必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.245.196.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64876
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.245.196.161.			IN	A

;; AUTHORITY SECTION:
.			253	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 49 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 11:20:47 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 161.196.245.42.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 161.196.245.42.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
162.247.74.213 attackspambots
SSH Brute Force
2019-09-04 04:19:03
213.238.239.100 attackbotsspam
[portscan] Port scan
2019-09-04 04:11:19
49.88.112.80 attackspam
03.09.2019 19:57:04 SSH access blocked by firewall
2019-09-04 04:08:23
189.112.126.30 attackbotsspam
Sep  3 21:23:33 andromeda sshd\[25124\]: Invalid user bear123 from 189.112.126.30 port 50582
Sep  3 21:23:33 andromeda sshd\[25124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.126.30
Sep  3 21:23:35 andromeda sshd\[25124\]: Failed password for invalid user bear123 from 189.112.126.30 port 50582 ssh2
2019-09-04 03:36:11
14.63.174.149 attackbotsspam
Sep  3 09:56:36 lcprod sshd\[12226\]: Invalid user test from 14.63.174.149
Sep  3 09:56:36 lcprod sshd\[12226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.174.149
Sep  3 09:56:38 lcprod sshd\[12226\]: Failed password for invalid user test from 14.63.174.149 port 58487 ssh2
Sep  3 10:01:40 lcprod sshd\[12741\]: Invalid user ryley from 14.63.174.149
Sep  3 10:01:40 lcprod sshd\[12741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.174.149
2019-09-04 04:01:59
171.25.193.25 attack
Sep  3 20:34:09 mail sshd\[19410\]: Invalid user utilisateur from 171.25.193.25 port 64100
Sep  3 20:34:09 mail sshd\[19410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.25.193.25
...
2019-09-04 03:35:10
193.194.89.146 attackbotsspam
Sep  3 20:35:19 root sshd[14119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.194.89.146 
Sep  3 20:35:21 root sshd[14119]: Failed password for invalid user uno8 from 193.194.89.146 port 59776 ssh2
Sep  3 20:40:06 root sshd[14251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.194.89.146 
...
2019-09-04 03:46:28
75.50.59.234 attackbots
Sep  3 09:58:11 friendsofhawaii sshd\[2884\]: Invalid user md from 75.50.59.234
Sep  3 09:58:11 friendsofhawaii sshd\[2884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.50.59.234
Sep  3 09:58:13 friendsofhawaii sshd\[2884\]: Failed password for invalid user md from 75.50.59.234 port 55100 ssh2
Sep  3 10:02:20 friendsofhawaii sshd\[3232\]: Invalid user april from 75.50.59.234
Sep  3 10:02:20 friendsofhawaii sshd\[3232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.50.59.234
2019-09-04 04:06:24
89.135.51.39 attackbots
proto=tcp  .  spt=36787  .  dpt=25  .     (listed on Dark List de Sep 03)     (1900)
2019-09-04 03:38:17
37.187.26.207 attackbots
Sep  3 19:52:03 hcbbdb sshd\[30061\]: Invalid user 123 from 37.187.26.207
Sep  3 19:52:03 hcbbdb sshd\[30061\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns314782.ip-37-187-26.eu
Sep  3 19:52:05 hcbbdb sshd\[30061\]: Failed password for invalid user 123 from 37.187.26.207 port 42913 ssh2
Sep  3 19:55:52 hcbbdb sshd\[30479\]: Invalid user !@\#\$%\^ from 37.187.26.207
Sep  3 19:55:52 hcbbdb sshd\[30479\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns314782.ip-37-187-26.eu
2019-09-04 04:08:41
200.207.220.128 attack
Sep  3 15:53:21 plusreed sshd[15926]: Invalid user pc from 200.207.220.128
...
2019-09-04 04:11:35
23.133.240.6 attack
Sep  3 09:34:43 kapalua sshd\[9443\]: Invalid user utilisateur from 23.133.240.6
Sep  3 09:34:43 kapalua sshd\[9443\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=greyponyitnyc001.greyponyit.com
Sep  3 09:34:45 kapalua sshd\[9443\]: Failed password for invalid user utilisateur from 23.133.240.6 port 50682 ssh2
Sep  3 09:34:47 kapalua sshd\[9443\]: Failed password for invalid user utilisateur from 23.133.240.6 port 50682 ssh2
Sep  3 09:34:50 kapalua sshd\[9443\]: Failed password for invalid user utilisateur from 23.133.240.6 port 50682 ssh2
2019-09-04 03:53:10
144.217.164.104 attackspam
Sep  3 14:44:46 mailman sshd[1094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.ip-144-217-164.net  user=root
Sep  3 14:44:48 mailman sshd[1094]: Failed password for root from 144.217.164.104 port 37988 ssh2
Sep  3 14:44:48 mailman sshd[1094]: Failed password for root from 144.217.164.104 port 37988 ssh2
2019-09-04 03:48:19
118.32.211.24 attackspambots
firewall-block, port(s): 60001/tcp
2019-09-04 03:35:50
218.98.26.176 attack
19/9/3@15:22:33: FAIL: Alarm-SSH address from=218.98.26.176
...
2019-09-04 03:47:17

最近上报的IP列表

42.239.96.231 42.239.55.47 42.239.44.223 42.239.71.86
42.239.245.98 42.239.188.133 42.242.108.142 42.242.237.147
42.48.78.107 42.48.78.98 42.48.78.83 42.48.173.134
42.48.78.15 42.3.194.127 42.48.79.137 42.48.79.122
189.9.158.56 42.48.78.47 42.49.221.208 42.48.79.79