必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): Hunan

国家(country): China

运营商(isp): China Unicom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.48.38.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47321
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.48.38.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025112201 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 23 02:30:19 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 68.38.48.42.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 68.38.48.42.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.75.162.4 attack
Mar 12 23:06:40 game-panel sshd[6091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.162.4
Mar 12 23:06:42 game-panel sshd[6091]: Failed password for invalid user bungee from 51.75.162.4 port 34708 ssh2
Mar 12 23:10:19 game-panel sshd[6305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.162.4
2020-03-13 07:12:29
207.248.62.98 attackspam
Automatic report - Banned IP Access
2020-03-13 06:45:39
191.6.48.182 attackbotsspam
Brute-force attempt banned
2020-03-13 06:46:49
183.14.135.194 attackspambots
Mar 12 23:19:55 SilenceServices sshd[31891]: Failed password for root from 183.14.135.194 port 20466 ssh2
Mar 12 23:22:58 SilenceServices sshd[4027]: Failed password for root from 183.14.135.194 port 17921 ssh2
2020-03-13 06:53:34
73.93.102.54 attack
SSH Bruteforce attack
2020-03-13 06:48:15
186.210.93.42 attack
Unauthorized connection attempt from IP address 186.210.93.42 on Port 445(SMB)
2020-03-13 06:56:55
120.92.34.241 attackbots
SSH bruteforce (Triggered fail2ban)
2020-03-13 06:38:34
122.146.94.100 attackspambots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-03-13 06:41:50
112.35.56.181 attack
Mar 12 23:00:38 v22018076622670303 sshd\[8060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.56.181  user=root
Mar 12 23:00:40 v22018076622670303 sshd\[8060\]: Failed password for root from 112.35.56.181 port 42244 ssh2
Mar 12 23:05:32 v22018076622670303 sshd\[8079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.56.181  user=root
...
2020-03-13 06:44:31
180.76.148.87 attackspambots
20 attempts against mh-ssh on echoip
2020-03-13 06:50:58
176.32.181.70 attackbots
Mar 13 00:45:10 pkdns2 sshd\[35255\]: Invalid user gitlab-runner from 176.32.181.70Mar 13 00:45:13 pkdns2 sshd\[35255\]: Failed password for invalid user gitlab-runner from 176.32.181.70 port 42550 ssh2Mar 13 00:49:00 pkdns2 sshd\[35400\]: Invalid user jyoti from 176.32.181.70Mar 13 00:49:01 pkdns2 sshd\[35400\]: Failed password for invalid user jyoti from 176.32.181.70 port 59072 ssh2Mar 13 00:52:46 pkdns2 sshd\[35601\]: Invalid user justin from 176.32.181.70Mar 13 00:52:48 pkdns2 sshd\[35601\]: Failed password for invalid user justin from 176.32.181.70 port 47372 ssh2
...
2020-03-13 06:53:55
112.85.42.89 attackspam
DATE:2020-03-12 23:48:44, IP:112.85.42.89, PORT:ssh SSH brute force auth on honeypot server (epe-honey1-hq)
2020-03-13 07:02:59
45.143.220.171 attackbots
firewall-block, port(s): 5061/udp
2020-03-13 07:05:40
129.211.62.131 attack
SSH invalid-user multiple login try
2020-03-13 07:06:18
45.227.255.119 attackbots
Invalid user odroid from 45.227.255.119 port 38910
2020-03-13 07:08:59

最近上报的IP列表

180.153.236.241 175.178.41.153 3.83.105.161 184.72.172.155
185.224.128.19 54.165.208.168 52.23.239.149 180.153.236.226
120.229.252.7 184.103.0.236 61.227.249.194 13.222.189.32
1.83.125.83 182.138.158.3 172.202.117.178 212.56.52.74
54.226.125.235 178.128.63.241 165.154.32.152 143.244.132.98