必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Hasuda

省份(region): Saitama

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 27.137.207.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11490
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;27.137.207.42.			IN	A

;; AUTHORITY SECTION:
.			284	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020032601 1800 900 604800 86400

;; Query time: 96 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 27 05:36:06 CST 2020
;; MSG SIZE  rcvd: 117
HOST信息:
42.207.137.27.in-addr.arpa domain name pointer 27-137-207-42.rev.home.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.207.137.27.in-addr.arpa	name = 27-137-207-42.rev.home.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
84.54.79.213 attackspam
Oct 19 13:54:05 mxgate1 postfix/postscreen[17805]: CONNECT from [84.54.79.213]:62929 to [176.31.12.44]:25
Oct 19 13:54:05 mxgate1 postfix/dnsblog[18067]: addr 84.54.79.213 listed by domain zen.spamhaus.org as 127.0.0.11
Oct 19 13:54:05 mxgate1 postfix/dnsblog[18067]: addr 84.54.79.213 listed by domain zen.spamhaus.org as 127.0.0.4
Oct 19 13:54:05 mxgate1 postfix/dnsblog[18068]: addr 84.54.79.213 listed by domain cbl.abuseat.org as 127.0.0.2
Oct 19 13:54:05 mxgate1 postfix/postscreen[17805]: PREGREET 21 after 0.15 from [84.54.79.213]:62929: EHLO [84.54.79.213]

Oct 19 13:54:05 mxgate1 postfix/dnsblog[18065]: addr 84.54.79.213 listed by domain b.barracudacentral.org as 127.0.0.2
Oct 19 13:54:07 mxgate1 postfix/postscreen[17805]: DNSBL rank 4 for [84.54.79.213]:62929
Oct x@x
Oct 19 13:54:07 mxgate1 postfix/postscreen[17805]: HANGUP after 0.44 from [84.54.79.213]:62929 in tests after SMTP handshake
Oct 19 13:54:07 mxgate1 postfix/postscreen[17805]: DISCONNECT [84.54.79.213]........
-------------------------------
2019-10-19 23:22:40
198.44.179.92 attack
Oct 19 04:31:14 web9 sshd\[25217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.44.179.92  user=root
Oct 19 04:31:16 web9 sshd\[25217\]: Failed password for root from 198.44.179.92 port 47543 ssh2
Oct 19 04:36:32 web9 sshd\[25901\]: Invalid user nvidia from 198.44.179.92
Oct 19 04:36:32 web9 sshd\[25901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.44.179.92
Oct 19 04:36:34 web9 sshd\[25901\]: Failed password for invalid user nvidia from 198.44.179.92 port 39629 ssh2
2019-10-19 23:49:09
189.18.140.65 attack
Unauthorized connection attempt from IP address 189.18.140.65 on Port 445(SMB)
2019-10-19 23:22:16
41.238.253.200 attackspam
Unauthorized connection attempt from IP address 41.238.253.200 on Port 445(SMB)
2019-10-19 23:07:16
202.54.157.6 attackbots
SSH/22 MH Probe, BF, Hack -
2019-10-19 23:01:09
87.203.202.31 attack
Unauthorized connection attempt from IP address 87.203.202.31 on Port 445(SMB)
2019-10-19 23:40:08
92.154.54.101 attackbotsspam
Unauthorized connection attempt from IP address 92.154.54.101 on Port 445(SMB)
2019-10-19 23:50:01
103.60.126.80 attackspam
Oct 19 16:08:28 h2177944 sshd\[16106\]: Invalid user ahhacker from 103.60.126.80 port 60088
Oct 19 16:08:28 h2177944 sshd\[16106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.60.126.80
Oct 19 16:08:30 h2177944 sshd\[16106\]: Failed password for invalid user ahhacker from 103.60.126.80 port 60088 ssh2
Oct 19 16:13:09 h2177944 sshd\[16298\]: Invalid user 1234567 from 103.60.126.80 port 41818
...
2019-10-19 23:09:56
221.131.68.210 attackbots
*Port Scan* detected from 221.131.68.210 (CN/China/-). 4 hits in the last 25 seconds
2019-10-19 23:24:03
106.51.80.198 attackbotsspam
Oct 19 16:22:14 vps691689 sshd[25205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.80.198
Oct 19 16:22:16 vps691689 sshd[25205]: Failed password for invalid user kb from 106.51.80.198 port 51616 ssh2
...
2019-10-19 23:04:12
112.33.13.124 attackbotsspam
Oct 19 04:48:01 php1 sshd\[20043\]: Invalid user thanks from 112.33.13.124
Oct 19 04:48:01 php1 sshd\[20043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.33.13.124
Oct 19 04:48:04 php1 sshd\[20043\]: Failed password for invalid user thanks from 112.33.13.124 port 49708 ssh2
Oct 19 04:53:55 php1 sshd\[21053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.33.13.124  user=root
Oct 19 04:53:57 php1 sshd\[21053\]: Failed password for root from 112.33.13.124 port 53182 ssh2
2019-10-19 23:09:24
61.153.61.50 attackspambots
Unauthorized connection attempt from IP address 61.153.61.50 on Port 445(SMB)
2019-10-19 22:57:27
148.70.59.222 attackspam
Oct 19 16:13:53 sso sshd[3729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.59.222
Oct 19 16:13:54 sso sshd[3729]: Failed password for invalid user bian from 148.70.59.222 port 35816 ssh2
...
2019-10-19 23:28:54
197.51.188.42 attackbotsspam
Unauthorized connection attempt from IP address 197.51.188.42 on Port 445(SMB)
2019-10-19 23:41:28
211.181.237.130 attackbots
Unauthorized connection attempt from IP address 211.181.237.130 on Port 445(SMB)
2019-10-19 23:18:58

最近上报的IP列表

46.29.235.148 151.240.157.16 2.117.121.100 69.218.40.133
37.206.19.233 212.65.16.102 222.106.18.2 32.89.242.154
73.143.125.118 107.229.189.215 122.220.232.49 206.116.167.97
181.255.142.254 196.82.164.47 108.152.82.94 172.99.175.0
88.74.76.29 88.127.121.104 2.151.1.175 110.49.116.109