必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 205.9.42.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1177
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;205.9.42.105.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 15:48:52 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 105.42.9.205.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 105.42.9.205.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
83.250.3.136 attackbots
Unauthorized connection attempt detected from IP address 83.250.3.136 to port 5555
2019-12-11 15:15:12
89.158.12.250 attackspam
Lines containing failures of 89.158.12.250
Dec 10 20:28:29 jarvis sshd[6830]: Invalid user guest from 89.158.12.250 port 61600
Dec 10 20:28:29 jarvis sshd[6830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.158.12.250 
Dec 10 20:28:31 jarvis sshd[6830]: Failed password for invalid user guest from 89.158.12.250 port 61600 ssh2
Dec 10 20:28:31 jarvis sshd[6830]: Received disconnect from 89.158.12.250 port 61600:11: Bye Bye [preauth]
Dec 10 20:28:31 jarvis sshd[6830]: Disconnected from invalid user guest 89.158.12.250 port 61600 [preauth]
Dec 10 20:36:46 jarvis sshd[8600]: Invalid user temp from 89.158.12.250 port 61218
Dec 10 20:36:46 jarvis sshd[8600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.158.12.250 
Dec 10 20:36:48 jarvis sshd[8600]: Failed password for invalid user temp from 89.158.12.250 port 61218 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=89.158.
2019-12-11 15:34:24
106.54.122.165 attack
Dec 11 07:30:20 lnxmysql61 sshd[7534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.122.165
2019-12-11 15:13:08
46.101.206.205 attack
2019-12-11T08:08:08.920552scmdmz1 sshd\[4523\]: Invalid user damienne from 46.101.206.205 port 52438
2019-12-11T08:08:08.924503scmdmz1 sshd\[4523\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.206.205
2019-12-11T08:08:10.895964scmdmz1 sshd\[4523\]: Failed password for invalid user damienne from 46.101.206.205 port 52438 ssh2
...
2019-12-11 15:30:44
152.172.233.234 attack
Dec 10 22:57:42 kmh-mb-001 sshd[9695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.172.233.234  user=r.r
Dec 10 22:57:44 kmh-mb-001 sshd[9695]: Failed password for r.r from 152.172.233.234 port 57434 ssh2
Dec 10 22:57:44 kmh-mb-001 sshd[9695]: Received disconnect from 152.172.233.234 port 57434:11: Bye Bye [preauth]
Dec 10 22:57:44 kmh-mb-001 sshd[9695]: Disconnected from 152.172.233.234 port 57434 [preauth]
Dec 10 22:58:31 kmh-mb-001 sshd[9810]: Invalid user balzer from 152.172.233.234 port 58710
Dec 10 22:58:31 kmh-mb-001 sshd[9810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.172.233.234
Dec 10 22:58:33 kmh-mb-001 sshd[9810]: Failed password for invalid user balzer from 152.172.233.234 port 58710 ssh2
Dec 10 22:58:33 kmh-mb-001 sshd[9810]: Received disconnect from 152.172.233.234 port 58710:11: Bye Bye [preauth]
Dec 10 22:58:33 kmh-mb-001 sshd[9810]: Disconnected from 152.........
-------------------------------
2019-12-11 15:45:40
80.82.77.245 attack
80.82.77.245 was recorded 54 times by 31 hosts attempting to connect to the following ports: 1064,1059,1069. Incident counter (4h, 24h, all-time): 54, 343, 12253
2019-12-11 15:16:29
186.212.183.95 attackspam
Unauthorized connection attempt detected from IP address 186.212.183.95 to port 445
2019-12-11 15:31:32
201.187.1.138 attack
Dec 11 08:35:28 andromeda sshd\[33997\]: Invalid user pi from 201.187.1.138 port 56796
Dec 11 08:35:28 andromeda sshd\[33998\]: Invalid user pi from 201.187.1.138 port 56794
Dec 11 08:35:28 andromeda sshd\[33997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.187.1.138
2019-12-11 15:38:05
81.22.45.80 attackspam
Dec 11 07:59:36 debian-2gb-nbg1-2 kernel: \[24329121.406117\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.80 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=24401 PROTO=TCP SPT=55629 DPT=3389 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-11 15:46:10
181.15.156.170 attackspam
Fail2Ban Ban Triggered
2019-12-11 15:28:14
82.200.226.226 attack
Dec 11 07:30:03 fr01 sshd[16405]: Invalid user geologi from 82.200.226.226
Dec 11 07:30:03 fr01 sshd[16405]: Invalid user geologi from 82.200.226.226
Dec 11 07:30:03 fr01 sshd[16405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.200.226.226
Dec 11 07:30:03 fr01 sshd[16405]: Invalid user geologi from 82.200.226.226
Dec 11 07:30:05 fr01 sshd[16405]: Failed password for invalid user geologi from 82.200.226.226 port 57898 ssh2
...
2019-12-11 15:15:35
114.35.225.117 attackspambots
firewall-block, port(s): 81/tcp
2019-12-11 15:11:54
58.49.58.199 attackspambots
firewall-block, port(s): 1433/tcp
2019-12-11 15:23:28
193.188.22.229 attackbots
2019-12-11T07:03:58.695578abusebot.cloudsearch.cf sshd\[19182\]: Invalid user maria from 193.188.22.229 port 45851
2019-12-11 15:47:41
125.230.220.43 attack
Host Scan
2019-12-11 15:49:30

最近上报的IP列表

184.4.186.43 203.58.86.51 33.184.77.16 74.99.214.132
120.105.109.70 66.151.117.18 246.197.239.6 170.96.111.91
179.65.132.39 254.207.212.201 123.123.76.250 125.213.235.223
70.6.185.167 125.139.249.83 180.122.193.92 120.206.13.59
200.88.25.78 206.180.223.99 7.188.254.171 24.82.243.181