必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Viet Nam

运营商(isp): FPT Telecom Company

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attackspambots
Unauthorised access (Nov 23) SRC=42.116.120.75 LEN=52 TTL=45 ID=26425 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-23 15:06:36
相同子网IP讨论:
IP 类型 评论内容 时间
42.116.120.6 attackspam
Unauthorized connection attempt from IP address 42.116.120.6 on Port 445(SMB)
2020-06-06 17:06:39
42.116.120.82 attackspambots
TCP Port: 25      invalid blocked  dnsbl-sorbs also abuseat-org and barracuda           (457)
2020-01-03 03:58:09
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.116.120.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43888
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.116.120.75.			IN	A

;; AUTHORITY SECTION:
.			478	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019112300 1800 900 604800 86400

;; Query time: 106 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 23 15:06:32 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
Host 75.120.116.42.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 75.120.116.42.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
213.32.10.219 attackbots
Port scan on 1 port(s): 139
2020-03-30 05:29:39
187.188.83.115 attackspam
Mar 29 15:32:38 lukav-desktop sshd\[17549\]: Invalid user mqw from 187.188.83.115
Mar 29 15:32:38 lukav-desktop sshd\[17549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.83.115
Mar 29 15:32:40 lukav-desktop sshd\[17549\]: Failed password for invalid user mqw from 187.188.83.115 port 33284 ssh2
Mar 29 15:40:42 lukav-desktop sshd\[17727\]: Invalid user lg from 187.188.83.115
Mar 29 15:40:42 lukav-desktop sshd\[17727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.83.115
2020-03-30 05:20:27
200.133.39.24 attack
Mar 29 23:34:14 santamaria sshd\[5211\]: Invalid user abm from 200.133.39.24
Mar 29 23:34:14 santamaria sshd\[5211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.133.39.24
Mar 29 23:34:16 santamaria sshd\[5211\]: Failed password for invalid user abm from 200.133.39.24 port 36384 ssh2
...
2020-03-30 05:38:57
128.199.212.82 attack
xmlrpc attack
2020-03-30 05:43:27
222.186.42.136 attackspambots
(sshd) Failed SSH login from 222.186.42.136 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 29 22:43:31 amsweb01 sshd[9324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.136  user=root
Mar 29 22:43:33 amsweb01 sshd[9324]: Failed password for root from 222.186.42.136 port 29711 ssh2
Mar 29 22:43:35 amsweb01 sshd[9324]: Failed password for root from 222.186.42.136 port 29711 ssh2
Mar 29 22:43:37 amsweb01 sshd[9324]: Failed password for root from 222.186.42.136 port 29711 ssh2
Mar 29 23:08:54 amsweb01 sshd[12324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.136  user=root
2020-03-30 05:19:07
154.66.219.20 attackspam
SSH auth scanning - multiple failed logins
2020-03-30 05:11:10
113.42.142.197 attackspam
29.03.2020 21:34:23 Recursive DNS scan
2020-03-30 05:34:29
108.30.42.152 attackspambots
Unauthorized connection attempt detected from IP address 108.30.42.152 to port 23
2020-03-30 05:26:47
89.136.52.0 attack
2020-03-29 21:10:06,447 fail2ban.actions: WARNING [ssh] Ban 89.136.52.0
2020-03-30 05:23:36
122.14.228.229 attackspambots
Mar 29 19:24:03 icinga sshd[10512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.14.228.229 
Mar 29 19:24:05 icinga sshd[10512]: Failed password for invalid user Tlhua from 122.14.228.229 port 36506 ssh2
Mar 29 19:33:22 icinga sshd[25360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.14.228.229 
...
2020-03-30 05:32:57
222.186.15.91 attack
Mar 30 04:13:31 itv-usvr-02 sshd[1657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.91  user=root
Mar 30 04:13:33 itv-usvr-02 sshd[1657]: Failed password for root from 222.186.15.91 port 36103 ssh2
2020-03-30 05:13:59
49.233.173.136 attack
Total attacks: 4
2020-03-30 05:08:30
116.75.168.218 attackbots
Mar 29 14:40:57 nextcloud sshd\[26589\]: Invalid user vlf from 116.75.168.218
Mar 29 14:40:57 nextcloud sshd\[26589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.75.168.218
Mar 29 14:40:58 nextcloud sshd\[26589\]: Failed password for invalid user vlf from 116.75.168.218 port 54030 ssh2
2020-03-30 05:07:42
188.131.244.11 attackspam
5x Failed Password
2020-03-30 05:25:27
212.3.156.228 attack
Port probing on unauthorized port 23
2020-03-30 05:15:51

最近上报的IP列表

110.131.100.213 82.20.54.74 175.8.38.44 112.75.228.5
112.88.24.230 229.62.82.54 251.96.121.170 15.164.245.110
94.101.241.36 105.41.252.160 23.94.38.151 51.68.3.116
187.19.10.224 195.201.129.192 191.33.186.138 138.99.85.8
45.113.105.3 122.114.63.95 177.86.147.42 130.61.90.229