必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Rio de Janeiro

省份(region): Rio de Janeiro

国家(country): Brazil

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 191.200.194.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43648
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;191.200.194.42.			IN	A

;; AUTHORITY SECTION:
.			165	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020062001 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 21 07:29:00 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
42.194.200.191.in-addr.arpa domain name pointer 191-200-194-42.user.vivozap.com.br.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.194.200.191.in-addr.arpa	name = 191-200-194-42.user.vivozap.com.br.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.19.117.195 attackbotsspam
Port scanning [2 denied]
2020-06-24 15:20:58
141.98.81.207 attack
5x Failed Password
2020-06-24 15:54:01
49.83.184.219 attackspambots
$f2bV_matches
2020-06-24 15:17:51
112.116.200.244 attackbotsspam
Attempted connection to port 5555.
2020-06-24 15:55:05
210.183.46.232 attackspam
(sshd) Failed SSH login from 210.183.46.232 (KR/South Korea/-): 5 in the last 3600 secs
2020-06-24 15:15:04
218.92.0.171 attackspambots
Jun 24 09:53:48 vm1 sshd[28995]: Failed password for root from 218.92.0.171 port 19539 ssh2
Jun 24 09:54:02 vm1 sshd[28995]: error: maximum authentication attempts exceeded for root from 218.92.0.171 port 19539 ssh2 [preauth]
...
2020-06-24 15:56:16
221.156.126.1 attackbots
bruteforce detected
2020-06-24 15:16:52
138.204.100.70 attack
2020-06-24T03:54:16.326140randservbullet-proofcloud-66.localdomain sshd[24225]: Invalid user smbuser from 138.204.100.70 port 53212
2020-06-24T03:54:16.331143randservbullet-proofcloud-66.localdomain sshd[24225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.204.100.70
2020-06-24T03:54:16.326140randservbullet-proofcloud-66.localdomain sshd[24225]: Invalid user smbuser from 138.204.100.70 port 53212
2020-06-24T03:54:18.276178randservbullet-proofcloud-66.localdomain sshd[24225]: Failed password for invalid user smbuser from 138.204.100.70 port 53212 ssh2
...
2020-06-24 15:48:20
211.219.18.186 attack
Invalid user ct from 211.219.18.186 port 56858
2020-06-24 15:28:45
183.164.252.239 attack
Icarus honeypot on github
2020-06-24 15:40:13
112.85.42.194 attackspambots
Jun 24 08:29:12 [host] sshd[12796]: pam_unix(sshd:
Jun 24 08:29:14 [host] sshd[12796]: Failed passwor
Jun 24 08:29:16 [host] sshd[12796]: Failed passwor
2020-06-24 15:38:02
148.70.157.213 attack
Jun 24 05:54:54 debian-2gb-nbg1-2 kernel: \[15229561.848117\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=148.70.157.213 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=236 ID=42664 PROTO=TCP SPT=41856 DPT=19262 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-24 15:14:45
51.81.53.186 attackspam
Jun 24 06:53:59 ajax sshd[5716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.81.53.186 
Jun 24 06:54:00 ajax sshd[5716]: Failed password for invalid user amir from 51.81.53.186 port 60942 ssh2
2020-06-24 15:16:18
222.186.180.130 attackspam
Jun 24 03:28:50 NPSTNNYC01T sshd[6163]: Failed password for root from 222.186.180.130 port 35045 ssh2
Jun 24 03:28:59 NPSTNNYC01T sshd[6199]: Failed password for root from 222.186.180.130 port 17389 ssh2
...
2020-06-24 15:39:02
62.234.162.95 attackbotsspam
2020-06-24T07:34:07+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-06-24 15:48:41

最近上报的IP列表

221.56.44.5 38.75.9.40 182.35.64.77 191.98.24.215
32.39.215.43 212.55.93.18 14.63.32.52 101.8.149.137
171.57.237.89 101.51.134.192 123.183.71.167 52.222.3.73
78.102.27.156 188.97.144.66 116.74.25.101 188.126.142.80
176.234.220.117 130.199.133.0 168.77.155.54 123.54.226.194