必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea (the Republic of)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.47.156.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36357
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.47.156.194.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 20:54:21 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 194.156.47.42.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 194.156.47.42.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
221.127.98.5 attackspam
Sep 14 02:29:19 nexus sshd[19053]: Invalid user pi from 221.127.98.5 port 35776
Sep 14 02:29:19 nexus sshd[19053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.127.98.5
Sep 14 02:29:19 nexus sshd[19055]: Invalid user pi from 221.127.98.5 port 35780
Sep 14 02:29:19 nexus sshd[19055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.127.98.5


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=221.127.98.5
2019-09-16 08:32:50
121.15.11.13 attackbotsspam
Sep 15 14:32:02 web9 sshd\[25045\]: Invalid user o2 from 121.15.11.13
Sep 15 14:32:02 web9 sshd\[25045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.11.13
Sep 15 14:32:04 web9 sshd\[25045\]: Failed password for invalid user o2 from 121.15.11.13 port 41445 ssh2
Sep 15 14:36:55 web9 sshd\[26083\]: Invalid user hex from 121.15.11.13
Sep 15 14:36:55 web9 sshd\[26083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.11.13
2019-09-16 08:55:46
114.240.244.116 attack
Sep 14 02:34:39 new sshd[16783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.240.244.116  user=r.r
Sep 14 02:34:41 new sshd[16783]: Failed password for r.r from 114.240.244.116 port 58070 ssh2
Sep 14 02:34:43 new sshd[16783]: Failed password for r.r from 114.240.244.116 port 58070 ssh2
Sep 14 02:34:45 new sshd[16783]: Failed password for r.r from 114.240.244.116 port 58070 ssh2
Sep 14 02:34:47 new sshd[16783]: Failed password for r.r from 114.240.244.116 port 58070 ssh2
Sep 14 02:34:50 new sshd[16783]: Failed password for r.r from 114.240.244.116 port 58070 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=114.240.244.116
2019-09-16 08:54:57
159.65.13.203 attackspam
Sep 15 13:53:02 hpm sshd\[24354\]: Invalid user sugs from 159.65.13.203
Sep 15 13:53:02 hpm sshd\[24354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.13.203
Sep 15 13:53:03 hpm sshd\[24354\]: Failed password for invalid user sugs from 159.65.13.203 port 59866 ssh2
Sep 15 13:57:45 hpm sshd\[24715\]: Invalid user we from 159.65.13.203
Sep 15 13:57:45 hpm sshd\[24715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.13.203
2019-09-16 08:39:00
139.59.85.59 attack
$f2bV_matches
2019-09-16 08:19:07
154.124.209.185 attackspambots
scan z
2019-09-16 08:30:05
200.98.201.40 attackbots
firewall-block, port(s): 445/tcp
2019-09-16 08:51:26
80.211.95.201 attackspam
Sep 15 19:16:42 XXX sshd[10971]: Invalid user sirle from 80.211.95.201 port 39464
2019-09-16 08:12:29
202.65.151.31 attackbotsspam
Sep 15 14:42:07 sachi sshd\[20485\]: Invalid user qq from 202.65.151.31
Sep 15 14:42:07 sachi sshd\[20485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.65.151.31
Sep 15 14:42:08 sachi sshd\[20485\]: Failed password for invalid user qq from 202.65.151.31 port 48706 ssh2
Sep 15 14:46:28 sachi sshd\[20881\]: Invalid user testtest from 202.65.151.31
Sep 15 14:46:28 sachi sshd\[20881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.65.151.31
2019-09-16 08:56:47
167.114.152.139 attackbotsspam
Sep 16 03:36:16 www5 sshd\[31642\]: Invalid user jenkins from 167.114.152.139
Sep 16 03:36:16 www5 sshd\[31642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.152.139
Sep 16 03:36:18 www5 sshd\[31642\]: Failed password for invalid user jenkins from 167.114.152.139 port 58024 ssh2
...
2019-09-16 08:46:59
190.195.13.138 attackspambots
Sep 16 01:10:26 apollo sshd\[20309\]: Invalid user webmail from 190.195.13.138Sep 16 01:10:28 apollo sshd\[20309\]: Failed password for invalid user webmail from 190.195.13.138 port 36596 ssh2Sep 16 01:26:08 apollo sshd\[20359\]: Invalid user zica from 190.195.13.138
...
2019-09-16 08:24:35
181.129.14.218 attack
Sep 15 14:27:36 php1 sshd\[12317\]: Invalid user informix from 181.129.14.218
Sep 15 14:27:36 php1 sshd\[12317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.14.218
Sep 15 14:27:38 php1 sshd\[12317\]: Failed password for invalid user informix from 181.129.14.218 port 32499 ssh2
Sep 15 14:32:12 php1 sshd\[12805\]: Invalid user pinna from 181.129.14.218
Sep 15 14:32:12 php1 sshd\[12805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.14.218
2019-09-16 08:34:51
218.92.0.163 attack
Sep 16 01:20:22 lnxweb61 sshd[15281]: Failed password for root from 218.92.0.163 port 28937 ssh2
Sep 16 01:20:25 lnxweb61 sshd[15281]: Failed password for root from 218.92.0.163 port 28937 ssh2
Sep 16 01:20:28 lnxweb61 sshd[15281]: Failed password for root from 218.92.0.163 port 28937 ssh2
Sep 16 01:20:31 lnxweb61 sshd[15281]: Failed password for root from 218.92.0.163 port 28937 ssh2
2019-09-16 08:38:38
186.250.48.17 attack
Sep 16 01:09:11 apollo sshd\[20307\]: Invalid user login from 186.250.48.17Sep 16 01:09:14 apollo sshd\[20307\]: Failed password for invalid user login from 186.250.48.17 port 50916 ssh2Sep 16 01:32:52 apollo sshd\[20449\]: Invalid user bmdmserver from 186.250.48.17
...
2019-09-16 08:16:18
185.153.197.116 attackspambots
09/15/2019-20:35:31.107165 185.153.197.116 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-16 08:43:40

最近上报的IP列表

43.129.38.59 101.155.150.222 141.143.135.49 224.211.189.131
43.120.124.129 5.117.98.5 253.80.117.58 83.105.199.170
12.178.234.113 150.34.243.55 212.233.226.119 82.172.89.51
199.103.74.115 121.164.91.58 117.73.89.236 96.99.25.217
186.138.171.14 22.141.111.51 98.111.249.192 156.160.211.32