必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.80.209.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39196
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;158.80.209.42.			IN	A

;; AUTHORITY SECTION:
.			3255	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091301 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Sep 14 04:06:15 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
Host 42.209.80.158.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 42.209.80.158.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
84.253.49.98 attack
$f2bV_matches
2019-12-01 15:25:06
212.128.28.224 attackbotsspam
Nov 30 11:39:36 server sshd\[7232\]: Failed password for invalid user dietpi from 212.128.28.224 port 47768 ssh2
Dec  1 09:44:08 server sshd\[28962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpcd06.upct.es  user=nobody
Dec  1 09:44:10 server sshd\[28962\]: Failed password for nobody from 212.128.28.224 port 42982 ssh2
Dec  1 10:12:51 server sshd\[4270\]: Invalid user pi from 212.128.28.224
Dec  1 10:12:51 server sshd\[4270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpcd06.upct.es 
...
2019-12-01 15:12:57
177.102.17.169 attackbotsspam
Fail2Ban Ban Triggered
2019-12-01 15:43:29
73.59.165.164 attackbotsspam
2019-12-01T07:30:16.8588701240 sshd\[7309\]: Invalid user normayah from 73.59.165.164 port 35660
2019-12-01T07:30:16.8622661240 sshd\[7309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.59.165.164
2019-12-01T07:30:18.7745671240 sshd\[7309\]: Failed password for invalid user normayah from 73.59.165.164 port 35660 ssh2
...
2019-12-01 15:26:55
159.90.82.123 attackbotsspam
Dec  1 07:22:12 ns382633 sshd\[32053\]: Invalid user test from 159.90.82.123 port 54664
Dec  1 07:22:12 ns382633 sshd\[32053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.90.82.123
Dec  1 07:22:13 ns382633 sshd\[32053\]: Failed password for invalid user test from 159.90.82.123 port 54664 ssh2
Dec  1 08:03:18 ns382633 sshd\[7496\]: Invalid user test from 159.90.82.123 port 27684
Dec  1 08:03:18 ns382633 sshd\[7496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.90.82.123
2019-12-01 15:06:00
218.92.0.187 attackspambots
Dec  1 14:27:20 lcl-usvr-02 sshd[10500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.187  user=root
Dec  1 14:27:22 lcl-usvr-02 sshd[10500]: Failed password for root from 218.92.0.187 port 6781 ssh2
...
2019-12-01 15:31:23
222.186.180.9 attackbots
2019-12-01T07:40:02.618552abusebot-2.cloudsearch.cf sshd\[16431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.9  user=root
2019-12-01 15:44:58
91.11.70.81 attack
MYH,DEF GET /phpmyadmin/
2019-12-01 15:24:12
185.217.231.44 attackbotsspam
Lines containing failures of 185.217.231.44
Dec  1 07:14:08 omfg postfix/smtpd[11567]: connect from unknown[185.217.231.44]
Dec x@x
Dec  1 07:14:19 omfg postfix/smtpd[11567]: disconnect from unknown[185.217.231.44] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=185.217.231.44
2019-12-01 15:16:27
182.216.88.170 attackbots
Dec  1 07:30:20 mail sshd\[9453\]: Invalid user media from 182.216.88.170
Dec  1 07:30:21 mail sshd\[9453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.216.88.170
Dec  1 07:30:23 mail sshd\[9453\]: Failed password for invalid user media from 182.216.88.170 port 1809 ssh2
...
2019-12-01 15:16:49
123.21.137.180 attackbotsspam
Dec  1 07:18:01 xeon postfix/smtpd[57071]: warning: unknown[123.21.137.180]: SASL PLAIN authentication failed: authentication failure
2019-12-01 15:32:48
94.23.198.73 attackspam
Dec  1 06:37:38 wh01 sshd[28240]: Failed password for root from 94.23.198.73 port 37918 ssh2
Dec  1 06:37:38 wh01 sshd[28240]: Received disconnect from 94.23.198.73 port 37918:11: Bye Bye [preauth]
Dec  1 06:37:38 wh01 sshd[28240]: Disconnected from 94.23.198.73 port 37918 [preauth]
Dec  1 07:00:13 wh01 sshd[30038]: Invalid user admin from 94.23.198.73 port 38255
Dec  1 07:00:13 wh01 sshd[30038]: Failed password for invalid user admin from 94.23.198.73 port 38255 ssh2
Dec  1 07:00:13 wh01 sshd[30038]: Received disconnect from 94.23.198.73 port 38255:11: Bye Bye [preauth]
Dec  1 07:00:13 wh01 sshd[30038]: Disconnected from 94.23.198.73 port 38255 [preauth]
Dec  1 07:23:14 wh01 sshd[31705]: Invalid user admin from 94.23.198.73 port 34824
Dec  1 07:23:14 wh01 sshd[31705]: Failed password for invalid user admin from 94.23.198.73 port 34824 ssh2
Dec  1 07:23:14 wh01 sshd[31705]: Received disconnect from 94.23.198.73 port 34824:11: Bye Bye [preauth]
Dec  1 07:23:14 wh01 sshd[31705]: Disconne
2019-12-01 15:08:39
84.253.112.21 attack
[portscan] Port scan
2019-12-01 15:09:35
176.53.151.79 attack
Automatic report - Port Scan Attack
2019-12-01 15:40:55
188.213.49.60 attackbots
Dec  1 07:13:35 sip sshd[24366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.213.49.60
Dec  1 07:13:37 sip sshd[24366]: Failed password for invalid user ayako from 188.213.49.60 port 53928 ssh2
Dec  1 07:29:47 sip sshd[24476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.213.49.60
2019-12-01 15:47:09

最近上报的IP列表

94.3.44.45 188.113.162.171 95.4.71.79 139.68.94.53
83.202.60.140 72.221.232.153 193.29.57.25 162.252.57.209
78.178.126.83 27.2.137.169 219.85.68.50 212.83.162.39
202.29.224.82 185.172.110.238 183.99.103.72 167.71.193.237
148.72.211.251 61.186.27.124 219.3.145.180 139.99.27.243