必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Viet Nam

运营商(isp): FPT Telecom Company

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attack
1590983371 - 06/01/2020 05:49:31 Host: 42.114.12.1/42.114.12.1 Port: 445 TCP Blocked
2020-06-01 16:15:04
相同子网IP讨论:
IP 类型 评论内容 时间
42.114.12.225 attack
Unauthorized connection attempt from IP address 42.114.12.225 on Port 445(SMB)
2020-09-01 18:47:23
42.114.126.120 attackbots
Port probing on unauthorized port 23
2020-08-13 01:48:07
42.114.12.86 attackbots
Unauthorized connection attempt from IP address 42.114.12.86 on Port 445(SMB)
2020-06-17 01:02:57
42.114.121.152 attack
kidness.family 42.114.121.152 [04/Jun/2020:05:58:59 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4265 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
kidness.family 42.114.121.152 [04/Jun/2020:05:59:03 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4265 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
2020-06-04 12:09:58
42.114.12.159 attackspambots
Unauthorised access (Jun  3) SRC=42.114.12.159 LEN=52 TTL=106 ID=28409 DF TCP DPT=445 WINDOW=8192 SYN
2020-06-03 14:10:09
42.114.121.128 attackbotsspam
1589881561 - 05/19/2020 11:46:01 Host: 42.114.121.128/42.114.121.128 Port: 445 TCP Blocked
2020-05-20 01:56:34
42.114.12.240 attack
1586520216 - 04/10/2020 14:03:36 Host: 42.114.12.240/42.114.12.240 Port: 445 TCP Blocked
2020-04-11 04:08:58
42.114.12.119 attackbots
20/2/19@23:48:09: FAIL: Alarm-Network address from=42.114.12.119
20/2/19@23:48:09: FAIL: Alarm-Network address from=42.114.12.119
...
2020-02-20 21:32:02
42.114.12.208 attack
IP blocked
2020-02-14 21:50:43
42.114.125.53 attackbots
Feb  7 18:55:17 sip sshd[12222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.114.125.53
Feb  7 18:55:17 sip sshd[12224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.114.125.53
Feb  7 18:55:19 sip sshd[12222]: Failed password for invalid user pi from 42.114.125.53 port 60210 ssh2
Feb  7 18:55:19 sip sshd[12224]: Failed password for invalid user pi from 42.114.125.53 port 60218 ssh2
2020-02-08 05:16:07
42.114.12.172 attack
unauthorized connection attempt
2020-02-04 16:50:21
42.114.120.250 attackspam
Unauthorized connection attempt detected from IP address 42.114.120.250 to port 23 [J]
2020-01-07 04:17:37
42.114.12.206 attack
1578026989 - 01/03/2020 05:49:49 Host: 42.114.12.206/42.114.12.206 Port: 445 TCP Blocked
2020-01-03 16:13:21
42.114.12.91 attack
1576592404 - 12/17/2019 15:20:04 Host: 42.114.12.91/42.114.12.91 Port: 445 TCP Blocked
2019-12-18 05:18:18
42.114.12.124 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 29-10-2019 11:40:31.
2019-10-29 21:03:59
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.114.12.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10971
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.114.12.1.			IN	A

