必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 168.42.134.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34951
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;168.42.134.1.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021101 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 05:30:37 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 1.134.42.168.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 1.134.42.168.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
200.23.18.19 attackbots
Fail2Ban Ban Triggered
2019-11-08 07:08:52
45.227.253.141 attack
2019-11-0800:13:50dovecot_loginauthenticatorfailedfor\([45.227.253.141]\)[45.227.253.141]:19064:535Incorrectauthenticationdata\(set_id=oere@globalgame.ch\)2019-11-0800:13:58dovecot_loginauthenticatorfailedfor\([45.227.253.141]\)[45.227.253.141]:6046:535Incorrectauthenticationdata\(set_id=oere\)2019-11-0800:18:14dovecot_loginauthenticatorfailedfor\([45.227.253.141]\)[45.227.253.141]:28612:535Incorrectauthenticationdata\(set_id=satellite@modesti.it\)2019-11-0800:18:22dovecot_loginauthenticatorfailedfor\([45.227.253.141]\)[45.227.253.141]:60048:535Incorrectauthenticationdata\(set_id=satellite\)2019-11-0800:27:04dovecot_loginauthenticatorfailedfor\([45.227.253.141]\)[45.227.253.141]:41106:535Incorrectauthenticationdata\(set_id=hle@bno.ch\)2019-11-0800:27:14dovecot_loginauthenticatorfailedfor\([45.227.253.141]\)[45.227.253.141]:31154:535Incorrectauthenticationdata\(set_id=hle\)2019-11-0800:35:36dovecot_loginauthenticatorfailedfor\([45.227.253.141]\)[45.227.253.141]:41386:535Incorrectauthenticationdata\(set_id=info
2019-11-08 07:41:17
202.5.17.107 attackbots
Nov  7 12:36:32 eddieflores sshd\[416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.5.17.107  user=root
Nov  7 12:36:34 eddieflores sshd\[416\]: Failed password for root from 202.5.17.107 port 42018 ssh2
Nov  7 12:40:11 eddieflores sshd\[826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.5.17.107  user=root
Nov  7 12:40:13 eddieflores sshd\[826\]: Failed password for root from 202.5.17.107 port 27371 ssh2
Nov  7 12:43:47 eddieflores sshd\[1142\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.5.17.107  user=root
2019-11-08 07:11:58
103.7.58.17 attackbots
Automatic report - Web App Attack
2019-11-08 07:37:06
138.68.89.76 attackbots
Nov  7 17:43:13 plusreed sshd[17821]: Invalid user tom from 138.68.89.76
...
2019-11-08 07:40:44
84.245.121.98 attack
Nov  7 23:34:49 mxgate1 postfix/postscreen[18656]: CONNECT from [84.245.121.98]:20245 to [176.31.12.44]:25
Nov  7 23:34:49 mxgate1 postfix/dnsblog[18660]: addr 84.245.121.98 listed by domain zen.spamhaus.org as 127.0.0.11
Nov  7 23:34:49 mxgate1 postfix/dnsblog[18660]: addr 84.245.121.98 listed by domain zen.spamhaus.org as 127.0.0.4
Nov  7 23:34:49 mxgate1 postfix/dnsblog[18661]: addr 84.245.121.98 listed by domain cbl.abuseat.org as 127.0.0.2
Nov  7 23:34:49 mxgate1 postfix/dnsblog[18657]: addr 84.245.121.98 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Nov  7 23:34:49 mxgate1 postfix/dnsblog[18659]: addr 84.245.121.98 listed by domain bl.spamcop.net as 127.0.0.2
Nov  7 23:34:49 mxgate1 postfix/dnsblog[18658]: addr 84.245.121.98 listed by domain b.barracudacentral.org as 127.0.0.2
Nov  7 23:34:55 mxgate1 postfix/postscreen[18656]: DNSBL rank 6 for [84.245.121.98]:20245
Nov x@x
Nov  7 23:34:56 mxgate1 postfix/postscreen[18656]: HANGUP after 0.23 from [84.245.121.98........
-------------------------------
2019-11-08 07:20:18
51.83.71.72 attack
Nov  8 00:06:44 mail postfix/smtpd[6098]: warning: 72.ip-51-83-71.eu[51.83.71.72]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  8 00:10:01 mail postfix/smtpd[15534]: warning: 72.ip-51-83-71.eu[51.83.71.72]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  8 00:10:01 mail postfix/smtpd[15245]: warning: 72.ip-51-83-71.eu[51.83.71.72]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  8 00:10:01 mail postfix/smtpd[15241]: warning: 72.ip-51-83-71.eu[51.83.71.72]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  8 00:10:01 mail postfix/smtpd[16989]: warning: 72.ip-51-83-71.eu[51.83.71.72]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  8 00:10:49 mail postfix/smtpd[32411]: warning: 72.ip-51-83-71.eu[51.83.71.72]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-08 07:42:21
223.247.213.245 attack
SSH brutforce
2019-11-08 07:39:57
46.201.138.107 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/46.201.138.107/ 
 
 UA - 1H : (45)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : UA 
 NAME ASN : ASN6849 
 
 IP : 46.201.138.107 
 
 CIDR : 46.201.138.0/23 
 
 PREFIX COUNT : 1366 
 
 UNIQUE IP COUNT : 1315840 
 
 
 ATTACKS DETECTED ASN6849 :  
  1H - 2 
  3H - 3 
  6H - 5 
 12H - 11 
 24H - 19 
 
 DateTime : 2019-11-07 23:43:20 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-08 07:34:38
104.131.96.177 attack
SSH Brute Force, server-1 sshd[29945]: Failed password for root from 104.131.96.177 port 49540 ssh2
2019-11-08 07:10:32
142.93.137.22 attack
SSH bruteforce
2019-11-08 07:18:44
192.210.56.146 attackspam
Automatic report - XMLRPC Attack
2019-11-08 07:35:46
198.108.67.43 attack
11/07/2019-17:43:42.170810 198.108.67.43 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-08 07:18:13
218.92.0.200 attackspambots
Nov  7 23:18:06 venus sshd\[2487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.200  user=root
Nov  7 23:18:08 venus sshd\[2487\]: Failed password for root from 218.92.0.200 port 18435 ssh2
Nov  7 23:18:10 venus sshd\[2487\]: Failed password for root from 218.92.0.200 port 18435 ssh2
...
2019-11-08 07:22:17
95.58.221.134 attack
forum spam (documents)
2019-11-08 07:33:25

最近上报的IP列表

36.69.186.128 34.215.100.216 44.84.65.14 147.31.158.114
237.212.205.102 47.121.102.158 218.206.219.62 132.96.178.76
37.191.135.83 187.32.107.39 51.177.106.140 20.71.189.83
28.54.109.76 188.121.252.101 173.134.90.243 239.150.168.97
14.178.197.212 122.147.185.22 201.227.149.73 82.57.94.73