必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.157.220.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9255
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.157.220.13.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023032501 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 26 03:21:57 CST 2023
;; MSG SIZE  rcvd: 106
HOST信息:
Host 13.220.157.42.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.220.157.42.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
5.45.132.96 attackspambots
22,88-01/01 [bc00/m121] PostRequest-Spammer scoring: Lusaka01
2020-10-02 17:24:04
190.133.210.32 attackbotsspam
Lines containing failures of 190.133.210.32 (max 1000)
Oct  1 22:39:29 srv sshd[80140]: Connection closed by 190.133.210.32 port 54713
Oct  1 22:39:33 srv sshd[80142]: Invalid user thostname0nich from 190.133.210.32 port 55051


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=190.133.210.32
2020-10-02 17:06:02
202.150.144.65 attackbots
IP attempted unauthorised action
2020-10-02 17:39:31
51.77.146.156 attackbotsspam
Invalid user jeremiah from 51.77.146.156 port 59778
2020-10-02 17:04:04
197.38.216.179 attack
firewall-block, port(s): 23/tcp
2020-10-02 17:23:13
36.91.97.122 attackbotsspam
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-10-02 17:02:07
5.9.70.117 attack
20 attempts against mh-misbehave-ban on lake
2020-10-02 17:21:09
217.11.188.156 attackspambots
Listed on    abuseat.org plus barracudaCentral and zen-spamhaus   / proto=6  .  srcport=58313  .  dstport=445 SMB  .     (3839)
2020-10-02 17:12:37
196.191.79.125 attackbots
Unauthorized access to SSH at 1/Oct/2020:20:40:25 +0000.
2020-10-02 17:23:30
103.154.234.241 attack
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-10-02 17:16:45
5.188.62.15 attackspambots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-10-02T09:06:26Z and 2020-10-02T09:18:43Z
2020-10-02 17:26:10
110.49.71.247 attackbotsspam
Oct  2 03:43:42 serwer sshd\[12943\]: Invalid user postgres from 110.49.71.247 port 60041
Oct  2 03:43:42 serwer sshd\[12943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.71.247
Oct  2 03:43:44 serwer sshd\[12943\]: Failed password for invalid user postgres from 110.49.71.247 port 60041 ssh2
...
2020-10-02 17:34:29
115.73.222.9 attack
IP 115.73.222.9 attacked honeypot on port: 3389 at 10/1/2020 1:40:09 PM
2020-10-02 17:05:22
46.101.4.101 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-02T09:19:03Z and 2020-10-02T09:25:45Z
2020-10-02 17:29:31
212.70.149.83 attackspam
2020-10-02 12:15:13 auth_plain authenticator failed for (User) [212.70.149.83]: 535 Incorrect authentication data (set_id=ab@com.ua)
2020-10-02 12:15:39 auth_plain authenticator failed for (User) [212.70.149.83]: 535 Incorrect authentication data (set_id=dns03@com.ua)
...
2020-10-02 17:17:44

最近上报的IP列表

153.92.9.174 120.245.61.120 153.122.81.62 170.83.43.6
3.85.89.204 113.24.225.105 178.51.231.2 81.220.69.22
201.72.110.61 113.24.225.145 198.98.61.69 198.98.47.59
209.227.203.1 36.249.52.155 101.36.228.101 103.146.52.51
86.128.5.99 75.238.127.41 26.16.5.60 159.87.187.79