必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.224.141.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59981
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.224.141.61.			IN	A

;; AUTHORITY SECTION:
.			372	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 08:43:15 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
61.141.224.42.in-addr.arpa domain name pointer hn.kd.ny.adsl.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
61.141.224.42.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.253.191.89 attackbots
1591272138 - 06/04/2020 14:02:18 Host: 14.253.191.89/14.253.191.89 Port: 445 TCP Blocked
2020-06-05 02:39:16
138.204.74.42 attack
Icarus honeypot on github
2020-06-05 03:02:42
116.255.131.3 attackbots
Jun  4 17:01:31 PorscheCustomer sshd[25801]: Failed password for root from 116.255.131.3 port 39268 ssh2
Jun  4 17:05:41 PorscheCustomer sshd[25980]: Failed password for root from 116.255.131.3 port 60424 ssh2
...
2020-06-05 02:35:18
95.111.237.161 attackspambots
Jun  4 14:25:29 sso sshd[4527]: Failed password for root from 95.111.237.161 port 52774 ssh2
...
2020-06-05 02:48:02
111.229.142.17 attackbotsspam
Jun  4 13:53:12 serwer sshd\[23249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.142.17  user=root
Jun  4 13:53:14 serwer sshd\[23249\]: Failed password for root from 111.229.142.17 port 59348 ssh2
Jun  4 14:02:34 serwer sshd\[24788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.142.17  user=root
...
2020-06-05 02:24:16
193.169.212.106 attackspam
SpamScore above: 10.0
2020-06-05 02:58:28
66.240.236.119 attackspambots
Unauthorized connection attempt detected from IP address 66.240.236.119 to port 5560
2020-06-05 02:38:31
213.183.101.89 attackspambots
Jun  4 13:55:01 legacy sshd[22834]: Failed password for root from 213.183.101.89 port 47860 ssh2
Jun  4 13:58:42 legacy sshd[22906]: Failed password for root from 213.183.101.89 port 50222 ssh2
...
2020-06-05 02:37:28
211.218.123.222 attackspambots
Jun  4 15:02:15 debian kernel: [174698.494878] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=211.218.123.222 DST=89.252.131.35 LEN=40 TOS=0x00 PREC=0x00 TTL=42 ID=62223 PROTO=TCP SPT=51054 DPT=2323 WINDOW=61790 RES=0x00 SYN URGP=0
2020-06-05 02:42:09
222.186.175.167 attack
Jun  4 20:20:06 server sshd[12985]: Failed none for root from 222.186.175.167 port 54650 ssh2
Jun  4 20:20:08 server sshd[12985]: Failed password for root from 222.186.175.167 port 54650 ssh2
Jun  4 20:20:14 server sshd[12985]: Failed password for root from 222.186.175.167 port 54650 ssh2
2020-06-05 02:31:14
201.40.244.146 attackspambots
Jun  4 15:01:06 melroy-server sshd[28237]: Failed password for root from 201.40.244.146 port 60568 ssh2
...
2020-06-05 02:48:46
195.97.5.66 attackspambots
Unauthorized connection attempt from IP address 195.97.5.66 on Port 445(SMB)
2020-06-05 03:00:42
115.159.69.193 attackspambots
Jun  4 15:03:40 santamaria sshd\[8632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.69.193  user=root
Jun  4 15:03:42 santamaria sshd\[8632\]: Failed password for root from 115.159.69.193 port 53601 ssh2
Jun  4 15:05:50 santamaria sshd\[8641\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.69.193  user=root
...
2020-06-05 02:36:15
85.209.0.107 attackspam
port scan and connect, tcp 3128 (squid-http)
2020-06-05 02:29:26
134.209.41.198 attack
Jun  4 11:56:11 ip-172-31-62-245 sshd\[23556\]: Failed password for root from 134.209.41.198 port 38914 ssh2\
Jun  4 11:57:44 ip-172-31-62-245 sshd\[23574\]: Failed password for root from 134.209.41.198 port 37776 ssh2\
Jun  4 11:59:20 ip-172-31-62-245 sshd\[23603\]: Failed password for root from 134.209.41.198 port 36276 ssh2\
Jun  4 12:00:58 ip-172-31-62-245 sshd\[23634\]: Failed password for root from 134.209.41.198 port 35138 ssh2\
Jun  4 12:02:30 ip-172-31-62-245 sshd\[23667\]: Failed password for root from 134.209.41.198 port 33648 ssh2\
2020-06-05 02:34:12

最近上报的IP列表

42.224.148.162 42.224.151.241 42.224.151.29 42.224.144.153
42.224.151.27 42.224.169.201 42.224.153.57 42.224.171.41
42.224.147.197 42.224.157.3 42.224.177.113 42.224.215.225
42.224.22.181 42.224.224.106 42.224.225.255 42.224.228.48
42.224.25.104 42.224.29.124 42.224.247.124 42.224.243.207