必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Viet Nam

运营商(isp): FPT Telecom Company

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attack
Unauthorized connection attempt from IP address 42.117.34.20 on Port 445(SMB)
2019-09-29 00:30:51
相同子网IP讨论:
IP 类型 评论内容 时间
42.117.34.250 attack
Unauthorized connection attempt from IP address 42.117.34.250 on Port 445(SMB)
2020-06-23 01:49:22
42.117.34.121 attack
Unauthorized connection attempt detected from IP address 42.117.34.121 to port 23 [J]
2020-01-17 18:13:18
42.117.34.202 attackspam
Unauthorized connection attempt detected from IP address 42.117.34.202 to port 85
2019-12-31 08:38:32
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.117.34.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46198
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.117.34.20.			IN	A

;; AUTHORITY SECTION:
.			401	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019092800 1800 900 604800 86400

;; Query time: 279 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 29 00:30:44 CST 2019
;; MSG SIZE  rcvd: 116
HOST信息:
Host 20.34.117.42.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 20.34.117.42.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.181.4.94 attackspam
Nov 14 12:51:21 srv01 sshd[749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=static-190-181-4-94.acelerate.net  user=root
Nov 14 12:51:23 srv01 sshd[749]: Failed password for root from 190.181.4.94 port 45428 ssh2
Nov 14 12:55:41 srv01 sshd[966]: Invalid user marzullo from 190.181.4.94
Nov 14 12:55:41 srv01 sshd[966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=static-190-181-4-94.acelerate.net
Nov 14 12:55:41 srv01 sshd[966]: Invalid user marzullo from 190.181.4.94
Nov 14 12:55:43 srv01 sshd[966]: Failed password for invalid user marzullo from 190.181.4.94 port 54692 ssh2
...
2019-11-14 22:25:31
124.93.18.202 attack
Invalid user yoyo from 124.93.18.202 port 48481
2019-11-14 21:57:36
110.246.8.43 attackbots
UTC: 2019-11-13 port: 23/tcp
2019-11-14 21:49:25
213.248.151.27 attack
Telnet/23 MH Probe, BF, Hack -
2019-11-14 22:23:06
193.32.160.150 attackspam
Nov 14 14:02:12 relay postfix/smtpd\[15937\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.150\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[193.32.160.151\]\>
Nov 14 14:02:12 relay postfix/smtpd\[15937\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.150\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[193.32.160.151\]\>
Nov 14 14:02:12 relay postfix/smtpd\[15937\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.150\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[193.32.160.151\]\>
Nov 14 14:02:12 relay postfix/smtpd\[15937\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.150\]: 554 5.7.1 \: Relay access denied\; from=\
2019-11-14 21:50:08
88.250.38.30 attackspam
Telnet/23 MH Probe, BF, Hack -
2019-11-14 21:50:45
59.11.233.160 attack
Nov 14 14:18:53 venus sshd\[24828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.11.233.160  user=sync
Nov 14 14:18:55 venus sshd\[24828\]: Failed password for sync from 59.11.233.160 port 40668 ssh2
Nov 14 14:23:44 venus sshd\[24896\]: Invalid user cmh from 59.11.233.160 port 50656
...
2019-11-14 22:27:07
180.76.246.104 attackbotsspam
Automatic report - Banned IP Access
2019-11-14 22:17:58
52.172.211.23 attack
Unauthorized SSH login attempts
2019-11-14 21:51:04
212.64.72.20 attack
Nov 14 15:05:33 MK-Soft-VM6 sshd[4154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.72.20 
Nov 14 15:05:35 MK-Soft-VM6 sshd[4154]: Failed password for invalid user merckling from 212.64.72.20 port 46248 ssh2
...
2019-11-14 22:20:20
129.211.128.20 attackspambots
2019-11-14T08:27:42.148964abusebot-2.cloudsearch.cf sshd\[4286\]: Invalid user castonguay from 129.211.128.20 port 47403
2019-11-14 22:26:25
184.71.191.126 attackbotsspam
RDP Bruteforce
2019-11-14 22:19:35
200.125.121.65 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2019-11-14 22:27:37
93.113.125.89 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-14 22:25:16
162.219.250.25 attackspam
Wordpress login attempts
2019-11-14 21:51:28

最近上报的IP列表

42.118.48.141 151.101.62.104 180.245.157.111 156.208.231.164
171.8.188.70 27.72.48.209 103.58.251.189 5.160.137.27
39.116.1.229 113.103.194.71 103.252.169.174 180.249.200.17
37.137.4.233 36.85.245.6 40.80.148.231 227.76.138.101
181.115.142.175 123.194.89.39 177.73.0.58 156.216.133.81