必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Nanyang

省份(region): Henan

国家(country): China

运营商(isp): China Unicom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.232.116.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6785
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.232.116.129.			IN	A

;; AUTHORITY SECTION:
.			397	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019092501 1800 900 604800 86400

;; Query time: 108 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 26 03:22:56 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
129.116.232.42.in-addr.arpa domain name pointer hn.kd.ny.adsl.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
129.116.232.42.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.104.225.140 attackspambots
<6 unauthorized SSH connections
2020-08-16 15:25:35
114.69.232.170 attackbotsspam
Aug 16 09:33:11 eventyay sshd[8608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.69.232.170
Aug 16 09:33:14 eventyay sshd[8608]: Failed password for invalid user P@ssw0rdp! from 114.69.232.170 port 54406 ssh2
Aug 16 09:37:29 eventyay sshd[8692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.69.232.170
...
2020-08-16 15:40:10
106.13.165.247 attackspambots
2020-08-15T22:53:05.482762morrigan.ad5gb.com sshd[147704]: Failed password for root from 106.13.165.247 port 46030 ssh2
2020-08-15T22:53:06.015191morrigan.ad5gb.com sshd[147704]: Disconnected from authenticating user root 106.13.165.247 port 46030 [preauth]
2020-08-16 15:51:39
163.172.183.24 attackspambots
Aug 16 07:47:13 game-panel sshd[24499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.183.24
Aug 16 07:47:15 game-panel sshd[24499]: Failed password for invalid user wangyin from 163.172.183.24 port 50408 ssh2
Aug 16 07:47:37 game-panel sshd[24502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.183.24
2020-08-16 15:48:50
192.99.34.42 attackspambots
192.99.34.42 - - [16/Aug/2020:08:19:38 +0100] "POST /wp-login.php HTTP/1.1" 200 5647 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
192.99.34.42 - - [16/Aug/2020:08:20:41 +0100] "POST /wp-login.php HTTP/1.1" 200 5647 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
192.99.34.42 - - [16/Aug/2020:08:21:48 +0100] "POST /wp-login.php HTTP/1.1" 200 5647 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-08-16 15:24:37
46.148.21.32 attackbotsspam
Aug 16 05:53:45 amit sshd\[21148\]: Invalid user tester from 46.148.21.32
Aug 16 05:53:45 amit sshd\[21148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.148.21.32
Aug 16 05:53:47 amit sshd\[21148\]: Failed password for invalid user tester from 46.148.21.32 port 36914 ssh2
...
2020-08-16 15:26:26
128.199.101.113 attackbotsspam
Aug 16 09:20:13 lukav-desktop sshd\[5180\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.101.113  user=root
Aug 16 09:20:15 lukav-desktop sshd\[5180\]: Failed password for root from 128.199.101.113 port 44198 ssh2
Aug 16 09:23:59 lukav-desktop sshd\[7386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.101.113  user=root
Aug 16 09:24:00 lukav-desktop sshd\[7386\]: Failed password for root from 128.199.101.113 port 43026 ssh2
Aug 16 09:27:42 lukav-desktop sshd\[9579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.101.113  user=root
2020-08-16 15:27:43
58.219.253.181 attackbotsspam
Fail2Ban Ban Triggered
2020-08-16 15:21:42
49.88.112.60 attack
Aug 16 07:45:16 email sshd\[3336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.60  user=root
Aug 16 07:45:18 email sshd\[3336\]: Failed password for root from 49.88.112.60 port 47964 ssh2
Aug 16 07:45:20 email sshd\[3336\]: Failed password for root from 49.88.112.60 port 47964 ssh2
Aug 16 07:45:23 email sshd\[3336\]: Failed password for root from 49.88.112.60 port 47964 ssh2
Aug 16 07:46:03 email sshd\[3472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.60  user=root
...
2020-08-16 15:57:02
106.54.117.51 attack
Aug 16 08:01:12 lukav-desktop sshd\[30223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.117.51  user=root
Aug 16 08:01:14 lukav-desktop sshd\[30223\]: Failed password for root from 106.54.117.51 port 47616 ssh2
Aug 16 08:05:43 lukav-desktop sshd\[10768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.117.51  user=root
Aug 16 08:05:45 lukav-desktop sshd\[10768\]: Failed password for root from 106.54.117.51 port 45824 ssh2
Aug 16 08:10:08 lukav-desktop sshd\[13735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.117.51  user=root
2020-08-16 15:20:57
119.254.155.187 attack
2020-08-16T08:21:07.982596n23.at sshd[3573973]: Failed password for root from 119.254.155.187 port 60805 ssh2
2020-08-16T08:24:06.462076n23.at sshd[3576190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.254.155.187  user=root
2020-08-16T08:24:08.652678n23.at sshd[3576190]: Failed password for root from 119.254.155.187 port 28836 ssh2
...
2020-08-16 15:38:20
111.93.205.186 attack
$f2bV_matches
2020-08-16 15:52:27
218.92.0.251 attackspam
Aug 16 03:31:21 Tower sshd[30453]: Connection from 218.92.0.251 port 21848 on 192.168.10.220 port 22 rdomain ""
Aug 16 03:31:24 Tower sshd[30453]: Failed password for root from 218.92.0.251 port 21848 ssh2
Aug 16 03:31:26 Tower sshd[30453]: Failed password for root from 218.92.0.251 port 21848 ssh2
Aug 16 03:31:29 Tower sshd[30453]: Failed password for root from 218.92.0.251 port 21848 ssh2
Aug 16 03:31:30 Tower sshd[30453]: Failed password for root from 218.92.0.251 port 21848 ssh2
Aug 16 03:31:31 Tower sshd[30453]: Failed password for root from 218.92.0.251 port 21848 ssh2
2020-08-16 15:37:11
85.209.0.103 attackbots
Bruteforce detected by fail2ban
2020-08-16 15:52:47
106.51.50.2 attackspam
leo_www
2020-08-16 15:28:15

最近上报的IP列表

151.38.106.186 83.20.125.202 167.71.225.148 171.66.51.238
124.18.110.211 46.107.200.130 148.230.226.14 220.25.247.124
178.64.18.132 85.2.56.207 62.113.177.242 45.165.126.149
105.97.160.153 194.236.210.113 145.52.50.238 81.218.149.245
37.215.77.127 94.181.202.149 31.234.102.125 79.27.114.189