.2
Jun 15 02:49:58 mail sshd\[45401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.172.172.2
...
2020-06-15 15:38:45
138.68.94.142 attackspambots
Jun 15 08:14:58 ArkNodeAT sshd\[4757\]: Invalid user aap from 138.68.94.142
Jun 15 08:14:58 ArkNodeAT sshd\[4757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.94.142
Jun 15 08:14:59 ArkNodeAT sshd\[4757\]: Failed password for invalid user aap from 138.68.94.142 port 43336 ssh2
2020-06-15 15:19:39
119.28.129.37 attackspambots
Jun 15 05:53:00 santamaria sshd\[14130\]: Invalid user tunnel from 119.28.129.37
Jun 15 05:53:00 santamaria sshd\[14130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.129.37
Jun 15 05:53:01 santamaria sshd\[14130\]: Failed password for invalid user tunnel from 119.28.129.37 port 47320 ssh2
...
2020-06-15 15:30:04

最近上报的IP列表

220.95.64.104 3.14.41.72 23.97.180.45 208.59.69.99
192.254.133.72 201.177.128.220 88.109.118.105 171.14.254.164
185.109.80.234 180.76.108.151 222.94.163.36 217.55.121.70
191.35.78.72 54.119.254.46 189.151.223.94 235.69.13.52
180.126.220.217 171.245.194.1 94.182.189.212 163.142.212.2