必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 26.42.190.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45590
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;26.42.190.159.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022201 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 04:51:58 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 159.190.42.26.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 159.190.42.26.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.12.111.201 attack
Nov 17 15:32:09 vps666546 sshd\[2082\]: Invalid user colnago from 106.12.111.201 port 58184
Nov 17 15:32:09 vps666546 sshd\[2082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.111.201
Nov 17 15:32:11 vps666546 sshd\[2082\]: Failed password for invalid user colnago from 106.12.111.201 port 58184 ssh2
Nov 17 15:37:34 vps666546 sshd\[2185\]: Invalid user slackware from 106.12.111.201 port 35262
Nov 17 15:37:34 vps666546 sshd\[2185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.111.201
...
2019-11-18 04:45:15
43.225.151.142 attack
Nov 17 15:29:59 ns382633 sshd\[25994\]: Invalid user refunds from 43.225.151.142 port 53773
Nov 17 15:29:59 ns382633 sshd\[25994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.225.151.142
Nov 17 15:30:01 ns382633 sshd\[25994\]: Failed password for invalid user refunds from 43.225.151.142 port 53773 ssh2
Nov 17 15:36:35 ns382633 sshd\[27560\]: Invalid user allah from 43.225.151.142 port 49525
Nov 17 15:36:35 ns382633 sshd\[27560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.225.151.142
2019-11-18 05:10:24
106.12.181.34 attack
Nov 17 17:02:23 124388 sshd[31587]: Failed password for root from 106.12.181.34 port 61673 ssh2
Nov 17 17:06:21 124388 sshd[31612]: Invalid user host from 106.12.181.34 port 40424
Nov 17 17:06:21 124388 sshd[31612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.181.34
Nov 17 17:06:21 124388 sshd[31612]: Invalid user host from 106.12.181.34 port 40424
Nov 17 17:06:23 124388 sshd[31612]: Failed password for invalid user host from 106.12.181.34 port 40424 ssh2
2019-11-18 04:48:47
49.150.132.240 attackbotsspam
Port Scan: TCP/23
2019-11-18 05:10:03
45.181.38.180 attack
Telnet/23 MH Probe, BF, Hack -
2019-11-18 04:51:24
222.142.196.180 attack
19/11/17@09:36:14: FAIL: IoT-Telnet address from=222.142.196.180
...
2019-11-18 05:19:11
67.174.104.7 attackspambots
Nov 17 05:04:30 sachi sshd\[16639\]: Invalid user mirror02 from 67.174.104.7
Nov 17 05:04:30 sachi sshd\[16639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-67-174-104-7.hsd1.co.comcast.net
Nov 17 05:04:32 sachi sshd\[16639\]: Failed password for invalid user mirror02 from 67.174.104.7 port 35768 ssh2
Nov 17 05:08:21 sachi sshd\[16966\]: Invalid user nakazawa from 67.174.104.7
Nov 17 05:08:21 sachi sshd\[16966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-67-174-104-7.hsd1.co.comcast.net
2019-11-18 04:46:55
1.54.14.111 attack
port scan and connect, tcp 23 (telnet)
2019-11-18 05:16:14
140.143.196.66 attack
Nov 17 21:18:05 ns381471 sshd[18104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.196.66
Nov 17 21:18:07 ns381471 sshd[18104]: Failed password for invalid user squid from 140.143.196.66 port 47734 ssh2
2019-11-18 05:21:42
118.89.35.251 attackbots
Nov 17 06:04:20 hpm sshd\[9129\]: Invalid user angel from 118.89.35.251
Nov 17 06:04:20 hpm sshd\[9129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.35.251
Nov 17 06:04:22 hpm sshd\[9129\]: Failed password for invalid user angel from 118.89.35.251 port 35742 ssh2
Nov 17 06:08:39 hpm sshd\[9477\]: Invalid user lukshun from 118.89.35.251
Nov 17 06:08:39 hpm sshd\[9477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.35.251
2019-11-18 04:56:39
123.131.165.10 attack
ThinkPHP Remote Code Execution Vulnerability, PTR: PTR record not found
2019-11-18 04:47:41
45.227.253.210 attackbotsspam
Nov 17 21:47:20 relay postfix/smtpd\[24002\]: warning: unknown\[45.227.253.210\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 17 21:47:27 relay postfix/smtpd\[26733\]: warning: unknown\[45.227.253.210\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 17 21:50:55 relay postfix/smtpd\[26717\]: warning: unknown\[45.227.253.210\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 17 21:51:02 relay postfix/smtpd\[24003\]: warning: unknown\[45.227.253.210\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 17 21:57:29 relay postfix/smtpd\[24002\]: warning: unknown\[45.227.253.210\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-18 04:58:59
92.118.38.38 attackspam
Nov 17 21:38:22 webserver postfix/smtpd\[25477\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 17 21:38:58 webserver postfix/smtpd\[25477\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 17 21:39:33 webserver postfix/smtpd\[25475\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 17 21:40:09 webserver postfix/smtpd\[23850\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 17 21:40:44 webserver postfix/smtpd\[25530\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-18 04:52:54
68.183.193.46 attack
Automatic report - Banned IP Access
2019-11-18 04:58:01
89.37.100.98 attack
89.37.100.98 was recorded 11 times by 1 hosts attempting to connect to the following ports: 82,8080,88. Incident counter (4h, 24h, all-time): 11, 38, 62
2019-11-18 04:57:45

最近上报的IP列表

156.118.133.147 143.45.3.141 232.40.66.202 131.210.252.65
207.121.254.162 31.65.192.253 36.107.118.63 97.151.147.253
205.207.165.109 137.159.165.67 41.238.206.68 136.146.161.216
238.159.40.56 186.247.65.69 205.227.112.236 138.107.236.200
241.232.200.92 104.46.39.80 247.80.130.52 21.154.251.116