必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Viet Nam

运营商(isp): FPT Telecom Company

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attackbotsspam
Unauthorized connection attempt detected from IP address 42.117.130.11 to port 23
2019-12-31 00:41:12
相同子网IP讨论:
IP 类型 评论内容 时间
42.117.130.28 attackspambots
unauthorized connection attempt
2020-01-28 20:26:52
42.117.130.60 attackbots
Unauthorized connection attempt detected from IP address 42.117.130.60 to port 23 [J]
2020-01-18 19:44:14
42.117.130.136 attack
Unauthorized connection attempt detected from IP address 42.117.130.136 to port 23 [J]
2020-01-18 18:54:00
42.117.130.213 attackspambots
Unauthorized connection attempt detected from IP address 42.117.130.213 to port 23 [J]
2020-01-07 04:16:30
42.117.130.151 attack
Unauthorized connection attempt detected from IP address 42.117.130.151 to port 23
2019-12-31 21:23:04
42.117.130.32 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-26 03:14:55
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.117.130.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32673
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.117.130.11.			IN	A

;; AUTHORITY SECTION:
.			437	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019123000 1800 900 604800 86400

;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 31 00:41:07 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
Host 11.130.117.42.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 11.130.117.42.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
199.188.200.106 attackspam
Probing for prohibited files and paths.
2020-06-09 20:17:15
139.198.191.217 attack
Jun  9 14:34:32 abendstille sshd\[5077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.191.217  user=root
Jun  9 14:34:34 abendstille sshd\[5077\]: Failed password for root from 139.198.191.217 port 50410 ssh2
Jun  9 14:37:01 abendstille sshd\[7510\]: Invalid user admin from 139.198.191.217
Jun  9 14:37:01 abendstille sshd\[7510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.191.217
Jun  9 14:37:02 abendstille sshd\[7510\]: Failed password for invalid user admin from 139.198.191.217 port 53700 ssh2
...
2020-06-09 20:44:00
193.27.228.221 attack
scans 18 times in preceeding hours on the ports (in chronological order) 32681 25182 22799 34434 35165 34720 31612 28901 36251 34345 24953 26289 31899 26864 40018 40752 40962 40239
2020-06-09 20:49:19
122.51.89.18 attackbots
Jun  9 14:08:35 vserver sshd\[5717\]: Invalid user ashish from 122.51.89.18Jun  9 14:08:37 vserver sshd\[5717\]: Failed password for invalid user ashish from 122.51.89.18 port 58830 ssh2Jun  9 14:13:57 vserver sshd\[5806\]: Invalid user shockwave from 122.51.89.18Jun  9 14:14:00 vserver sshd\[5806\]: Failed password for invalid user shockwave from 122.51.89.18 port 55370 ssh2
...
2020-06-09 20:26:21
144.217.46.42 attackspambots
Jun  9 13:46:56 mail sshd[27928]: Failed password for root from 144.217.46.42 port 53543 ssh2
Jun  9 14:02:51 mail sshd[30042]: Failed password for root from 144.217.46.42 port 33653 ssh2
Jun  9 14:09:02 mail sshd[30777]: Failed password for root from 144.217.46.42 port 35820 ssh2
...
2020-06-09 20:21:22
141.98.9.161 attack
detected by Fail2Ban
2020-06-09 20:16:31
181.48.28.13 attackbotsspam
Jun  9 08:01:35 ny01 sshd[24190]: Failed password for root from 181.48.28.13 port 55724 ssh2
Jun  9 08:05:21 ny01 sshd[24659]: Failed password for root from 181.48.28.13 port 56926 ssh2
2020-06-09 20:13:32
188.219.251.4 attackspambots
Jun  9 22:06:19 web1 sshd[14992]: Invalid user rr from 188.219.251.4 port 33752
Jun  9 22:06:19 web1 sshd[14992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.219.251.4
Jun  9 22:06:19 web1 sshd[14992]: Invalid user rr from 188.219.251.4 port 33752
Jun  9 22:06:21 web1 sshd[14992]: Failed password for invalid user rr from 188.219.251.4 port 33752 ssh2
Jun  9 22:19:37 web1 sshd[18394]: Invalid user admin from 188.219.251.4 port 53559
Jun  9 22:19:37 web1 sshd[18394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.219.251.4
Jun  9 22:19:37 web1 sshd[18394]: Invalid user admin from 188.219.251.4 port 53559
