必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.131.79.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21892
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.131.79.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 20:15:45 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
42.79.131.145.in-addr.arpa domain name pointer rt79bb131-145-42.routit.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.79.131.145.in-addr.arpa	name = rt79bb131-145-42.routit.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
31.14.40.111 attackspambots
123/udp
[2020-05-30]1pkt
2020-05-30 14:56:34
190.109.84.219 attackbots
persona non grata
2020-05-30 14:37:36
118.89.108.37 attack
k+ssh-bruteforce
2020-05-30 14:36:00
95.59.112.106 attack
Email rejected due to spam filtering
2020-05-30 14:35:03
58.210.190.30 attackspam
May 29 19:59:43 kapalua sshd\[516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.210.190.30  user=root
May 29 19:59:44 kapalua sshd\[516\]: Failed password for root from 58.210.190.30 port 39536 ssh2
May 29 20:02:47 kapalua sshd\[743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.210.190.30  user=root
May 29 20:02:49 kapalua sshd\[743\]: Failed password for root from 58.210.190.30 port 48344 ssh2
May 29 20:06:15 kapalua sshd\[1045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.210.190.30  user=root
2020-05-30 14:20:59
64.119.197.105 attackbots
(imapd) Failed IMAP login from 64.119.197.105 (BB/Barbados/-): 1 in the last 3600 secs
2020-05-30 14:49:29
42.103.52.101 attack
Invalid user guest5 from 42.103.52.101 port 39498
2020-05-30 14:22:19
218.92.0.158 attack
May 30 08:29:57 vmi345603 sshd[2681]: Failed password for root from 218.92.0.158 port 15166 ssh2
May 30 08:30:00 vmi345603 sshd[2681]: Failed password for root from 218.92.0.158 port 15166 ssh2
...
2020-05-30 14:50:42
120.28.157.165 attackspam
(imapd) Failed IMAP login from 120.28.157.165 (PH/Philippines/-): 1 in the last 3600 secs
2020-05-30 14:40:07
59.124.106.85 attackspambots
20/5/30@00:16:24: FAIL: Alarm-Network address from=59.124.106.85
20/5/30@00:16:24: FAIL: Alarm-Network address from=59.124.106.85
...
2020-05-30 14:43:58
113.167.172.117 attack
Email rejected due to spam filtering
2020-05-30 14:59:11
189.28.165.140 attackbots
May 30 06:04:58 h2779839 sshd[30601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.28.165.140  user=root
May 30 06:05:00 h2779839 sshd[30601]: Failed password for root from 189.28.165.140 port 58283 ssh2
May 30 06:08:07 h2779839 sshd[30684]: Invalid user fnjoroge from 189.28.165.140 port 51743
May 30 06:08:07 h2779839 sshd[30684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.28.165.140
May 30 06:08:07 h2779839 sshd[30684]: Invalid user fnjoroge from 189.28.165.140 port 51743
May 30 06:08:08 h2779839 sshd[30684]: Failed password for invalid user fnjoroge from 189.28.165.140 port 51743 ssh2
May 30 06:11:28 h2779839 sshd[30851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.28.165.140  user=root
May 30 06:11:30 h2779839 sshd[30851]: Failed password for root from 189.28.165.140 port 45202 ssh2
May 30 06:14:49 h2779839 sshd[30929]: pam_unix(sshd:auth): 
...
2020-05-30 14:31:40
91.215.22.145 attack
port scan and connect, tcp 23 (telnet)
2020-05-30 14:24:11
91.121.211.59 attackspambots
2020-05-30T07:23:28.347257lavrinenko.info sshd[7206]: Failed password for invalid user mario from 91.121.211.59 port 43142 ssh2
2020-05-30T07:25:19.646384lavrinenko.info sshd[7280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.211.59  user=root
2020-05-30T07:25:21.303905lavrinenko.info sshd[7280]: Failed password for root from 91.121.211.59 port 47432 ssh2
2020-05-30T07:27:09.192264lavrinenko.info sshd[7321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.211.59  user=root
2020-05-30T07:27:10.950147lavrinenko.info sshd[7321]: Failed password for root from 91.121.211.59 port 51720 ssh2
...
2020-05-30 14:26:49
85.209.0.103 attack
"Unauthorized connection attempt on SSHD detected"
2020-05-30 14:39:15

最近上报的IP列表

163.141.26.57 167.8.188.65 159.21.16.176 142.218.220.100
8.103.89.173 27.219.108.79 215.132.206.117 209.119.32.150
54.134.179.27 168.135.11.194 91.93.155.184 8.194.198.26
67.240.165.244 132.133.143.227 12.83.232.164 146.203.176.160
205.103.147.190 48.146.145.6 242.133.32.16 36.218.102.248