必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.109.244.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23162
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.109.244.81.			IN	A

;; AUTHORITY SECTION:
.			528	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 18:29:43 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
81.244.109.42.in-addr.arpa domain name pointer 42-109-244-81.live.vodafone.in.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
81.244.109.42.in-addr.arpa	name = 42-109-244-81.live.vodafone.in.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
113.172.145.142 attackspambots
SSH scan ::
2019-10-21 21:41:32
45.165.163.61 attackbots
Port 1433 Scan
2019-10-21 21:36:14
37.228.65.107 attackbotsspam
SPAM Delivery Attempt
2019-10-21 21:44:47
3.122.179.249 attackbots
/var/log/messages:Oct 21 12:33:54 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1571661234.750:63677): pid=5124 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-server cipher=aexxxxxxx28-ctr ksize=128 mac=hmac-sha1 pfs=diffie-hellman-group14-sha1 spid=5125 suid=74 rport=39368 laddr=104.167.106.93 lport=22  exe="/usr/sbin/sshd" hostname=? addr=3.122.179.249 terminal=? res=success'
/var/log/messages:Oct 21 12:33:54 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1571661234.754:63678): pid=5124 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-client cipher=aexxxxxxx28-ctr ksize=128 mac=hmac-sha1 pfs=diffie-hellman-group14-sha1 spid=5125 suid=74 rport=39368 laddr=104.167.106.93 lport=22  exe="/usr/sbin/sshd" hostname=? addr=3.122.179.249 terminal=? res=success'
/var/log/messages:Oct 21 12:33:55 sanyalnet-cloud-vps fail2ban.filter[........
-------------------------------
2019-10-21 21:13:04
51.75.146.177 attackbots
Oct 21 02:51:22 php1 sshd\[29405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.146.177  user=root
Oct 21 02:51:25 php1 sshd\[29405\]: Failed password for root from 51.75.146.177 port 58022 ssh2
Oct 21 02:55:36 php1 sshd\[29735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.146.177  user=root
Oct 21 02:55:37 php1 sshd\[29735\]: Failed password for root from 51.75.146.177 port 37834 ssh2
Oct 21 02:59:50 php1 sshd\[30072\]: Invalid user oracle from 51.75.146.177
2019-10-21 21:15:19
61.178.29.191 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-10-21 21:21:36
101.109.83.140 attackbotsspam
Oct 21 03:33:46 php1 sshd\[14165\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.109.83.140  user=root
Oct 21 03:33:48 php1 sshd\[14165\]: Failed password for root from 101.109.83.140 port 42362 ssh2
Oct 21 03:38:38 php1 sshd\[15046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.109.83.140  user=root
Oct 21 03:38:39 php1 sshd\[15046\]: Failed password for root from 101.109.83.140 port 51932 ssh2
Oct 21 03:43:35 php1 sshd\[16037\]: Invalid user kikuko from 101.109.83.140
Oct 21 03:43:35 php1 sshd\[16037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.109.83.140
2019-10-21 21:43:58
91.135.197.150 attack
2019-10-21 x@x
2019-10-21 13:17:20 unexpected disconnection while reading SMTP command from (mail.smart-solutions.kz) [91.135.197.150]:11943 I=[10.100.18.23]:25 (error: Connection reset by peer)
2019-10-21 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=91.135.197.150
2019-10-21 21:43:14
177.126.237.207 attackbots
2019-10-21 x@x
2019-10-21 13:07:02 unexpected disconnection while reading SMTP command from (177-126-237-207.chostnamey10.com.br) [177.126.237.207]:17875 I=[10.100.18.22]:25 (error: Connection reset by peer)
2019-10-21 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=177.126.237.207
2019-10-21 21:37:04
222.186.175.202 attackbots
Oct 12 00:53:27 mail sshd[31901]: Failed password for root from 222.186.175.202 port 44404 ssh2
Oct 12 00:53:33 mail sshd[31901]: Failed password for root from 222.186.175.202 port 44404 ssh2
Oct 12 00:53:38 mail sshd[31901]: Failed password for root from 222.186.175.202 port 44404 ssh2
Oct 12 00:53:44 mail sshd[31901]: Failed password for root from 222.186.175.202 port 44404 ssh2
2019-10-21 21:21:10
187.228.162.103 attack
Oct 21 13:30:31 nexus sshd[32347]: Invalid user victor from 187.228.162.103 port 47808
Oct 21 13:30:31 nexus sshd[32347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.228.162.103
Oct 21 13:30:33 nexus sshd[32347]: Failed password for invalid user victor from 187.228.162.103 port 47808 ssh2
Oct 21 13:30:33 nexus sshd[32347]: Received disconnect from 187.228.162.103 port 47808:11: Bye Bye [preauth]
Oct 21 13:30:33 nexus sshd[32347]: Disconnected from 187.228.162.103 port 47808 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=187.228.162.103
2019-10-21 21:30:23
18.188.187.99 attackbots
Oct 21 14:56:36 nexus sshd[17974]: Invalid user zimbra from 18.188.187.99 port 47930
Oct 21 14:56:36 nexus sshd[17974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.188.187.99
Oct 21 14:56:38 nexus sshd[17974]: Failed password for invalid user zimbra from 18.188.187.99 port 47930 ssh2
Oct 21 14:56:38 nexus sshd[17974]: Received disconnect from 18.188.187.99 port 47930:11: Normal Shutdown, Thank you for playing [preauth]
Oct 21 14:56:38 nexus sshd[17974]: Disconnected from 18.188.187.99 port 47930 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=18.188.187.99
2019-10-21 21:25:55
185.176.27.246 attackspam
10/21/2019-07:44:34.365458 185.176.27.246 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-21 21:16:55
136.243.1.183 attackspam
Oct 21 15:23:49 vpn01 sshd[8123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.243.1.183
Oct 21 15:23:51 vpn01 sshd[8123]: Failed password for invalid user usuario from 136.243.1.183 port 33522 ssh2
...
2019-10-21 21:42:43
49.51.155.24 attackbotsspam
Oct 21 01:36:13 php1 sshd\[31245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.155.24  user=root
Oct 21 01:36:15 php1 sshd\[31245\]: Failed password for root from 49.51.155.24 port 50228 ssh2
Oct 21 01:40:05 php1 sshd\[32163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.155.24  user=root
Oct 21 01:40:07 php1 sshd\[32163\]: Failed password for root from 49.51.155.24 port 33178 ssh2
Oct 21 01:44:06 php1 sshd\[32519\]: Invalid user gemma from 49.51.155.24
2019-10-21 21:38:10

最近上报的IP列表

197.181.7.109 245.85.71.18 152.74.249.195 40.82.109.218
129.11.23.32 134.40.17.15 241.200.100.155 167.10.158.131
117.144.192.5 181.67.85.142 40.155.52.77 109.116.222.179
123.251.193.153 8.149.113.192 244.68.18.191 231.116.197.140
49.125.232.0 12.252.154.226 115.218.141.217 39.183.77.181