必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Cyprus

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.42.131.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63375
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;194.42.131.45.			IN	A

;; AUTHORITY SECTION:
.			454	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040301 1800 900 604800 86400

;; Query time: 98 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 04 08:18:30 CST 2020
;; MSG SIZE  rcvd: 117
HOST信息:
45.131.42.194.in-addr.arpa domain name pointer cpe-437033.ip.primehome.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 45.131.42.194.in-addr.arpa.: No answer

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
113.214.0.89 attackbotsspam
Chat Spam
2019-09-20 07:05:11
209.17.96.2 attackspam
port scan and connect, tcp 8080 (http-proxy)
2019-09-20 07:16:18
143.0.58.173 attackbotsspam
Sep 19 12:28:25 web1 sshd\[25921\]: Invalid user multirode from 143.0.58.173
Sep 19 12:28:25 web1 sshd\[25921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.0.58.173
Sep 19 12:28:27 web1 sshd\[25921\]: Failed password for invalid user multirode from 143.0.58.173 port 20158 ssh2
Sep 19 12:33:17 web1 sshd\[26386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.0.58.173  user=mail
Sep 19 12:33:18 web1 sshd\[26386\]: Failed password for mail from 143.0.58.173 port 20924 ssh2
2019-09-20 06:51:13
159.89.162.118 attack
Sep 19 19:05:58 ny01 sshd[26561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.162.118
Sep 19 19:05:59 ny01 sshd[26561]: Failed password for invalid user podcast from 159.89.162.118 port 51382 ssh2
Sep 19 19:10:40 ny01 sshd[27397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.162.118
2019-09-20 07:27:07
213.142.212.214 attackbotsspam
Unauthorized connection attempt from IP address 213.142.212.214 on Port 445(SMB)
2019-09-20 06:46:25
123.30.249.104 attackbotsspam
Sep 19 12:41:18 web1 sshd\[27230\]: Invalid user 0101 from 123.30.249.104
Sep 19 12:41:18 web1 sshd\[27230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.249.104
Sep 19 12:41:20 web1 sshd\[27230\]: Failed password for invalid user 0101 from 123.30.249.104 port 40076 ssh2
Sep 19 12:46:19 web1 sshd\[27715\]: Invalid user zp from 123.30.249.104
Sep 19 12:46:19 web1 sshd\[27715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.249.104
2019-09-20 07:00:09
103.119.45.178 attack
port scan and connect, tcp 143 (imap)
2019-09-20 07:27:31
177.62.169.167 attackspam
Sep 20 02:31:51 webhost01 sshd[8920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.62.169.167
Sep 20 02:31:53 webhost01 sshd[8920]: Failed password for invalid user qhsupport from 177.62.169.167 port 57180 ssh2
...
2019-09-20 07:05:40
41.38.25.188 attack
Unauthorized connection attempt from IP address 41.38.25.188 on Port 445(SMB)
2019-09-20 07:35:03
132.232.58.52 attackbotsspam
Sep 19 23:46:10 microserver sshd[21641]: Invalid user password from 132.232.58.52 port 59362
Sep 19 23:46:10 microserver sshd[21641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.58.52
Sep 19 23:46:12 microserver sshd[21641]: Failed password for invalid user password from 132.232.58.52 port 59362 ssh2
Sep 19 23:51:08 microserver sshd[22416]: Invalid user qwerty from 132.232.58.52 port 44565
Sep 19 23:51:08 microserver sshd[22416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.58.52
Sep 20 00:05:58 microserver sshd[24488]: Invalid user qmfltmqjs!@#$ from 132.232.58.52 port 56657
Sep 20 00:05:58 microserver sshd[24488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.58.52
Sep 20 00:06:00 microserver sshd[24488]: Failed password for invalid user qmfltmqjs!@#$ from 132.232.58.52 port 56657 ssh2
Sep 20 00:11:08 microserver sshd[26177]: Invalid user RPM@123 from 132.2
2019-09-20 06:55:54
182.254.214.133 attackspam
Unauthorized connection attempt from IP address 182.254.214.133 on Port 445(SMB)
2019-09-20 07:24:30
51.89.41.78 attack
21 attempts against mh-misbehave-ban on hill.magehost.pro
2019-09-20 07:10:00
69.42.81.68 attackbots
Unauthorized connection attempt from IP address 69.42.81.68 on Port 445(SMB)
2019-09-20 06:54:46
5.201.161.162 attackspam
SMB Server BruteForce Attack
2019-09-20 06:49:03
37.252.72.240 attack
Unauthorized connection attempt from IP address 37.252.72.240 on Port 445(SMB)
2019-09-20 07:00:32

最近上报的IP列表

42.114.158.142 49.169.198.150 235.178.136.103 139.244.107.182
104.176.57.219 141.205.129.230 154.3.6.167 46.173.184.26
150.180.227.246 142.93.107.82 111.229.128.9 189.174.201.234
109.162.126.124 49.247.193.105 45.248.71.69 203.177.71.254
183.48.91.201 119.193.225.54 65.101.158.25 164.52.34.59