必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Hanoi

省份(region): Hanoi

国家(country): Vietnam

运营商(isp): FPT Telecom Company

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attack
Unauthorized connection attempt from IP address 42.112.108.51 on Port 445(SMB)
2019-11-06 04:26:20
相同子网IP讨论:
IP 类型 评论内容 时间
42.112.108.255 attack
1598702863 - 08/29/2020 14:07:43 Host: 42.112.108.255/42.112.108.255 Port: 445 TCP Blocked
2020-08-30 00:43:56
42.112.108.204 attackbotsspam
03/20/2020-23:47:42.049216 42.112.108.204 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-03-21 18:48:02
42.112.108.80 attackbotsspam
Unauthorized connection attempt from IP address 42.112.108.80 on Port 445(SMB)
2020-03-07 09:41:34
42.112.108.68 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-11 02:40:02
42.112.108.253 attack
Unauthorized connection attempt from IP address 42.112.108.253 on Port 445(SMB)
2020-01-13 20:20:17
42.112.108.14 attackbotsspam
" "
2020-01-13 16:34:08
42.112.108.4 attack
Unauthorized connection attempt from IP address 42.112.108.4 on Port 445(SMB)
2019-10-30 06:31:58
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.112.108.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15171
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.112.108.51.			IN	A

;; AUTHORITY SECTION:
.			596	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110501 1800 900 604800 86400

