必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.228.231.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18120
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.228.231.20.			IN	A

;; AUTHORITY SECTION:
.			466	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 08:43:37 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
20.231.228.42.in-addr.arpa domain name pointer hn.kd.ny.adsl.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.231.228.42.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.12.162.201 attackspambots
May 21 14:54:17 pkdns2 sshd\[52004\]: Invalid user azn from 106.12.162.201May 21 14:54:19 pkdns2 sshd\[52004\]: Failed password for invalid user azn from 106.12.162.201 port 47792 ssh2May 21 14:58:47 pkdns2 sshd\[52263\]: Invalid user fmh from 106.12.162.201May 21 14:58:48 pkdns2 sshd\[52263\]: Failed password for invalid user fmh from 106.12.162.201 port 47056 ssh2May 21 15:03:38 pkdns2 sshd\[52534\]: Invalid user qpm from 106.12.162.201May 21 15:03:40 pkdns2 sshd\[52534\]: Failed password for invalid user qpm from 106.12.162.201 port 46344 ssh2
...
2020-05-21 20:53:23
185.86.164.101 attack
probing GET /administrator/index.php?option=com_login
2020-05-21 21:26:23
195.208.218.95 attackbotsspam
SMB Server BruteForce Attack
2020-05-21 21:05:56
195.54.160.159 attackbots
05/21/2020-08:24:46.442557 195.54.160.159 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-21 21:06:13
185.220.100.255 attackspam
2020-05-21T13:58:01.042838wiz-ks3 sshd[21066]: Invalid user public from 185.220.100.255 port 13450
2020-05-21T13:58:01.192267wiz-ks3 sshd[21066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.100.255
2020-05-21T13:58:01.042838wiz-ks3 sshd[21066]: Invalid user public from 185.220.100.255 port 13450
2020-05-21T13:58:03.784361wiz-ks3 sshd[21066]: Failed password for invalid user public from 185.220.100.255 port 13450 ssh2
2020-05-21T14:00:00.653962wiz-ks3 sshd[21138]: Invalid user Alphanetworks from 185.220.100.255 port 2326
2020-05-21T14:00:01.058703wiz-ks3 sshd[21138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.100.255
2020-05-21T14:00:00.653962wiz-ks3 sshd[21138]: Invalid user Alphanetworks from 185.220.100.255 port 2326
2020-05-21T14:00:03.455468wiz-ks3 sshd[21138]: Failed password for invalid user Alphanetworks from 185.220.100.255 port 2326 ssh2
2020-05-21T14:03:27.227704wiz-ks3 sshd[21287]: pam_unix(sshd
2020-05-21 21:04:40
140.249.30.203 attackbots
May 21 14:56:16 buvik sshd[12770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.30.203
May 21 14:56:17 buvik sshd[12770]: Failed password for invalid user bzo from 140.249.30.203 port 51088 ssh2
May 21 15:00:54 buvik sshd[13836]: Invalid user lcr from 140.249.30.203
...
2020-05-21 21:15:37
46.236.135.75 attackbots
May 21 13:59:44 mailserver sshd[6610]: Did not receive identification string from 46.236.135.75
May 21 14:00:00 mailserver sshd[6612]: Invalid user 666666 from 46.236.135.75
May 21 14:00:00 mailserver sshd[6612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.236.135.75
May 21 14:00:02 mailserver sshd[6612]: Failed password for invalid user 666666 from 46.236.135.75 port 64208 ssh2
May 21 14:00:02 mailserver sshd[6612]: Connection closed by 46.236.135.75 port 64208 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=46.236.135.75
2020-05-21 21:14:41
139.59.60.220 attackbots
May 21 14:46:12 legacy sshd[2102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.60.220
May 21 14:46:14 legacy sshd[2102]: Failed password for invalid user txl from 139.59.60.220 port 41312 ssh2
May 21 14:49:28 legacy sshd[2236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.60.220
...
2020-05-21 20:56:02
218.98.26.102 attackspambots
May 21 13:03:19 sigma sshd\[5171\]: Invalid user ivn from 218.98.26.102May 21 13:03:21 sigma sshd\[5171\]: Failed password for invalid user ivn from 218.98.26.102 port 35478 ssh2
...
2020-05-21 21:10:36
120.53.10.191 attack
...
2020-05-21 21:12:57
101.91.238.160 attackspam
bruteforce detected
2020-05-21 21:21:58
195.54.161.40 attack
firewall-block, port(s): 33033/tcp
2020-05-21 20:51:28
39.97.105.66 attack
May 21 15:03:55 vps687878 sshd\[17907\]: Failed password for invalid user fic from 39.97.105.66 port 60936 ssh2
May 21 15:05:00 vps687878 sshd\[17964\]: Invalid user aji from 39.97.105.66 port 43736
May 21 15:05:00 vps687878 sshd\[17964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.97.105.66
May 21 15:05:02 vps687878 sshd\[17964\]: Failed password for invalid user aji from 39.97.105.66 port 43736 ssh2
May 21 15:06:08 vps687878 sshd\[18222\]: Invalid user psr from 39.97.105.66 port 54768
May 21 15:06:08 vps687878 sshd\[18222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.97.105.66
...
2020-05-21 21:15:01
89.144.16.148 attack
2020-05-21 07:02:31.076696-0500  localhost smtpd[76089]: NOQUEUE: reject: RCPT from unknown[89.144.16.148]: 450 4.7.25 Client host rejected: cannot find your hostname, [89.144.16.148]; from=<> to= proto=ESMTP helo=<43br.dfdrjjxm.com>
2020-05-21 21:27:23
223.70.214.110 attackbots
2020-05-21T08:36:58.099325xentho-1 sshd[646352]: Invalid user zuw from 223.70.214.110 port 24930
2020-05-21T08:37:00.192518xentho-1 sshd[646352]: Failed password for invalid user zuw from 223.70.214.110 port 24930 ssh2
2020-05-21T08:38:15.225239xentho-1 sshd[646364]: Invalid user xfg from 223.70.214.110 port 25302
2020-05-21T08:38:15.231688xentho-1 sshd[646364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.70.214.110
2020-05-21T08:38:15.225239xentho-1 sshd[646364]: Invalid user xfg from 223.70.214.110 port 25302
2020-05-21T08:38:17.890747xentho-1 sshd[646364]: Failed password for invalid user xfg from 223.70.214.110 port 25302 ssh2
2020-05-21T08:39:36.406425xentho-1 sshd[646386]: Invalid user hly from 223.70.214.110 port 25679
2020-05-21T08:39:36.413877xentho-1 sshd[646386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.70.214.110
2020-05-21T08:39:36.406425xentho-1 sshd[646386]: Invalid user hl
...
2020-05-21 21:23:08

最近上报的IP列表

42.228.220.17 42.228.225.214 42.228.234.76 42.228.237.129
42.228.239.117 42.228.33.245 42.228.252.244 42.228.43.172
42.228.44.140 42.228.44.20 42.228.45.144 42.228.67.187
42.228.68.117 42.228.38.118 42.228.73.66 42.229.104.235
42.228.72.69 42.229.156.169 42.229.218.232 42.229.156.104