必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 171.164.40.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50097
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;171.164.40.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012800 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 28 21:17:32 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 42.40.164.171.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.40.164.171.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
180.248.121.99 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:05:55.
2019-09-28 04:20:27
118.96.138.242 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:05:36.
2019-09-28 04:45:27
54.39.145.31 attackspam
Sep 27 14:18:25 s64-1 sshd[7538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.145.31
Sep 27 14:18:27 s64-1 sshd[7538]: Failed password for invalid user shang123 from 54.39.145.31 port 46044 ssh2
Sep 27 14:22:41 s64-1 sshd[7639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.145.31
...
2019-09-28 04:19:22
179.178.88.72 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:05:51.
2019-09-28 04:25:59
175.107.41.31 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:05:46.
2019-09-28 04:31:31
177.75.49.36 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:05:49.
2019-09-28 04:28:09
182.151.200.64 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:05:55.
2019-09-28 04:20:08
112.133.229.70 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:05:27.
2019-09-28 04:55:32
222.186.180.9 attackbotsspam
Sep 27 22:06:17 SilenceServices sshd[30490]: Failed password for root from 222.186.180.9 port 48950 ssh2
Sep 27 22:06:34 SilenceServices sshd[30490]: error: maximum authentication attempts exceeded for root from 222.186.180.9 port 48950 ssh2 [preauth]
Sep 27 22:06:44 SilenceServices sshd[30766]: Failed password for root from 222.186.180.9 port 38952 ssh2
2019-09-28 04:24:50
176.59.138.227 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:05:48.
2019-09-28 04:29:35
106.13.6.113 attack
2019-09-27T14:21:48.3047391495-001 sshd\[3532\]: Failed password for invalid user ny from 106.13.6.113 port 44770 ssh2
2019-09-27T14:36:20.5646341495-001 sshd\[5041\]: Invalid user owncloud from 106.13.6.113 port 56302
2019-09-27T14:36:20.5760171495-001 sshd\[5041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.113
2019-09-27T14:36:22.4138371495-001 sshd\[5041\]: Failed password for invalid user owncloud from 106.13.6.113 port 56302 ssh2
2019-09-27T14:40:58.9162381495-001 sshd\[5498\]: Invalid user aguero from 106.13.6.113 port 60132
2019-09-27T14:40:58.9252361495-001 sshd\[5498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.113
...
2019-09-28 04:28:23
198.50.197.223 attackbotsspam
Sep 27 10:34:35 sachi sshd\[17673\]: Invalid user web from 198.50.197.223
Sep 27 10:34:35 sachi sshd\[17673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip223.ip-198-50-197.net
Sep 27 10:34:37 sachi sshd\[17673\]: Failed password for invalid user web from 198.50.197.223 port 34020 ssh2
Sep 27 10:38:27 sachi sshd\[17979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip223.ip-198-50-197.net  user=sys
Sep 27 10:38:29 sachi sshd\[17979\]: Failed password for sys from 198.50.197.223 port 53617 ssh2
2019-09-28 04:39:59
125.167.108.143 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:05:40.
2019-09-28 04:38:27
119.18.154.235 attackbotsspam
Automated report - ssh fail2ban:
Sep 27 21:36:36 authentication failure 
Sep 27 21:36:38 wrong password, user=admin1, port=44077, ssh2
Sep 27 21:41:13 authentication failure
2019-09-28 04:29:20
134.73.76.177 attack
Spam mails sent to address hacked/leaked from Nexus Mods in July 2013
2019-09-28 04:20:51

最近上报的IP列表

56.161.97.96 167.125.202.9 185.195.117.113 6.238.17.18
255.18.105.40 7.108.168.185 151.45.223.224 241.119.217.28
136.154.197.153 94.106.72.163 123.182.30.32 12.102.112.31
53.170.17.103 199.28.130.5 190.188.225.94 117.32.76.9
78.166.126.184 33.64.36.46 143.240.119.252 52.139.198.219