必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.175.80.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4880
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.175.80.58.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 07:57:43 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 58.80.175.42.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 58.80.175.42.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
117.73.12.128 attackbots
2019-08-04T12:55:06.155734 X postfix/smtpd[51228]: warning: unknown[117.73.12.128]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-08-04T12:55:17.294334 X postfix/smtpd[51228]: warning: unknown[117.73.12.128]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-08-04T12:55:31.312746 X postfix/smtpd[51228]: warning: unknown[117.73.12.128]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-08-04 21:33:59
104.196.50.15 attack
Aug  4 14:51:00 microserver sshd[18096]: Invalid user siva from 104.196.50.15 port 53080
Aug  4 14:51:00 microserver sshd[18096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.196.50.15
Aug  4 14:51:02 microserver sshd[18096]: Failed password for invalid user siva from 104.196.50.15 port 53080 ssh2
Aug  4 14:55:27 microserver sshd[18820]: Invalid user raul from 104.196.50.15 port 49230
Aug  4 14:55:27 microserver sshd[18820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.196.50.15
Aug  4 15:08:37 microserver sshd[20965]: Invalid user 123456 from 104.196.50.15 port 38284
Aug  4 15:08:37 microserver sshd[20965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.196.50.15
Aug  4 15:08:39 microserver sshd[20965]: Failed password for invalid user 123456 from 104.196.50.15 port 38284 ssh2
Aug  4 15:13:07 microserver sshd[21750]: Invalid user subhana from 104.196.50.15 port 34332
Aug
2019-08-04 21:36:32
173.212.209.142 attack
Aug  4 15:29:16 yabzik sshd[19644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.209.142
Aug  4 15:29:17 yabzik sshd[19644]: Failed password for invalid user jen from 173.212.209.142 port 33854 ssh2
Aug  4 15:34:55 yabzik sshd[21305]: Failed password for root from 173.212.209.142 port 59220 ssh2
2019-08-04 21:25:51
91.238.248.251 attackspambots
[portscan] Port scan
2019-08-04 21:16:40
111.77.191.26 attackbots
port scan and connect, tcp 22 (ssh)
2019-08-04 21:22:55
91.119.85.39 attackspam
Aug  4 13:31:29 localhost sshd\[55699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.119.85.39  user=root
Aug  4 13:31:30 localhost sshd\[55699\]: Failed password for root from 91.119.85.39 port 57563 ssh2
...
2019-08-04 20:51:15
167.71.6.221 attackspambots
2019-08-04T11:42:06.187017abusebot-7.cloudsearch.cf sshd\[20692\]: Invalid user hg from 167.71.6.221 port 39058
2019-08-04 21:23:55
192.236.146.154 attackbotsspam
Aug x@x
Aug x@x
Aug x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=192.236.146.154
2019-08-04 21:41:40
61.76.169.138 attack
Aug  4 09:04:29 TORMINT sshd\[10829\]: Invalid user melinda from 61.76.169.138
Aug  4 09:04:29 TORMINT sshd\[10829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.76.169.138
Aug  4 09:04:30 TORMINT sshd\[10829\]: Failed password for invalid user melinda from 61.76.169.138 port 18288 ssh2
...
2019-08-04 21:05:05
120.88.185.39 attackspambots
Aug  4 12:56:40 ArkNodeAT sshd\[13317\]: Invalid user exploit from 120.88.185.39
Aug  4 12:56:40 ArkNodeAT sshd\[13317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.88.185.39
Aug  4 12:56:41 ArkNodeAT sshd\[13317\]: Failed password for invalid user exploit from 120.88.185.39 port 56604 ssh2
2019-08-04 21:14:24
191.235.91.156 attack
Aug  4 16:16:30 vibhu-HP-Z238-Microtower-Workstation sshd\[10988\]: Invalid user jasper from 191.235.91.156
Aug  4 16:16:30 vibhu-HP-Z238-Microtower-Workstation sshd\[10988\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235.91.156
Aug  4 16:16:31 vibhu-HP-Z238-Microtower-Workstation sshd\[10988\]: Failed password for invalid user jasper from 191.235.91.156 port 56744 ssh2
Aug  4 16:25:12 vibhu-HP-Z238-Microtower-Workstation sshd\[11159\]: Invalid user cservice from 191.235.91.156
Aug  4 16:25:12 vibhu-HP-Z238-Microtower-Workstation sshd\[11159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235.91.156
...
2019-08-04 21:47:23
202.181.215.171 attack
Aug  2 05:54:47 vps65 sshd\[27514\]: Invalid user cynthia from 202.181.215.171 port 44664
Aug  2 05:54:47 vps65 sshd\[27514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.181.215.171
...
2019-08-04 21:09:54
188.165.220.213 attackspam
Aug  4 13:40:08 debian sshd\[2583\]: Invalid user mk from 188.165.220.213 port 43902
Aug  4 13:40:08 debian sshd\[2583\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.220.213
...
2019-08-04 20:56:16
200.17.52.115 attackbotsspam
Automatic report - SSH Brute-Force Attack
2019-08-04 21:31:51
165.227.47.191 attackspambots
Aug  3 14:40:01 shared06 sshd[4127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.47.191  user=r.r
Aug  3 14:40:03 shared06 sshd[4127]: Failed password for r.r from 165.227.47.191 port 44150 ssh2
Aug  3 14:40:03 shared06 sshd[4127]: Received disconnect from 165.227.47.191 port 44150:11: Bye Bye [preauth]
Aug  3 14:40:03 shared06 sshd[4127]: Disconnected from 165.227.47.191 port 44150 [preauth]
Aug  3 14:59:22 shared06 sshd[7950]: Invalid user collins from 165.227.47.191
Aug  3 14:59:22 shared06 sshd[7950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.47.191
Aug  3 14:59:24 shared06 sshd[7950]: Failed password for invalid user collins from 165.227.47.191 port 35380 ssh2
Aug  3 14:59:24 shared06 sshd[7950]: Received disconnect from 165.227.47.191 port 35380:11: Bye Bye [preauth]
Aug  3 14:59:24 shared06 sshd[7950]: Disconnected from 165.227.47.191 port 35380 [preauth]


........
--------------------------------
2019-08-04 21:11:42

最近上报的IP列表

51.89.134.173 49.149.204.78 8.21.161.233 48.26.173.78
24.158.145.83 115.13.116.221 235.234.162.185 134.115.27.255
189.207.229.20 118.247.17.56 19.120.162.119 60.113.176.215
130.204.53.205 226.147.163.156 3.243.95.156 162.3.223.212
32.239.183.221 75.154.242.2 50.66.146.137 243.238.252.182