;; AUTHORITY SECTION:
.			500	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020060100 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 01 16:14:59 CST 2020
;; MSG SIZE  rcvd: 115
HOST信息:
Host 1.12.114.42.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 1.12.114.42.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
5.3.6.166 attack
Aug 20 06:39:39 debian sshd\[7781\]: Invalid user nick from 5.3.6.166 port 37516
Aug 20 06:39:39 debian sshd\[7781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.3.6.166
...
2019-08-20 13:53:26
111.198.54.177 attackspam
Aug 20 09:03:20 pkdns2 sshd\[54294\]: Invalid user master from 111.198.54.177Aug 20 09:03:22 pkdns2 sshd\[54294\]: Failed password for invalid user master from 111.198.54.177 port 57629 ssh2Aug 20 09:06:24 pkdns2 sshd\[54448\]: Invalid user emplazamiento from 111.198.54.177Aug 20 09:06:26 pkdns2 sshd\[54448\]: Failed password for invalid user emplazamiento from 111.198.54.177 port 14147 ssh2Aug 20 09:09:29 pkdns2 sshd\[54557\]: Invalid user sangley_xmb1 from 111.198.54.177Aug 20 09:09:31 pkdns2 sshd\[54557\]: Failed password for invalid user sangley_xmb1 from 111.198.54.177 port 27168 ssh2
...
2019-08-20 14:31:21
123.138.199.66 attack
Automatic report - Banned IP Access
2019-08-20 13:59:32
14.63.167.192 attackspam
Aug 19 19:42:37 hcbb sshd\[25145\]: Invalid user nagiosuser from 14.63.167.192
Aug 19 19:42:37 hcbb sshd\[25145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.167.192
Aug 19 19:42:39 hcbb sshd\[25145\]: Failed password for invalid user nagiosuser from 14.63.167.192 port 56400 ssh2
Aug 19 19:47:42 hcbb sshd\[25594\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.167.192  user=root
Aug 19 19:47:44 hcbb sshd\[25594\]: Failed password for root from 14.63.167.192 port 45406 ssh2
2019-08-20 13:49:49
79.180.110.112 attack
2019-08-20T05:53:42.619228abusebot-3.cloudsearch.cf sshd\[5714\]: Invalid user kkkkk from 79.180.110.112 port 60818
2019-08-20 14:28:53
175.126.176.21 attackbots
Aug 19 19:56:03 php2 sshd\[24429\]: Invalid user half from 175.126.176.21
Aug 19 19:56:03 php2 sshd\[24429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.126.176.21
Aug 19 19:56:05 php2 sshd\[24429\]: Failed password for invalid user half from 175.126.176.21 port 36978 ssh2
Aug 19 20:01:19 php2 sshd\[24955\]: Invalid user hannes from 175.126.176.21
Aug 19 20:01:19 php2 sshd\[24955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.126.176.21
2019-08-20 14:05:14
27.124.11.2 attackspam
Port Scan: UDP/389
2019-08-20 14:04:50
196.188.28.217 attack
Aug 20 08:46:23 localhost sshd\[16001\]: Invalid user luna from 196.188.28.217 port 59292
Aug 20 08:46:23 localhost sshd\[16001\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.188.28.217
Aug 20 08:46:25 localhost sshd\[16001\]: Failed password for invalid user luna from 196.188.28.217 port 59292 ssh2
2019-08-20 14:50:22
104.248.218.225 attackspam
Aug 20 07:57:08 mail sshd\[26877\]: Invalid user jboss from 104.248.218.225
Aug 20 07:57:08 mail sshd\[26877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.218.225
Aug 20 07:57:10 mail sshd\[26877\]: Failed password for invalid user jboss from 104.248.218.225 port 47628 ssh2
...
2019-08-20 14:23:46
51.158.20.43 attackbots
5061/udp 5062/udp 5063/udp...
[2019-08-03/19]115pkt,31pt.(udp)
2019-08-20 14:08:39
211.159.152.252 attackspambots
Invalid user dev from 211.159.152.252 port 25794
2019-08-20 14:04:00
115.94.38.82 attackspam
Aug 20 08:03:08 jane sshd\[31554\]: Invalid user zimbra from 115.94.38.82 port 54799
Aug 20 08:03:08 jane sshd\[31554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.94.38.82
Aug 20 08:03:11 jane sshd\[31554\]: Failed password for invalid user zimbra from 115.94.38.82 port 54799 ssh2
...
2019-08-20 14:15:18
200.196.253.251 attack
Aug 19 19:25:33 lcprod sshd\[31575\]: Invalid user vika from 200.196.253.251
Aug 19 19:25:33 lcprod sshd\[31575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.196.253.251
Aug 19 19:25:35 lcprod sshd\[31575\]: Failed password for invalid user vika from 200.196.253.251 port 60956 ssh2
Aug 19 19:31:01 lcprod sshd\[32119\]: Invalid user 12345678 from 200.196.253.251
Aug 19 19:31:01 lcprod sshd\[32119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.196.253.251
2019-08-20 13:56:51
46.166.171.186 attack
445/tcp
[2019-08-20]1pkt
2019-08-20 14:34:05
123.128.77.42 attack
23/tcp
[2019-08-20]1pkt
2019-08-20 14:41:44

最近上报的IP列表

180.153.57.251 103.114.218.234 183.158.37.214 187.176.188.28
18.39.79.54 135.95.188.142 101.197.195.165 119.29.41.117
148.239.121.80 18.148.18.147 185.165.94.84 210.251.120.184
200.36.231.93 20.18.131.40 191.232.52.240 137.101.245.196
97.93.111.184 170.228.183.22 113.190.252.87 66.24.177.44