必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.142.157.185
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1960
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.142.157.185.			IN	A

;; AUTHORITY SECTION:
.			263	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020062202 1800 900 604800 86400

;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 23 09:31:20 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
Host 185.157.142.42.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 185.157.142.42.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
50.63.197.102 attackbots
Automatic report - XMLRPC Attack
2019-11-24 15:10:25
104.236.61.100 attackspam
Nov 24 06:54:21 venus sshd\[10937\]: Invalid user bang from 104.236.61.100 port 37998
Nov 24 06:54:21 venus sshd\[10937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.61.100
Nov 24 06:54:23 venus sshd\[10937\]: Failed password for invalid user bang from 104.236.61.100 port 37998 ssh2
...
2019-11-24 15:05:29
46.151.210.60 attackspam
2019-11-24T07:29:49.866357scmdmz1 sshd\[19037\]: Invalid user snowball from 46.151.210.60 port 37362
2019-11-24T07:29:49.869097scmdmz1 sshd\[19037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.151.210.60
2019-11-24T07:29:52.236608scmdmz1 sshd\[19037\]: Failed password for invalid user snowball from 46.151.210.60 port 37362 ssh2
...
2019-11-24 14:48:13
129.226.67.136 attackspambots
Lines containing failures of 129.226.67.136
Nov 21 03:56:37 mellenthin sshd[14293]: User nobody from 129.226.67.136 not allowed because not listed in AllowUsers
Nov 21 03:56:37 mellenthin sshd[14293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.67.136  user=nobody
Nov 21 03:56:39 mellenthin sshd[14293]: Failed password for invalid user nobody from 129.226.67.136 port 56440 ssh2
Nov 21 03:56:40 mellenthin sshd[14293]: Received disconnect from 129.226.67.136 port 56440:11: Bye Bye [preauth]
Nov 21 03:56:40 mellenthin sshd[14293]: Disconnected from invalid user nobody 129.226.67.136 port 56440 [preauth]
Nov 21 04:05:41 mellenthin sshd[14356]: User r.r from 129.226.67.136 not allowed because not listed in AllowUsers
Nov 21 04:05:41 mellenthin sshd[14356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.67.136  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?
2019-11-24 14:59:42
178.128.171.124 attackspam
failed_logins
2019-11-24 14:50:20
116.196.90.254 attackspam
Nov 23 20:21:23 web1 sshd\[14663\]: Invalid user shanping from 116.196.90.254
Nov 23 20:21:23 web1 sshd\[14663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.90.254
Nov 23 20:21:25 web1 sshd\[14663\]: Failed password for invalid user shanping from 116.196.90.254 port 50220 ssh2
Nov 23 20:29:53 web1 sshd\[15614\]: Invalid user livro from 116.196.90.254
Nov 23 20:29:53 web1 sshd\[15614\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.90.254
2019-11-24 14:46:21
45.136.109.95 attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-11-24 15:00:40
178.170.54.191 attackspam
DATE:2019-11-24 07:29:45, IP:178.170.54.191, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-11-24 14:52:28
52.219.4.197 attack
52.219.4.197 was recorded 5 times by 1 hosts attempting to connect to the following ports: 20710. Incident counter (4h, 24h, all-time): 5, 5, 5
2019-11-24 14:53:25
66.240.219.146 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2019-11-24 15:15:07
190.64.68.178 attackspam
Nov 24 06:46:13 venus sshd\[10814\]: Invalid user db2inst1 from 190.64.68.178 port 9281
Nov 24 06:46:13 venus sshd\[10814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.68.178
Nov 24 06:46:16 venus sshd\[10814\]: Failed password for invalid user db2inst1 from 190.64.68.178 port 9281 ssh2
...
2019-11-24 14:54:15
41.202.170.84 attackspam
Nov 24 07:29:32 MK-Soft-VM3 sshd[16540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.202.170.84 
Nov 24 07:29:34 MK-Soft-VM3 sshd[16540]: Failed password for invalid user admin from 41.202.170.84 port 42056 ssh2
...
2019-11-24 15:01:27
37.187.192.162 attackspam
Nov 24 07:29:52 localhost sshd\[22105\]: Invalid user aamavis from 37.187.192.162 port 60748
Nov 24 07:29:52 localhost sshd\[22105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.192.162
Nov 24 07:29:54 localhost sshd\[22105\]: Failed password for invalid user aamavis from 37.187.192.162 port 60748 ssh2
2019-11-24 14:47:23
45.141.84.18 attackbotsspam
Nov 24 07:49:00 mail postfix/smtpd[29854]: warning: unknown[45.141.84.18]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 24 07:54:32 mail postfix/smtpd[32562]: warning: unknown[45.141.84.18]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 24 07:58:31 mail postfix/smtpd[32527]: warning: unknown[45.141.84.18]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-24 15:10:07
136.228.160.206 attack
2019-11-24T06:29:41.865163abusebot-4.cloudsearch.cf sshd\[12985\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.228.160.206  user=root
2019-11-24 14:54:47

最近上报的IP列表

161.35.56.201 98.35.33.184 161.19.133.203 52.98.248.189
27.200.87.166 121.158.151.159 41.93.188.64 172.217.162.110
0.206.116.27 142.93.212.186 2.32.82.50 123.152.114.137
200.232.6.7 103.196.22.113 103.107.187.252 102.53.4.42
149.41.211.165 65.87.40.88 43.225.159.248 13.95.92.210