必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.123.169.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17349
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.123.169.20.			IN	A

;; AUTHORITY SECTION:
.			590	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090400 1800 900 604800 86400

;; Query time: 85 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 04 16:45:09 CST 2020
;; MSG SIZE  rcvd: 117
HOST信息:
Host 20.169.123.42.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.169.123.42.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
149.56.99.85 attackspambots
Jan 26 14:21:18 xeon sshd[56735]: Failed password for root from 149.56.99.85 port 53108 ssh2
2020-01-26 22:10:38
171.252.131.251 attack
Unauthorized connection attempt from IP address 171.252.131.251 on Port 445(SMB)
2020-01-26 22:03:48
200.46.56.62 attackbots
Unauthorized connection attempt from IP address 200.46.56.62 on Port 445(SMB)
2020-01-26 22:06:21
103.27.238.202 attack
Jan 26 03:27:54 php1 sshd\[21060\]: Invalid user teamspeak from 103.27.238.202
Jan 26 03:27:54 php1 sshd\[21060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.27.238.202
Jan 26 03:27:56 php1 sshd\[21060\]: Failed password for invalid user teamspeak from 103.27.238.202 port 36692 ssh2
Jan 26 03:31:02 php1 sshd\[21608\]: Invalid user loki from 103.27.238.202
Jan 26 03:31:02 php1 sshd\[21608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.27.238.202
2020-01-26 21:50:47
117.50.25.196 attackbots
ssh failed login
2020-01-26 21:44:56
142.44.160.214 attack
Jan 26 14:15:48 163-172-32-151 sshd[15613]: Invalid user hath from 142.44.160.214 port 57600
...
2020-01-26 21:32:16
112.251.156.122 attack
Honeypot attack, port: 5555, PTR: PTR record not found
2020-01-26 21:51:29
165.22.51.39 attack
PHP DIESCAN Information Disclosure Vulnerability
2020-01-26 22:08:29
122.176.122.232 attackbots
PHP DIESCAN Information Disclosure Vulnerability
2020-01-26 22:04:50
125.230.69.108 attackbots
Unauthorized connection attempt from IP address 125.230.69.108 on Port 445(SMB)
2020-01-26 21:40:15
165.22.247.196 attackbotsspam
Jan 26 03:11:46 eddieflores sshd\[21668\]: Invalid user t1 from 165.22.247.196
Jan 26 03:11:46 eddieflores sshd\[21668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.247.196
Jan 26 03:11:47 eddieflores sshd\[21668\]: Failed password for invalid user t1 from 165.22.247.196 port 37540 ssh2
Jan 26 03:15:20 eddieflores sshd\[22107\]: Invalid user cip from 165.22.247.196
Jan 26 03:15:20 eddieflores sshd\[22107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.247.196
2020-01-26 22:04:05
94.191.120.108 attack
Jan 26 14:28:14 sd-53420 sshd\[18474\]: Invalid user akiyama from 94.191.120.108
Jan 26 14:28:14 sd-53420 sshd\[18474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.120.108
Jan 26 14:28:16 sd-53420 sshd\[18474\]: Failed password for invalid user akiyama from 94.191.120.108 port 51622 ssh2
Jan 26 14:30:48 sd-53420 sshd\[18883\]: Invalid user install from 94.191.120.108
Jan 26 14:30:48 sd-53420 sshd\[18883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.120.108
...
2020-01-26 21:36:51
49.145.198.248 attack
Unauthorized connection attempt from IP address 49.145.198.248 on Port 445(SMB)
2020-01-26 22:10:07
190.189.42.90 attackspambots
Honeypot attack, port: 81, PTR: 90-42-189-190.cab.prima.net.ar.
2020-01-26 21:58:20
72.252.247.85 attackbotsspam
01/26/2020-14:15:46.290503 72.252.247.85 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-01-26 21:35:49

最近上报的IP列表

115.159.196.199 110.36.238.146 211.118.226.133 162.142.125.30
190.39.57.12 124.234.141.235 186.92.79.112 182.111.246.77
152.200.55.85 81.84.116.137 88.147.153.4 117.160.113.91
196.197.215.163 133.56.39.246 2.217.217.176 135.105.214.183
61.100.3.100 175.1.191.76 193.127.179.42 15.100.172.105