必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.100.253.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62254
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.100.253.5.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025091600 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Sep 16 21:49:26 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 5.253.100.42.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 5.253.100.42.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
27.106.30.15 attackbotsspam
Aug  1 15:14:46 fv15 sshd[1621]: Failed password for invalid user user1 from 27.106.30.15 port 52991 ssh2
Aug  1 15:14:46 fv15 sshd[1621]: Connection closed by 27.106.30.15 [preauth]
Aug  1 15:14:47 fv15 sshd[1630]: Failed password for invalid user user1 from 27.106.30.15 port 50339 ssh2
Aug  1 15:14:47 fv15 sshd[1630]: Connection closed by 27.106.30.15 [preauth]
Aug  1 15:14:48 fv15 sshd[1751]: Failed password for invalid user user1 from 27.106.30.15 port 53591 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=27.106.30.15
2019-08-02 00:24:15
23.100.232.233 attack
abuseConfidenceScore blocked for 12h
2019-08-01 23:34:56
203.230.6.175 attackspambots
Aug  1 13:23:12 MK-Soft-VM6 sshd\[8209\]: Invalid user katrin from 203.230.6.175 port 38376
Aug  1 13:23:12 MK-Soft-VM6 sshd\[8209\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.230.6.175
Aug  1 13:23:14 MK-Soft-VM6 sshd\[8209\]: Failed password for invalid user katrin from 203.230.6.175 port 38376 ssh2
...
2019-08-02 01:32:54
128.199.169.39 attackbots
Automatic report - Banned IP Access
2019-08-01 23:47:15
114.96.62.253 attackspambots
Lines containing failures of 114.96.62.253


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=114.96.62.253
2019-08-02 00:42:32
185.137.111.5 attack
Aug  1 19:05:51 mail postfix/smtpd\[4447\]: warning: unknown\[185.137.111.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Aug  1 19:06:42 mail postfix/smtpd\[4447\]: warning: unknown\[185.137.111.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Aug  1 19:37:03 mail postfix/smtpd\[2901\]: warning: unknown\[185.137.111.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Aug  1 19:37:54 mail postfix/smtpd\[7660\]: warning: unknown\[185.137.111.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-08-02 01:37:15
67.205.173.117 attack
Lines containing failures of 67.205.173.117
Aug  1 15:17:45 server01 postfix/smtpd[19472]: warning: hostname bizcloud-marroihostnamet.com does not resolve to address 67.205.173.117: Name or service not known
Aug  1 15:17:45 server01 postfix/smtpd[19472]: connect from unknown[67.205.173.117]
Aug x@x
Aug x@x
Aug  1 15:17:45 server01 postfix/smtpd[19472]: disconnect from unknown[67.205.173.117]
Aug  1 15:17:46 server01 postfix/smtpd[19472]: warning: hostname bizcloud-marroihostnamet.com does not resolve to address 67.205.173.117: Name or service not known
Aug  1 15:17:46 server01 postfix/smtpd[19472]: connect from unknown[67.205.173.117]
Aug x@x
Aug x@x
Aug  1 15:17:46 server01 postfix/smtpd[19472]: disconnect from unknown[67.205.173.117]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=67.205.173.117
2019-08-02 00:50:11
200.144.254.98 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-08-02 01:33:55
112.85.42.229 attack
08/01/2019-11:35:23.826608 112.85.42.229 Protocol: 6 SURICATA TCPv4 invalid checksum
2019-08-01 23:36:07
188.131.134.157 attack
Jan 23 07:24:02 vtv3 sshd\[12340\]: Invalid user convoc from 188.131.134.157 port 52398
Jan 23 07:24:02 vtv3 sshd\[12340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.134.157
Jan 23 07:24:04 vtv3 sshd\[12340\]: Failed password for invalid user convoc from 188.131.134.157 port 52398 ssh2
Jan 23 07:29:02 vtv3 sshd\[13785\]: Invalid user isac from 188.131.134.157 port 54298
Jan 23 07:29:02 vtv3 sshd\[13785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.134.157
Feb 16 17:22:08 vtv3 sshd\[21847\]: Invalid user alfresco from 188.131.134.157 port 54328
Feb 16 17:22:08 vtv3 sshd\[21847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.134.157
Feb 16 17:22:11 vtv3 sshd\[21847\]: Failed password for invalid user alfresco from 188.131.134.157 port 54328 ssh2
Feb 16 17:28:06 vtv3 sshd\[23346\]: Invalid user ubuntu from 188.131.134.157 port 49524
Feb 16 17:28:06
2019-08-01 23:57:57
37.208.66.217 attackbotsspam
[portscan] Port scan
2019-08-01 23:23:02
95.216.224.183 attackbots
proto=tcp  .  spt=36271  .  dpt=25  .     (listed on Blocklist de  Jul 31)     (507)
2019-08-01 23:43:39
5.135.135.116 attack
Aug  1 15:12:16 microserver sshd[49047]: Invalid user carol from 5.135.135.116 port 39749
Aug  1 15:12:16 microserver sshd[49047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.135.116
Aug  1 15:12:18 microserver sshd[49047]: Failed password for invalid user carol from 5.135.135.116 port 39749 ssh2
Aug  1 15:16:14 microserver sshd[49614]: Invalid user systest from 5.135.135.116 port 36702
Aug  1 15:16:14 microserver sshd[49614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.135.116
Aug  1 15:28:06 microserver sshd[51324]: Invalid user camila from 5.135.135.116 port 56048
Aug  1 15:28:06 microserver sshd[51324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.135.116
Aug  1 15:28:08 microserver sshd[51324]: Failed password for invalid user camila from 5.135.135.116 port 56048 ssh2
Aug  1 15:32:02 microserver sshd[51916]: Invalid user ramiro from 5.135.135.116 port 52984
2019-08-01 23:27:30
106.111.160.97 attack
Aug  1 17:04:01 www1 sshd\[13785\]: Invalid user pi from 106.111.160.97Aug  1 17:04:05 www1 sshd\[13785\]: Failed password for invalid user pi from 106.111.160.97 port 44306 ssh2Aug  1 17:04:16 www1 sshd\[13807\]: Invalid user pi from 106.111.160.97Aug  1 17:04:18 www1 sshd\[13807\]: Failed password for invalid user pi from 106.111.160.97 port 46059 ssh2Aug  1 17:04:23 www1 sshd\[13809\]: Invalid user pi from 106.111.160.97Aug  1 17:04:27 www1 sshd\[13809\]: Failed password for invalid user pi from 106.111.160.97 port 48265 ssh2
...
2019-08-02 00:45:40
80.227.12.38 attack
Automatic report - Banned IP Access
2019-08-02 01:39:51

最近上报的IP列表

14.213.31.163 125.122.33.108 117.203.156.136 2409:8918:40d4:6b81:896f:e92c:548a:148d
101.226.9.213 101.226.9.196 111.85.60.219 111.0.237.165
111.0.237.184 38.179.85.208 20.38.37.44 167.172.83.46
154.84.184.122 150.109.46.88 2001:ee0:4001:2366:8d97:f5c4:16fb:32fb 110.166.71.39
139.59.106.80 206.189.82.127 244.223.117.6 2001:818:dd02:5400:e479:c71:5733:62c1