必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Slovenia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.8.42.101
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31129
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.8.42.101.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 14:46:27 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
101.42.8.164.in-addr.arpa is an alias for 101.0-25.42.8.164.in-addr.arpa.
101.0-25.42.8.164.in-addr.arpa domain name pointer centraliiskemp.um.si.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
101.42.8.164.in-addr.arpa	canonical name = 101.0-25.42.8.164.in-addr.arpa.
101.0-25.42.8.164.in-addr.arpa	name = centraliiskemp.um.si.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
198.20.99.130 attack
" "
2019-06-26 09:08:02
103.221.222.251 attackspam
TCP src-port=59470   dst-port=25    dnsbl-sorbs abuseat-org spamcop         (1372)
2019-06-26 09:30:35
125.64.94.221 attackbots
scan z
2019-06-26 09:12:13
144.217.85.183 attackspam
Jun 26 00:42:27 ip-172-31-62-245 sshd\[11342\]: Failed password for root from 144.217.85.183 port 37962 ssh2\
Jun 26 00:45:40 ip-172-31-62-245 sshd\[11383\]: Invalid user esbuser from 144.217.85.183\
Jun 26 00:45:42 ip-172-31-62-245 sshd\[11383\]: Failed password for invalid user esbuser from 144.217.85.183 port 56248 ssh2\
Jun 26 00:48:07 ip-172-31-62-245 sshd\[11422\]: Invalid user steam from 144.217.85.183\
Jun 26 00:48:10 ip-172-31-62-245 sshd\[11422\]: Failed password for invalid user steam from 144.217.85.183 port 36575 ssh2\
2019-06-26 09:10:23
191.240.67.150 attackbotsspam
SMTP-sasl brute force
...
2019-06-26 09:40:03
168.228.150.230 attackspam
failed_logins
2019-06-26 09:45:57
168.232.18.2 attackspambots
Jun 25 23:21:42 [host] sshd[506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.232.18.2  user=root
Jun 25 23:21:45 [host] sshd[506]: Failed password for root from 168.232.18.2 port 53922 ssh2
Jun 25 23:23:42 [host] sshd[532]: Invalid user deploy from 168.232.18.2
Jun 25 23:23:42 [host] sshd[532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.232.18.2
2019-06-26 09:15:49
193.32.163.74 attackbots
CloudCIX Reconnaissance Scan Detected, PTR: hosting-by.cloud-home.me.
2019-06-26 09:09:57
111.173.112.13 attackbotsspam
2019-06-25 x@x
2019-06-25 x@x
2019-06-25 x@x
2019-06-25 x@x
2019-06-25 x@x
2019-06-25 x@x
2019-06-25 x@x
2019-06-25 x@x
2019-06-25 x@x
2019-06-25 x@x
2019-06-25 x@x
2019-06-25 x@x
2019-06-25 x@x
2019-06-25 x@x
2019-06-25 x@x
2019-06-25 x@x
2019-06-25 x@x
2019-06-25 x@x
2019-06-25 x@x
2019-06-25 x@x

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=111.173.112.13
2019-06-26 09:46:25
58.242.83.30 attackbotsspam
2019-06-26T03:00:42.125488test01.cajus.name sshd\[373\]: Failed password for root from 58.242.83.30 port 33353 ssh2
2019-06-26T03:14:57.385383test01.cajus.name sshd\[5345\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.242.83.30  user=root
2019-06-26T03:14:59.387103test01.cajus.name sshd\[5345\]: Failed password for root from 58.242.83.30 port 24101 ssh2
2019-06-26 09:29:46
185.176.26.61 attackspam
Port scan on 17 port(s): 84 1033 3378 3380 3402 3500 4000 4410 5004 5358 5432 7410 7777 13170 33752 33811 40002
2019-06-26 09:47:57
185.176.26.104 attack
25.06.2019 23:36:43 Connection to port 3330 blocked by firewall
2019-06-26 09:19:38
177.128.142.130 attackbots
SMTP-sasl brute force
...
2019-06-26 09:34:13
5.90.98.81 attackbots
SS5,WP GET /wp-login.php
2019-06-26 09:07:20
188.173.80.134 attack
Jun 26 01:29:37 lnxmail61 sshd[21970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.173.80.134
Jun 26 01:29:37 lnxmail61 sshd[21970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.173.80.134
2019-06-26 09:27:35

最近上报的IP列表

164.77.54.126 164.88.107.80 164.88.74.78 164.81.1.97
164.88.185.10 164.90.128.154 164.88.107.31 164.90.129.28
164.90.137.188 164.90.135.195 164.90.136.177 164.90.130.191
164.88.74.77 164.90.137.250 164.88.150.113 164.90.130.23
164.90.139.124 164.90.140.54 164.90.146.106 164.90.140.112