必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.42.123.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61119
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.42.123.6.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 19:50:26 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 6.123.42.159.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 6.123.42.159.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
60.48.219.174 attackbotsspam
Invalid user wtj from 60.48.219.174 port 40744
2020-04-04 05:06:45
5.88.161.197 attack
Invalid user clu from 5.88.161.197 port 37019
2020-04-04 05:18:38
200.209.145.251 attack
$f2bV_matches
2020-04-04 05:24:29
193.112.219.207 attackspam
SSH bruteforce
2020-04-04 05:26:33
49.234.216.52 attackbotsspam
Apr  3 16:59:43 srv206 sshd[27399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.216.52  user=root
Apr  3 16:59:46 srv206 sshd[27399]: Failed password for root from 49.234.216.52 port 34204 ssh2
Apr  3 17:13:20 srv206 sshd[27471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.216.52  user=root
Apr  3 17:13:22 srv206 sshd[27471]: Failed password for root from 49.234.216.52 port 35082 ssh2
...
2020-04-04 05:14:05
51.83.77.154 attackbots
Automatic report - SSH Brute-Force Attack
2020-04-04 05:10:44
106.54.82.34 attackbotsspam
$f2bV_matches
2020-04-04 04:53:36
80.211.45.85 attackbots
sshd jail - ssh hack attempt
2020-04-04 05:04:51
218.2.69.76 attackspambots
Invalid user admin from 218.2.69.76 port 60836
2020-04-04 05:20:42
85.172.38.232 attackbots
SSH Brute Force
2020-04-04 05:03:33
185.38.3.138 attackbotsspam
Total attacks: 4
2020-04-04 05:29:35
185.132.53.121 attackspam
Invalid user ubnt from 185.132.53.121 port 39550
2020-04-04 05:28:47
200.116.105.213 attackbotsspam
2020-04-03T22:40:47.936961ns386461 sshd\[32635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=conm200-116-105-213.epm.net.co  user=root
2020-04-03T22:40:49.870549ns386461 sshd\[32635\]: Failed password for root from 200.116.105.213 port 36960 ssh2
2020-04-03T22:47:42.268304ns386461 sshd\[6307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=conm200-116-105-213.epm.net.co  user=root
2020-04-03T22:47:43.839589ns386461 sshd\[6307\]: Failed password for root from 200.116.105.213 port 38326 ssh2
2020-04-03T22:48:33.162416ns386461 sshd\[7102\]: Invalid user dy from 200.116.105.213 port 50528
2020-04-03T22:48:33.167140ns386461 sshd\[7102\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=conm200-116-105-213.epm.net.co
...
2020-04-04 05:24:43
51.89.68.141 attack
Apr  3 23:01:41 server sshd[22426]: Failed password for root from 51.89.68.141 port 36050 ssh2
Apr  3 23:05:11 server sshd[23458]: Failed password for root from 51.89.68.141 port 46872 ssh2
Apr  3 23:08:29 server sshd[24340]: Failed password for invalid user admin from 51.89.68.141 port 56334 ssh2
2020-04-04 05:10:22
59.17.76.211 attackspambots
Invalid user pi from 59.17.76.211 port 57892
2020-04-04 05:07:12

最近上报的IP列表

156.4.193.201 63.180.252.49 202.62.25.215 222.173.151.109
155.235.44.141 123.175.67.135 218.100.13.217 62.128.169.220
245.47.92.217 31.159.9.70 7.90.73.168 139.207.36.52
170.89.126.246 231.14.80.173 98.209.78.120 70.39.118.85
106.51.48.161 215.78.52.106 66.101.15.211 207.114.210.71