必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): Hunan

国家(country): China

运营商(isp): China Unicom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.48.38.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47321
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.48.38.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025112201 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 23 02:30:19 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 68.38.48.42.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 68.38.48.42.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
148.70.191.149 attackbots
Jun  5 20:02:18 haigwepa sshd[2288]: Failed password for root from 148.70.191.149 port 36534 ssh2
...
2020-06-06 02:12:01
87.251.74.50 attackspambots
Jun  5 19:58:27 debian64 sshd[14846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.251.74.50 
...
2020-06-06 02:27:14
186.225.123.122 attack
Invalid user enter from 186.225.123.122 port 42108
2020-06-06 02:06:11
141.98.81.107 attackbotsspam
Jun  5 15:51:31 vmd48417 sshd[17233]: Failed password for root from 141.98.81.107 port 41895 ssh2
2020-06-06 02:12:55
41.42.172.94 attackspambots
Invalid user admin from 41.42.172.94 port 54936
2020-06-06 01:51:53
175.207.13.22 attackspambots
Failed password for root from 175.207.13.22 port 52340 ssh2
2020-06-06 02:09:44
194.61.55.164 attackspam
Invalid user boittier from 194.61.55.164 port 57353
2020-06-06 02:03:05
101.99.20.59 attackbots
Invalid user nagesh from 101.99.20.59 port 58888
2020-06-06 02:26:40
103.25.21.34 attack
Invalid user uftp from 103.25.21.34 port 6347
2020-06-06 02:26:15
112.33.55.210 attack
Invalid user admin from 112.33.55.210 port 56940
2020-06-06 02:20:27
36.68.134.68 attack
Invalid user service from 36.68.134.68 port 46969
2020-06-06 01:54:26
82.251.161.207 attackbots
Jun  5 17:52:40 *** sshd[17700]: User root from 82.251.161.207 not allowed because not listed in AllowUsers
2020-06-06 02:28:43
158.69.0.38 attackbots
Invalid user cxb from 158.69.0.38 port 40912
2020-06-06 02:10:48
85.15.219.229 attackbots
Jun  5 20:16:56 DAAP sshd[2902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.15.219.229  user=root
Jun  5 20:16:59 DAAP sshd[2902]: Failed password for root from 85.15.219.229 port 45694 ssh2
Jun  5 20:20:17 DAAP sshd[2974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.15.219.229  user=root
Jun  5 20:20:18 DAAP sshd[2974]: Failed password for root from 85.15.219.229 port 47676 ssh2
Jun  5 20:23:31 DAAP sshd[3015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.15.219.229  user=root
Jun  5 20:23:33 DAAP sshd[3015]: Failed password for root from 85.15.219.229 port 49656 ssh2
...
2020-06-06 02:27:57
14.169.207.209 attack
Invalid user admin from 14.169.207.209 port 43484
2020-06-06 01:56:27

最近上报的IP列表

180.153.236.241 175.178.41.153 3.83.105.161 184.72.172.155
185.224.128.19 54.165.208.168 52.23.239.149 180.153.236.226
120.229.252.7 184.103.0.236 61.227.249.194 13.222.189.32
1.83.125.83 182.138.158.3 172.202.117.178 212.56.52.74
54.226.125.235 178.128.63.241 165.154.32.152 143.244.132.98