必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): China Unicom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '175.42.160.0 - 175.42.175.255'

% Abuse contact for '175.42.160.0 - 175.42.175.255' is 'zhaoyz3@chinaunicom.cn'

inetnum:        175.42.160.0 - 175.42.175.255
netname:        UNICOM-FJ-SANMING-MAN
country:        CN
descr:          Sanming city, fujian provincial network of UNICOM
admin-c:        SM746-AP
tech-c:         SM746-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-CNCGROUP-FJ
mnt-lower:      MAINT-CN-SM28
last-modified:  2010-07-19T01:30:01Z
source:         APNIC

person:         SAN MING
nic-hdl:        SM746-AP
e-mail:         fj-xiaosl@chinaunicom.cn
address:        Sanming city, Fujian province, China
phone:          +86-598-5106174
fax-no:         +86-598-5109998
country:        CN
mnt-by:         MAINT-CNCGROUP-FJ
last-modified:  2013-03-25T00:52:02Z
source:         APNIC

% Information related to '175.42.0.0/15AS4837'

route:          175.42.0.0/15
descr:          China Unicom Fujian Province Network
country:        CN
origin:         AS4837
mnt-by:         MAINT-CNCGROUP-RR
last-modified:  2009-12-15T05:21:19Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 175.42.161.176
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45372
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;175.42.161.176.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030602 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 07 13:31:39 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 176.161.42.175.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 176.161.42.175.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
201.49.72.130 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-10-01/11-01]4pkt,1pt.(tcp)
2019-11-01 12:59:57
109.202.117.79 attack
ET SCAN Potential SSH Scan - port: 22 proto: TCP cat: Attempted Information Leak
2019-11-01 12:57:40
34.236.55.223 attack
Banned for posting to wp-login.php without referer {"log":"eboney","pwd":"eboney428","redirect_to":"http:\/\/stevenallrealtor.com\/admin\/","testcookie":"1","wp-submit":"Log In"}
2019-11-01 12:44:38
14.230.150.111 attackbots
Connection by 14.230.150.111 on port: 139 got caught by honeypot at 11/1/2019 3:56:12 AM
2019-11-01 12:54:08
125.212.214.228 attackspambots
1433/tcp 445/tcp...
[2019-09-11/11-01]12pkt,2pt.(tcp)
2019-11-01 13:08:01
154.73.141.217 attack
Automatic report - Port Scan Attack
2019-11-01 12:39:31
194.247.26.178 attackspam
slow and persistent scanner
2019-11-01 12:46:29
109.202.117.35 attackbots
ET SCAN Potential SSH Scan - port: 22 proto: TCP cat: Attempted Information Leak
2019-11-01 12:56:10
159.65.136.141 attack
2019-11-01T04:47:27.536858shield sshd\[9154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.136.141  user=root
2019-11-01T04:47:28.763949shield sshd\[9154\]: Failed password for root from 159.65.136.141 port 41354 ssh2
2019-11-01T04:51:47.742872shield sshd\[9441\]: Invalid user User from 159.65.136.141 port 51562
2019-11-01T04:51:47.747563shield sshd\[9441\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.136.141
2019-11-01T04:51:49.666448shield sshd\[9441\]: Failed password for invalid user User from 159.65.136.141 port 51562 ssh2
2019-11-01 12:55:52
221.162.255.86 attack
2019-11-01T04:49:50.867471abusebot-2.cloudsearch.cf sshd\[7033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.162.255.86  user=root
2019-11-01 13:03:50
46.38.144.32 attackspambots
Nov  1 05:27:02 relay postfix/smtpd\[15335\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  1 05:27:28 relay postfix/smtpd\[14862\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  1 05:28:11 relay postfix/smtpd\[10094\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  1 05:28:36 relay postfix/smtpd\[8853\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  1 05:29:18 relay postfix/smtpd\[10094\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-01 12:42:30
107.180.68.145 attackspam
Nov  1 01:09:58 HOST sshd[27294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-107-180-68-145.ip.secureserver.net
Nov  1 01:10:00 HOST sshd[27294]: Failed password for invalid user administrador from 107.180.68.145 port 48494 ssh2
Nov  1 01:10:00 HOST sshd[27294]: Received disconnect from 107.180.68.145: 11: Bye Bye [preauth]
Nov  1 01:21:48 HOST sshd[27647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-107-180-68-145.ip.secureserver.net
Nov  1 01:21:50 HOST sshd[27647]: Failed password for invalid user qe from 107.180.68.145 port 34486 ssh2
Nov  1 01:21:50 HOST sshd[27647]: Received disconnect from 107.180.68.145: 11: Bye Bye [preauth]
Nov  1 01:25:21 HOST sshd[27758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-107-180-68-145.ip.secureserver.net  user=r.r
Nov  1 01:25:23 HOST sshd[27758]: Failed password for r.r from 107.180.68.145........
-------------------------------
2019-11-01 12:50:50
122.248.32.54 attackspam
445/tcp 1433/tcp...
[2019-10-08/11-01]6pkt,2pt.(tcp)
2019-11-01 13:14:23
202.10.79.181 attack
1433/tcp 445/tcp...
[2019-09-02/11-01]10pkt,2pt.(tcp)
2019-11-01 13:09:00
167.71.223.191 attackbots
$f2bV_matches
2019-11-01 13:06:30

最近上报的IP列表

175.42.161.34 120.219.236.45 117.189.22.183 112.50.44.211
111.23.215.76 2606:4700:10::6814:8793 2606:4700:10::ac43:2795 2606:4700:10::6816:4075
2606:4700:10::6814:5944 2606:4700:10::6816:4852 2606:4700:10::6814:9777 110.78.156.130
2606:4700:10::6816:2624 2606:4700:10::6814:7532 164.155.74.110 129.204.3.225
129.204.3.94 129.204.3.108 121.43.116.19 103.116.123.197