必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Hong Kong

运营商(isp): Capital Online Data Service HK Co Ltd

主机名(hostname): unknown

机构(organization): Capitalonline Data Service Co.,LTD

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attack
May 24 05:41:23 web01.agentur-b-2.de postfix/smtpd[512662]: NOQUEUE: reject: RCPT from unknown[164.52.42.6]: 554 5.7.1 Service unavailable; Client host [164.52.42.6] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/164.52.42.6; from= to= proto=ESMTP helo=
May 24 05:41:24 web01.agentur-b-2.de postfix/smtpd[512662]: NOQUEUE: reject: RCPT from unknown[164.52.42.6]: 554 5.7.1 Service unavailable; Client host [164.52.42.6] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/164.52.42.6; from= to= proto=ESMTP helo=
May 24 05:41:30 web01.agentur-b-2.de postfix/smtpd[512662]: NOQUEUE: reject: RCPT from unknown[164.52.42.6]: 554 5.7.1 Service unavailable; Client host [164.52.42.6] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/16
2020-05-24 20:08:10
attackbotsspam
Unauthorized connection attempt from IP address 164.52.42.6 on Port 445(SMB)
2019-10-26 02:11:26
相同子网IP讨论:
IP 类型 评论内容 时间
164.52.42.134 attack
firewall-block, port(s): 1521/tcp
2019-11-21 21:50:49
164.52.42.134 attackbotsspam
11/11/2019-23:43:34.705122 164.52.42.134 Protocol: 6 ET SCAN Suspicious inbound to Oracle SQL port 1521
2019-11-12 07:22:49
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.52.42.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19469
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;164.52.42.6.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jun 02 22:05:07 CST 2019
;; MSG SIZE  rcvd: 115

HOST信息:
6.42.52.164.in-addr.arpa has no PTR record
NSLOOKUP信息:
;; Got SERVFAIL reply from 67.207.67.2, trying next server
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 6.42.52.164.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
111.229.48.141 attack
Failed password for invalid user sf from 111.229.48.141 port 38602 ssh2
Invalid user lgt from 111.229.48.141 port 39250
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.48.141
Failed password for invalid user lgt from 111.229.48.141 port 39250 ssh2
Invalid user yuhaohan from 111.229.48.141 port 39906
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.48.141
2020-05-23 12:22:09
193.112.74.169 attackspam
Invalid user ttx from 193.112.74.169 port 33714
2020-05-23 12:06:48
210.16.187.206 attackspam
Invalid user qxn from 210.16.187.206 port 52513
2020-05-23 12:39:12
201.26.18.43 attack
Invalid user admin from 201.26.18.43 port 62850
2020-05-23 12:41:56
122.51.120.99 attackbots
Invalid user ptao from 122.51.120.99 port 36544
2020-05-23 12:19:23
198.199.83.174 attack
$f2bV_matches
2020-05-23 12:43:04
182.61.12.58 attackbotsspam
Invalid user ife from 182.61.12.58 port 53914
2020-05-23 12:09:58
36.72.219.121 attack
Invalid user admin from 36.72.219.121 port 19126
2020-05-23 12:33:37
125.99.46.49 attackbotsspam
Invalid user qmj from 125.99.46.49 port 56296
2020-05-23 12:17:30
185.153.197.103 attackspam
firewall-block, port(s): 3390/tcp
2020-05-23 12:08:34
178.33.12.237 attackspam
Invalid user zko from 178.33.12.237 port 52831
2020-05-23 12:11:11
129.146.46.134 attackspam
May 23 06:15:14 h2829583 sshd[23056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.46.134
2020-05-23 12:16:56
188.254.0.160 attackbotsspam
Invalid user ggu from 188.254.0.160 port 41286
2020-05-23 12:08:15
138.68.57.143 attack
Invalid user webstaff from 138.68.57.143 port 53974
2020-05-23 12:16:18
122.226.78.182 attackbots
Invalid user gxb from 122.226.78.182 port 42616
2020-05-23 12:18:31

最近上报的IP列表

171.44.15.107 120.228.128.128 131.90.12.158 66.143.73.230
37.230.117.218 96.194.167.189 218.13.13.20 60.43.243.189
59.46.69.145 45.82.196.88 123.114.185.37 157.80.29.196
160.146.25.15 110.242.95.179 108.30.104.117 210.16.188.84
98.95.92.88 206.54.203.88 14.170.222.190 202.69.9.200