必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.42.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48822
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.42.120.			IN	A

;; AUTHORITY SECTION:
.			299	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061200 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 12 20:15:01 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
120.42.226.137.in-addr.arpa domain name pointer eeltb120.llt.rwth-aachen.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
120.42.226.137.in-addr.arpa	name = eeltb120.llt.rwth-aachen.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
123.25.21.9 attackbots
1579074296 - 01/15/2020 08:44:56 Host: 123.25.21.9/123.25.21.9 Port: 445 TCP Blocked
2020-01-15 19:59:58
85.204.246.240 attackbotsspam
Fail2Ban Ban Triggered
2020-01-15 20:23:38
51.75.30.238 attack
Unauthorized connection attempt detected from IP address 51.75.30.238 to port 2220 [J]
2020-01-15 20:26:34
184.105.139.85 attackbotsspam
firewall-block, port(s): 1900/udp
2020-01-15 19:57:32
61.153.104.62 attackspambots
SIP/5060 Probe, BF, Hack -
2020-01-15 20:28:33
189.160.199.162 attackbotsspam
1579063549 - 01/15/2020 05:45:49 Host: 189.160.199.162/189.160.199.162 Port: 445 TCP Blocked
2020-01-15 20:09:57
103.17.39.140 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-01-15 20:22:09
125.167.85.225 attack
1579063568 - 01/15/2020 05:46:08 Host: 125.167.85.225/125.167.85.225 Port: 445 TCP Blocked
2020-01-15 19:53:10
145.239.90.235 attackbots
Unauthorized connection attempt detected from IP address 145.239.90.235 to port 2220 [J]
2020-01-15 20:27:07
104.131.97.47 attack
Unauthorized connection attempt detected from IP address 104.131.97.47 to port 2220 [J]
2020-01-15 20:13:01
118.97.147.204 attackbots
unauthorized connection attempt
2020-01-15 20:10:09
70.132.4.86 attackspambots
Automatic report generated by Wazuh
2020-01-15 20:29:12
117.4.247.211 attackbots
Unauthorized connection attempt from IP address 117.4.247.211 on Port 445(SMB)
2020-01-15 20:21:25
222.186.190.17 attackspambots
Jan 15 12:06:25 ip-172-31-62-245 sshd\[24161\]: Failed password for root from 222.186.190.17 port 61585 ssh2\
Jan 15 12:06:44 ip-172-31-62-245 sshd\[24163\]: Failed password for root from 222.186.190.17 port 16646 ssh2\
Jan 15 12:07:09 ip-172-31-62-245 sshd\[24165\]: Failed password for root from 222.186.190.17 port 44778 ssh2\
Jan 15 12:07:55 ip-172-31-62-245 sshd\[24174\]: Failed password for root from 222.186.190.17 port 57617 ssh2\
Jan 15 12:11:07 ip-172-31-62-245 sshd\[24275\]: Failed password for root from 222.186.190.17 port 33247 ssh2\
2020-01-15 20:25:21
103.192.78.178 attack
invalid login attempt
2020-01-15 20:13:23

最近上报的IP列表

137.226.42.237 137.226.42.73 137.226.43.240 137.226.57.224
137.226.43.243 137.226.44.194 137.226.41.153 137.226.41.148
137.226.41.217 137.226.40.170 137.226.40.147 137.226.112.214
137.226.40.238 137.226.47.168 137.226.63.124 137.226.40.116
137.226.44.216 137.226.39.197 122.163.120.67 178.128.220.81