必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
42.120.161.43 attackbots
The IP has triggered Cloudflare WAF. CF-Ray: 54356e01cb6fe7c5 | WAF_Rule_ID: f6705d4933894b0583ba1042603083f6 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/2 | Method: GET | Host: disqus.skk.moe | User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.81 YisouSpider/5.0 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 00:16:20
42.120.161.37 attack
The IP has triggered Cloudflare WAF. CF-Ray: 54137e915f02d376 | WAF_Rule_ID: f6705d4933894b0583ba1042603083f6 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/2 | Method: GET | Host: disqus.skk.moe | User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.81 YisouSpider/5.0 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 04:20:56
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.120.161.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4170
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.120.161.13.			IN	A

;; AUTHORITY SECTION:
.			488	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062600 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 26 21:40:52 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
13.161.120.42.in-addr.arpa domain name pointer shenmaspider-42-120-161-13.crawl.sm.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
13.161.120.42.in-addr.arpa	name = shenmaspider-42-120-161-13.crawl.sm.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.122.81.135 attackspambots
Attempted connection to port 22228.
2020-04-02 21:11:20
192.162.68.244 attack
CMS (WordPress or Joomla) login attempt.
2020-04-02 20:39:54
213.246.101.134 attackbotsspam
Attempted connection to port 43776.
2020-04-02 21:19:39
171.103.54.166 attackbotsspam
Apr  2 15:31:25 master sshd[12107]: Failed password for invalid user admin from 171.103.54.166 port 54896 ssh2
Apr  2 15:31:46 master sshd[12109]: Failed password for invalid user admin from 171.103.54.166 port 55012 ssh2
2020-04-02 21:00:19
217.113.205.218 attackspam
Attempted connection to port 1726.
2020-04-02 21:16:44
178.69.40.160 attackspambots
<a href=https://cleaningservices.kiev.ua/>клининговые агенства</a> 
Буду очень рада если информация окажется полезной

--
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36 OPR/54.0.2952.64 (Edition Yx)
2020-04-02 20:50:53
159.203.63.125 attackbotsspam
Apr  2 14:38:34 * sshd[10280]: Failed password for root from 159.203.63.125 port 55541 ssh2
2020-04-02 21:23:47
163.172.54.8 attack
[ThuApr0214:47:14.9202992020][:error][pid1854:tid47803671799552][client163.172.54.8:49380][client163.172.54.8]ModSecurity:Accessdeniedwithcode403\(phase2\).Matchof"rx\^[a-z0-9/\\\\\\\\ \\\\\\\\.\\\\\\\\\;\\\\\\\\-\\\\\\\\\,\\\\\\\\=\\\\"\\\\\\\\%_\\\\\\\\\*] \$"against"REQUEST_HEADERS:Content-Type"required.[file"/etc/apache2/conf.d/modsec_rules/99_asl_jitp.conf"][line"5671"][id"334168"][rev"8"][msg"Atomicorp.comWAFRules:Requestcontenttypeheadercontainsinvalidcharacters"][data"/"][severity"CRITICAL"][hostname"ilgiornaledelticino.ch"][uri"/"][unique_id"XoXe0u9MrcKmG9IA10MEUAAAANc"]\,referer:https://www.google.com/[ThuApr0214:47:15.4676512020][:error][pid1705:tid47803574613760][client163.172.54.8:49392][client163.172.54.8]ModSecurity:Accessdeniedwithcode403\(phase2\).Matchof"rx\^[a-z0-9/\\\\\\\\ \\\\\\\\.\\\\\\\\\;\\\\\\\\-\\\\\\\\\,\\\\\\\\=\\\\"\\\\\\\\%_\\\\\\\\\*] \$"against"REQUEST_HEADERS:Content-Type"required.[file"/etc/apache2/conf.d/modsec_rules/99_asl_jitp.conf"][line"5
2020-04-02 21:18:13
49.233.197.193 attackspambots
(sshd) Failed SSH login from 49.233.197.193 (CN/China/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  2 14:30:28 ubnt-55d23 sshd[23639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.197.193  user=root
Apr  2 14:30:30 ubnt-55d23 sshd[23639]: Failed password for root from 49.233.197.193 port 52538 ssh2
2020-04-02 20:47:27
2.88.166.135 attackspam
Attempted connection to port 37330.
2020-04-02 21:24:46
23.41.114.28 attackbots
Attempted connection to port 18671.
2020-04-02 21:07:08
112.27.213.121 attackbotsspam
Unauthorized connection attempt detected from IP address 112.27.213.121 to port 1433 [T]
2020-04-02 20:43:21
89.133.103.216 attackspam
Tried sshing with brute force.
2020-04-02 20:58:06
139.217.96.76 attackspam
Apr  2 15:09:27 hosting sshd[21372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.217.96.76  user=root
Apr  2 15:09:29 hosting sshd[21372]: Failed password for root from 139.217.96.76 port 35894 ssh2
...
2020-04-02 20:45:35
34.216.46.71 attack
Attempted connection to ports 1080, 3128, 443, 80, 8080, 8088.
2020-04-02 20:56:30

最近上报的IP列表

42.120.160.136 180.76.32.159 49.26.1.206 180.76.32.252
180.76.33.55 180.76.33.64 180.76.33.95 180.76.33.150
180.76.34.4 180.76.34.64 180.76.35.6 180.76.34.220
180.76.35.163 180.76.35.44 169.229.254.89 42.156.138.199
111.206.221.163 180.76.56.63 137.226.144.178 137.226.87.18