必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.121.135.226
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1442
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.121.135.226.			IN	A

;; AUTHORITY SECTION:
.			459	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061801 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 19 05:14:08 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 226.135.121.42.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 226.135.121.42.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.180.9 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.9  user=root
Failed password for root from 222.186.180.9 port 55978 ssh2
Failed password for root from 222.186.180.9 port 55978 ssh2
Failed password for root from 222.186.180.9 port 55978 ssh2
Failed password for root from 222.186.180.9 port 55978 ssh2
2020-01-24 02:43:50
104.236.78.228 attackspam
Jan 23 19:24:05 tuxlinux sshd[26033]: Invalid user dis from 104.236.78.228 port 56897
Jan 23 19:24:05 tuxlinux sshd[26033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.78.228 
Jan 23 19:24:05 tuxlinux sshd[26033]: Invalid user dis from 104.236.78.228 port 56897
Jan 23 19:24:05 tuxlinux sshd[26033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.78.228 
Jan 23 19:24:05 tuxlinux sshd[26033]: Invalid user dis from 104.236.78.228 port 56897
Jan 23 19:24:05 tuxlinux sshd[26033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.78.228 
Jan 23 19:24:08 tuxlinux sshd[26033]: Failed password for invalid user dis from 104.236.78.228 port 56897 ssh2
...
2020-01-24 02:35:51
128.199.85.55 attackbotsspam
Unauthorized connection attempt detected from IP address 128.199.85.55 to port 2220 [J]
2020-01-24 02:34:16
128.199.235.49 attack
Unauthorized connection attempt detected from IP address 128.199.235.49 to port 2220 [J]
2020-01-24 02:51:56
119.249.54.162 attackbots
Jan 23 19:43:27 debian-2gb-nbg1-2 kernel: \[2064285.154292\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=119.249.54.162 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=106 ID=256 PROTO=TCP SPT=42206 DPT=1433 WINDOW=16384 RES=0x00 SYN URGP=0
2020-01-24 03:08:45
222.186.173.238 attack
Jan 23 19:37:51 * sshd[20435]: Failed password for root from 222.186.173.238 port 11770 ssh2
Jan 23 19:38:05 * sshd[20435]: error: maximum authentication attempts exceeded for root from 222.186.173.238 port 11770 ssh2 [preauth]
2020-01-24 02:47:26
213.240.66.6 attackspam
Unauthorized connection attempt detected from IP address 213.240.66.6 to port 22 [J]
2020-01-24 02:37:45
109.25.112.43 attack
Honeypot attack, port: 81, PTR: 43.112.25.109.rev.sfr.net.
2020-01-24 03:01:19
89.205.126.245 attack
Unauthorized connection attempt detected from IP address 89.205.126.245 to port 26 [J]
2020-01-24 02:40:46
5.101.138.142 attackbotsspam
2020-01-23T16:17:12.918677shield sshd\[26862\]: Invalid user postgres from 5.101.138.142 port 35124
2020-01-23T16:17:12.927456shield sshd\[26862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.101.138.142
2020-01-23T16:17:14.790481shield sshd\[26862\]: Failed password for invalid user postgres from 5.101.138.142 port 35124 ssh2
2020-01-23T16:20:17.210108shield sshd\[28320\]: Invalid user postgres from 5.101.138.142 port 46174
2020-01-23T16:20:17.214790shield sshd\[28320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.101.138.142
2020-01-24 03:03:13
139.99.88.131 attackspam
Jan 23 19:28:58 meumeu sshd[28943]: Failed password for root from 139.99.88.131 port 58006 ssh2
Jan 23 19:33:51 meumeu sshd[29629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.88.131 
Jan 23 19:33:52 meumeu sshd[29629]: Failed password for invalid user jhkim from 139.99.88.131 port 59530 ssh2
...
2020-01-24 02:50:09
170.130.187.26 attack
Unauthorized connection attempt detected from IP address 170.130.187.26 to port 21 [J]
2020-01-24 03:09:58
87.122.221.79 attack
IP attempted unauthorised action
2020-01-24 02:47:50
118.70.54.209 attack
Unauthorized connection attempt from IP address 118.70.54.209 on Port 445(SMB)
2020-01-24 02:34:49
106.13.86.236 attack
Invalid user pliki from 106.13.86.236 port 56834
2020-01-24 02:52:15

最近上报的IP列表

51.79.144.41 16.98.229.78 19.149.40.28 2.20.165.10
232.189.108.232 45.173.50.120 209.206.32.142 113.210.133.31
86.118.202.70 250.10.84.122 254.154.11.24 215.63.198.154
14.230.171.216 171.255.124.108 11.90.150.130 149.36.122.194
100.119.206.17 67.118.181.18 195.253.188.234 131.96.66.8