必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.224.122.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43816
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.224.122.5.			IN	A

;; AUTHORITY SECTION:
.			136	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 08:43:14 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
5.122.224.42.in-addr.arpa domain name pointer hn.kd.ny.adsl.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
5.122.224.42.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
89.204.154.246 attackspam
Autoban   89.204.154.246 AUTH/CONNECT
2019-08-07 14:44:15
210.176.100.37 attack
B: zzZZzz blocked content access
2019-08-07 14:58:05
58.249.125.38 attackbots
Aug  7 09:04:12 dedicated sshd[26635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.249.125.38  user=root
Aug  7 09:04:14 dedicated sshd[26635]: Failed password for root from 58.249.125.38 port 37434 ssh2
2019-08-07 15:09:44
191.240.25.174 attack
SASL PLAIN auth failed: ruser=...
2019-08-07 14:45:21
2a01:4f8:160:2492::2 attackbotsspam
WordPress wp-login brute force :: 2a01:4f8:160:2492::2 0.056 BYPASS [07/Aug/2019:16:05:52  1000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 4630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-07 14:47:21
37.187.122.195 attackbotsspam
Aug  7 08:18:28 microserver sshd[56034]: Invalid user murp from 37.187.122.195 port 36628
Aug  7 08:18:28 microserver sshd[56034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.122.195
Aug  7 08:18:30 microserver sshd[56034]: Failed password for invalid user murp from 37.187.122.195 port 36628 ssh2
Aug  7 08:23:35 microserver sshd[56748]: Invalid user cesar from 37.187.122.195 port 60744
Aug  7 08:23:35 microserver sshd[56748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.122.195
Aug  7 08:33:39 microserver sshd[3541]: Invalid user test from 37.187.122.195 port 52442
Aug  7 08:33:39 microserver sshd[3541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.122.195
Aug  7 08:33:41 microserver sshd[3541]: Failed password for invalid user test from 37.187.122.195 port 52442 ssh2
Aug  7 08:38:47 microserver sshd[4940]: Invalid user timemachine from 37.187.122.195 port 4823
2019-08-07 14:44:41
66.70.130.145 attack
Aug  7 09:04:15 herz-der-gamer sshd[7309]: Invalid user test1 from 66.70.130.145 port 60496
Aug  7 09:04:15 herz-der-gamer sshd[7309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.130.145
Aug  7 09:04:15 herz-der-gamer sshd[7309]: Invalid user test1 from 66.70.130.145 port 60496
Aug  7 09:04:16 herz-der-gamer sshd[7309]: Failed password for invalid user test1 from 66.70.130.145 port 60496 ssh2
...
2019-08-07 15:08:50
112.85.42.237 attackbotsspam
Aug  7 02:03:37 aat-srv002 sshd[2404]: Failed password for root from 112.85.42.237 port 43572 ssh2
Aug  7 02:20:52 aat-srv002 sshd[2656]: Failed password for root from 112.85.42.237 port 56178 ssh2
Aug  7 02:22:32 aat-srv002 sshd[2690]: Failed password for root from 112.85.42.237 port 61781 ssh2
...
2019-08-07 15:35:35
91.248.47.183 attackbots
Automatic report - Port Scan Attack
2019-08-07 14:42:42
190.205.56.52 attack
Port Scan: TCP/445
2019-08-07 14:57:39
112.196.107.50 attackspam
2019-08-07T06:08:56.066736abusebot-2.cloudsearch.cf sshd\[11905\]: Invalid user ldapuser from 112.196.107.50 port 37001
2019-08-07 14:38:25
45.12.161.6 attack
Aug  7 10:20:58 tuotantolaitos sshd[18673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.12.161.6
Aug  7 10:21:01 tuotantolaitos sshd[18673]: Failed password for invalid user scaner from 45.12.161.6 port 39982 ssh2
...
2019-08-07 15:22:50
129.213.153.229 attackspam
2019-08-06 20:13:14,967 fail2ban.actions        [791]: NOTICE  [sshd] Ban 129.213.153.229
2019-08-06 23:18:33,153 fail2ban.actions        [791]: NOTICE  [sshd] Ban 129.213.153.229
2019-08-07 02:23:03,168 fail2ban.actions        [791]: NOTICE  [sshd] Ban 129.213.153.229
...
2019-08-07 14:52:29
212.92.121.187 attackspam
RDP Bruteforce
2019-08-07 15:13:22
185.220.101.44 attack
k+ssh-bruteforce
2019-08-07 15:11:22

最近上报的IP列表

42.224.126.14 213.85.174.138 42.224.139.244 42.202.103.125
42.224.0.108 42.224.148.162 42.224.141.61 42.224.151.241
42.224.151.29 42.224.144.153 42.224.151.27 42.224.169.201
42.224.153.57 42.224.171.41 42.224.147.197 42.224.157.3
42.224.177.113 42.224.215.225 42.224.22.181 42.224.224.106