;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 06 04:26:16 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
Host 51.108.112.42.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 51.108.112.42.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
81.183.182.37 attackbotsspam
Aug 14 22:05:43 ajax sshd[22172]: Failed password for root from 81.183.182.37 port 51208 ssh2
2020-08-15 05:33:28
150.109.147.46 attackbotsspam
Aug 13 22:27:53 v26 sshd[25415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.147.46  user=r.r
Aug 13 22:27:55 v26 sshd[25415]: Failed password for r.r from 150.109.147.46 port 41496 ssh2
Aug 13 22:27:55 v26 sshd[25415]: Received disconnect from 150.109.147.46 port 41496:11: Bye Bye [preauth]
Aug 13 22:27:55 v26 sshd[25415]: Disconnected from 150.109.147.46 port 41496 [preauth]
Aug 13 22:42:06 v26 sshd[27101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.147.46  user=r.r
Aug 13 22:42:08 v26 sshd[27101]: Failed password for r.r from 150.109.147.46 port 50102 ssh2
Aug 13 22:42:08 v26 sshd[27101]: Received disconnect from 150.109.147.46 port 50102:11: Bye Bye [preauth]
Aug 13 22:42:08 v26 sshd[27101]: Disconnected from 150.109.147.46 port 50102 [preauth]
Aug 13 22:46:05 v26 sshd[27553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost........
-------------------------------
2020-08-15 05:33:51
139.99.40.44 attackspambots
Aug 14 22:43:59 vpn01 sshd[26386]: Failed password for root from 139.99.40.44 port 38604 ssh2
...
2020-08-15 05:26:55
42.159.155.8 attack
Aug 14 22:28:55 ns382633 sshd\[14203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.155.8  user=root
Aug 14 22:28:57 ns382633 sshd\[14203\]: Failed password for root from 42.159.155.8 port 1600 ssh2
Aug 14 22:40:17 ns382633 sshd\[16702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.155.8  user=root
Aug 14 22:40:19 ns382633 sshd\[16702\]: Failed password for root from 42.159.155.8 port 1600 ssh2
Aug 14 22:43:59 ns382633 sshd\[17005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.155.8  user=root
2020-08-15 05:41:57
125.91.109.200 attackspambots
2020-08-14T21:18:42.099647shield sshd\[6939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.91.109.200  user=root
2020-08-14T21:18:43.969219shield sshd\[6939\]: Failed password for root from 125.91.109.200 port 49724 ssh2
2020-08-14T21:23:05.535223shield sshd\[7346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.91.109.200  user=root
2020-08-14T21:23:07.514540shield sshd\[7346\]: Failed password for root from 125.91.109.200 port 60724 ssh2
2020-08-14T21:27:24.132723shield sshd\[7781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.91.109.200  user=root
2020-08-15 05:35:21
106.52.56.102 attack
Aug 14 23:47:05 OPSO sshd\[13473\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.56.102  user=root
Aug 14 23:47:07 OPSO sshd\[13473\]: Failed password for root from 106.52.56.102 port 50270 ssh2
Aug 14 23:49:58 OPSO sshd\[13795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.56.102  user=root
Aug 14 23:50:00 OPSO sshd\[13795\]: Failed password for root from 106.52.56.102 port 54186 ssh2
Aug 14 23:52:51 OPSO sshd\[14800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.56.102  user=root
2020-08-15 05:53:22
52.238.107.27 attackbotsspam
2020-08-15T00:33:00.970187mail.standpoint.com.ua sshd[1185]: Failed password for root from 52.238.107.27 port 60238 ssh2
2020-08-15T00:35:28.054873mail.standpoint.com.ua sshd[1520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.238.107.27  user=root
2020-08-15T00:35:30.033526mail.standpoint.com.ua sshd[1520]: Failed password for root from 52.238.107.27 port 56692 ssh2
2020-08-15T00:37:58.160121mail.standpoint.com.ua sshd[1816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.238.107.27  user=root
2020-08-15T00:38:00.063373mail.standpoint.com.ua sshd[1816]: Failed password for root from 52.238.107.27 port 53150 ssh2
...
2020-08-15 05:43:18
189.208.165.111 attackbotsspam
Automatic report - Port Scan Attack
2020-08-15 05:32:06
5.34.176.29 attackspambots
E-Mail Spam (RBL) [REJECTED]
2020-08-15 05:41:35
147.135.225.193 attackspam
Unauthorized access detected from black listed ip!
2020-08-15 05:40:10
13.114.122.76 attackbots
REQUESTED PAGE: /.git/HEAD
2020-08-15 05:36:25
112.219.169.123 attack
Aug 14 22:57:05 PorscheCustomer sshd[29259]: Failed password for root from 112.219.169.123 port 39680 ssh2
Aug 14 23:01:24 PorscheCustomer sshd[29399]: Failed password for root from 112.219.169.123 port 50334 ssh2
...
2020-08-15 05:26:28
222.186.169.194 attackspambots
[MK-Root1] SSH login failed
2020-08-15 05:26:03
113.88.165.169 attackbotsspam
Aug 14 04:20:22 finn sshd[18711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.88.165.169  user=r.r
Aug 14 04:20:25 finn sshd[18711]: Failed password for r.r from 113.88.165.169 port 36272 ssh2
Aug 14 04:20:25 finn sshd[18711]: Received disconnect from 113.88.165.169 port 36272:11: Bye Bye [preauth]
Aug 14 04:20:25 finn sshd[18711]: Disconnected from 113.88.165.169 port 36272 [preauth]
Aug 14 04:22:46 finn sshd[18804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.88.165.169  user=r.r
Aug 14 04:22:48 finn sshd[18804]: Failed password for r.r from 113.88.165.169 port 58884 ssh2
Aug 14 04:22:49 finn sshd[18804]: Received disconnect from 113.88.165.169 port 58884:11: Bye Bye [preauth]
Aug 14 04:22:49 finn sshd[18804]: Disconnected from 113.88.165.169 port 58884 [preauth]
Aug 14 04:24:05 finn sshd[18831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh rus........
-------------------------------
2020-08-15 05:52:15
222.186.42.213 attack
Aug 14 23:03:22 * sshd[7536]: Failed password for root from 222.186.42.213 port 38987 ssh2
2020-08-15 05:18:17

最近上报的IP列表

183.83.128.186 91.185.255.130 190.200.14.231 200.90.81.197
129.226.77.188 189.132.143.171 89.37.65.76 31.180.215.150
14.161.4.24 45.119.208.74 170.84.13.167 202.67.37.34
209.99.134.29 188.17.163.109 111.240.38.163 87.123.205.117
173.249.33.187 189.172.216.189 36.37.117.82 46.100.53.152