必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Viet Nam

运营商(isp): FPT Telecom Company

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attackspam
unauthorized connection attempt
2020-02-26 16:06:42
相同子网IP讨论:
IP 类型 评论内容 时间
42.114.31.88 attackbots
1588391385 - 05/02/2020 05:49:45 Host: 42.114.31.88/42.114.31.88 Port: 445 TCP Blocked
2020-05-02 18:25:42
42.114.31.57 attackbotsspam
Feb 28 17:25:06 h2177944 kernel: \[6104841.793116\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=42.114.31.57 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=52 ID=63587 PROTO=TCP SPT=19607 DPT=23 WINDOW=24199 RES=0x00 SYN URGP=0 
Feb 28 17:25:06 h2177944 kernel: \[6104841.793130\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=42.114.31.57 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=52 ID=63587 PROTO=TCP SPT=19607 DPT=23 WINDOW=24199 RES=0x00 SYN URGP=0 
Feb 28 17:25:06 h2177944 kernel: \[6104841.794708\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=42.114.31.57 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=52 ID=63587 PROTO=TCP SPT=19607 DPT=23 WINDOW=24199 RES=0x00 SYN URGP=0 
Feb 28 17:25:06 h2177944 kernel: \[6104841.794721\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=42.114.31.57 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=52 ID=63587 PROTO=TCP SPT=19607 DPT=23 WINDOW=24199 RES=0x00 SYN URGP=0 
Feb 28 17:25:06 h2177944 kernel: \[6104841.796816\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=42.114.31.57 DST=85.214.117.9 LEN=40 TOS=0
2020-02-29 02:11:30
42.114.31.253 attackspam
Unauthorized connection attempt detected from IP address 42.114.31.253 to port 445
2019-12-28 16:59:22
42.114.31.141 attack
port scan and connect, tcp 23 (telnet)
2019-12-17 03:27:18
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.114.31.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63363
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.114.31.244.			IN	A

;; AUTHORITY SECTION:
.			267	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020022601 1800 900 604800 86400

;; Query time: 162 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 16:06:34 CST 2020
;; MSG SIZE  rcvd: 117
HOST信息:
Host 244.31.114.42.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 244.31.114.42.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
89.248.163.8 attack
Scan port
2023-09-21 12:44:28
116.22.74.199 attack
attempted to log into my accounts
2023-09-25 17:28:59
197.211.53.124 proxynormal
Want to check device details
2023-09-13 10:44:55
106.11.172.9 spam
Spammer Website
2023-09-18 06:13:20
107.170.51.199 botsattack
Scan port
2023-09-15 12:27:07
45.93.16.154 attack
Scan port
2023-09-14 12:35:56
52.90.140.65 attack
Scan port
2023-09-11 12:29:33
205.209.104.2 attack
Scan port
2023-09-22 17:50:14
193.35.18.27 attack
attack from minitool program, after install this make varius attacks with various ips and ports
2023-09-18 06:44:55
216.239.32.27 spamattack
This not my IP for my location. 192.168.  is my IP location. Please make this correction
2023-09-09 00:49:47
5.189.160.241 botsattack
Scan port
2023-09-15 12:25:09
107.170.51.199 attack
Scan port
2023-09-15 20:17:19
2001:0002:14:5:1:2:bf35:2610 spambotsattackproxynormal
-22,7295849, -46,8950913
2023-09-15 05:13:11
2.17.246.2 attack
Scan port
2023-09-21 15:48:15
193.35.18.27 attack
attack from minitool program, after install this make varius attacks with various ips and ports
2023-09-18 06:45:00

最近上报的IP列表

169.183.130.23 236.226.237.135 5.129.145.176 213.34.227.150
2.180.25.50 210.179.34.34 202.94.83.74 185.218.244.65
178.21.184.130 171.225.216.75 168.0.252.53 123.17.146.19
122.194.17.32 118.34.62.154 114.34.164.228 226.137.87.103
113.25.51.251 87.227.161.157 81.214.126.212 69.44.202.220