Jun  9 22:19:39 web1 sshd[18394]: Failed password for invalid user admin from 188.219.251.4 port 53559 ssh2
Jun  9 22:25:42 web1 sshd[19921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.219.251.4  user=root
Jun  9 22:25:44 web1 sshd[19921]: Failed p
...
2020-06-09 20:41:15
143.92.42.120 attack
Jun  9 14:04:26 localhost sshd\[5377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.92.42.120  user=root
Jun  9 14:04:29 localhost sshd\[5377\]: Failed password for root from 143.92.42.120 port 44724 ssh2
Jun  9 14:08:56 localhost sshd\[5762\]: Invalid user monitor from 143.92.42.120
Jun  9 14:08:56 localhost sshd\[5762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.92.42.120
Jun  9 14:08:58 localhost sshd\[5762\]: Failed password for invalid user monitor from 143.92.42.120 port 49094 ssh2
...
2020-06-09 20:24:19
70.37.75.157 attackbots
Jun  9 13:59:43 eventyay sshd[20650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.37.75.157
Jun  9 13:59:45 eventyay sshd[20650]: Failed password for invalid user kun from 70.37.75.157 port 33898 ssh2
Jun  9 14:09:00 eventyay sshd[20982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.37.75.157
...
2020-06-09 20:24:51
91.192.36.150 attack
Jun  9 06:29:08 fwservlet sshd[30084]: Invalid user Pentti from 91.192.36.150
Jun  9 06:29:08 fwservlet sshd[30084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.192.36.150
Jun  9 06:29:10 fwservlet sshd[30084]: Failed password for invalid user Pentti from 91.192.36.150 port 38008 ssh2
Jun  9 06:29:10 fwservlet sshd[30084]: Received disconnect from 91.192.36.150 port 38008:11: Bye Bye [preauth]
Jun  9 06:29:10 fwservlet sshd[30084]: Disconnected from 91.192.36.150 port 38008 [preauth]
Jun  9 06:40:34 fwservlet sshd[30530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.192.36.150  user=r.r
Jun  9 06:40:35 fwservlet sshd[30530]: Failed password for r.r from 91.192.36.150 port 41674 ssh2
Jun  9 06:40:35 fwservlet sshd[30530]: Received disconnect from 91.192.36.150 port 41674:11: Bye Bye [preauth]
Jun  9 06:40:35 fwservlet sshd[30530]: Disconnected from 91.192.36.150 port 41674 [preau........
-------------------------------
2020-06-09 20:43:32
223.197.175.91 attackbotsspam
Jun  9 08:06:03 ny01 sshd[24766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.197.175.91
Jun  9 08:06:06 ny01 sshd[24766]: Failed password for invalid user 02 from 223.197.175.91 port 41890 ssh2
Jun  9 08:09:11 ny01 sshd[25212]: Failed password for root from 223.197.175.91 port 35120 ssh2
2020-06-09 20:09:57
123.201.20.30 attackbots
Jun  9 12:23:45 localhost sshd[48108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.201.20.30  user=root
Jun  9 12:23:47 localhost sshd[48108]: Failed password for root from 123.201.20.30 port 43051 ssh2
Jun  9 12:27:27 localhost sshd[48427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.201.20.30  user=root
Jun  9 12:27:29 localhost sshd[48427]: Failed password for root from 123.201.20.30 port 43908 ssh2
Jun  9 12:31:15 localhost sshd[48764]: Invalid user uy from 123.201.20.30 port 44761
...
2020-06-09 20:44:22
54.36.148.20 attackbotsspam
Automated report (2020-06-09T20:08:49+08:00). Scraper detected at this address.
2020-06-09 20:38:13
51.254.37.156 attackbotsspam
Jun  9 14:33:31 abendstille sshd\[4106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.37.156  user=root
Jun  9 14:33:33 abendstille sshd\[4106\]: Failed password for root from 51.254.37.156 port 49466 ssh2
Jun  9 14:37:11 abendstille sshd\[7862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.37.156  user=root
Jun  9 14:37:13 abendstille sshd\[7862\]: Failed password for root from 51.254.37.156 port 52650 ssh2
Jun  9 14:40:53 abendstille sshd\[12193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.37.156  user=root
...
2020-06-09 20:41:34

最近上报的IP列表

171.42.102.218 167.86.90.81 157.245.184.175 151.217.117.35
150.255.6.84 129.211.25.209 122.100.65.215 120.234.31.116
193.29.13.30 118.174.175.124 118.71.97.169 118.25.38.83
116.9.143.219 115.220.182.237 56.229.67.230 114.224.47.11
47.78.227.34 6.241.101.1 214.209.218.210 135.98.135.142