必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea (the Republic of)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.20.10.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23517
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.20.10.8.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 11:54:36 CST 2025
;; MSG SIZE  rcvd: 103
HOST信息:
Host 8.10.20.42.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 8.10.20.42.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
194.4.41.246 attackspambots
" "
2019-11-08 00:38:27
103.60.167.56 attack
Nov  7 16:29:22 datentool sshd[5038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.60.167.56  user=r.r
Nov  7 16:29:24 datentool sshd[5038]: Failed password for r.r from 103.60.167.56 port 2591 ssh2
Nov  7 16:29:27 datentool sshd[5038]: Failed password for r.r from 103.60.167.56 port 2591 ssh2
Nov  7 16:29:29 datentool sshd[5038]: Failed password for r.r from 103.60.167.56 port 2591 ssh2
Nov  7 16:29:31 datentool sshd[5038]: Failed password for r.r from 103.60.167.56 port 2591 ssh2
Nov  7 16:29:38 datentool sshd[5038]: Failed password for r.r from 103.60.167.56 port 2591 ssh2
Nov  7 16:29:38 datentool sshd[5038]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.60.167.56  user=r.r
Nov  7 16:29:44 datentool sshd[5041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.60.167.56  user=r.r
Nov  7 16:29:46 datentool sshd[5041]: Failed password for r.r f........
-------------------------------
2019-11-08 00:42:04
184.82.197.185 attackspam
Unauthorized connection attempt from IP address 184.82.197.185 on Port 445(SMB)
2019-11-08 01:06:33
138.68.148.177 attackspam
Nov  7 16:35:25 game-panel sshd[24222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.148.177
Nov  7 16:35:27 game-panel sshd[24222]: Failed password for invalid user duke!@# from 138.68.148.177 port 56778 ssh2
Nov  7 16:41:51 game-panel sshd[24487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.148.177
2019-11-08 00:58:39
49.145.204.87 attack
Unauthorized connection attempt from IP address 49.145.204.87 on Port 445(SMB)
2019-11-08 00:41:13
45.82.153.133 attack
Nov  7 16:16:07 marvibiene postfix/smtpd[63747]: warning: unknown[45.82.153.133]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  7 16:16:35 marvibiene postfix/smtpd[63747]: warning: unknown[45.82.153.133]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-08 00:28:49
152.252.127.41 attackspam
SSH/22 MH Probe, BF, Hack -
2019-11-08 00:24:14
152.136.116.121 attackspambots
Nov  7 04:41:14 eddieflores sshd\[24422\]: Invalid user MGR from 152.136.116.121
Nov  7 04:41:14 eddieflores sshd\[24422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.116.121
Nov  7 04:41:16 eddieflores sshd\[24422\]: Failed password for invalid user MGR from 152.136.116.121 port 43376 ssh2
Nov  7 04:47:00 eddieflores sshd\[24892\]: Invalid user noob from 152.136.116.121
Nov  7 04:47:00 eddieflores sshd\[24892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.116.121
2019-11-08 00:36:24
222.186.175.147 attackbots
Nov  7 17:22:37 MK-Soft-Root1 sshd[4038]: Failed password for root from 222.186.175.147 port 36092 ssh2
Nov  7 17:22:42 MK-Soft-Root1 sshd[4038]: Failed password for root from 222.186.175.147 port 36092 ssh2
...
2019-11-08 00:27:48
220.92.16.94 attack
Nov  7 17:00:07 localhost sshd\[28826\]: Invalid user magento from 220.92.16.94 port 53074
Nov  7 17:00:07 localhost sshd\[28826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.92.16.94
Nov  7 17:00:09 localhost sshd\[28826\]: Failed password for invalid user magento from 220.92.16.94 port 53074 ssh2
2019-11-08 01:01:56
69.158.207.141 attack
Nov  6 17:35:19 microserver sshd[11387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.158.207.141  user=root
Nov  6 17:35:21 microserver sshd[11387]: Failed password for root from 69.158.207.141 port 52650 ssh2
Nov  6 17:35:58 microserver sshd[11441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.158.207.141  user=root
Nov  6 17:35:59 microserver sshd[11441]: Failed password for root from 69.158.207.141 port 40270 ssh2
Nov  6 17:36:38 microserver sshd[11477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.158.207.141  user=root
Nov  6 17:47:26 microserver sshd[12883]: Invalid user tomcat from 69.158.207.141 port 39748
Nov  6 17:47:26 microserver sshd[12883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.158.207.141
Nov  6 17:47:28 microserver sshd[12883]: Failed password for invalid user tomcat from 69.158.207.141 port 39748 ssh2
No
2019-11-08 00:23:30
109.237.39.97 attackbots
Port Scan 1433
2019-11-08 00:30:36
152.32.134.90 attack
Nov  6 23:02:52 h2034429 sshd[1749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.134.90  user=r.r
Nov  6 23:02:53 h2034429 sshd[1749]: Failed password for r.r from 152.32.134.90 port 50492 ssh2
Nov  6 23:02:53 h2034429 sshd[1749]: Received disconnect from 152.32.134.90 port 50492:11: Bye Bye [preauth]
Nov  6 23:02:53 h2034429 sshd[1749]: Disconnected from 152.32.134.90 port 50492 [preauth]
Nov  6 23:25:02 h2034429 sshd[2127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.134.90  user=r.r
Nov  6 23:25:04 h2034429 sshd[2127]: Failed password for r.r from 152.32.134.90 port 42708 ssh2
Nov  6 23:25:04 h2034429 sshd[2127]: Received disconnect from 152.32.134.90 port 42708:11: Bye Bye [preauth]
Nov  6 23:25:04 h2034429 sshd[2127]: Disconnected from 152.32.134.90 port 42708 [preauth]
Nov  6 23:29:02 h2034429 sshd[2170]: Invalid user th from 152.32.134.90
Nov  6 23:29:02 h2034429........
-------------------------------
2019-11-08 00:56:22
170.246.1.226 attackspambots
Unauthorized connection attempt from IP address 170.246.1.226 on Port 445(SMB)
2019-11-08 00:35:21
210.212.237.67 attackbotsspam
Invalid user ts3 from 210.212.237.67 port 46662
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.237.67
Failed password for invalid user ts3 from 210.212.237.67 port 46662 ssh2
Invalid user smbguest from 210.212.237.67 port 58412
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.237.67
2019-11-08 00:26:00

最近上报的IP列表

156.118.214.171 174.134.120.91 162.230.240.99 204.17.162.136
189.178.83.168 24.123.188.90 234.124.117.63 223.95.203.146
63.102.31.11 165.174.229.97 187.88.76.174 255.240.188.180
125.205.24.62 186.40.254.122 128.116.195.84 162.218.229.96
204.8.215.127 215.252.60.32 245.250.121.136 46.27.84.37