必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): Henan

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Zhengzhou Fastidc Technology Co.,Ltd.

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
42.51.195.216 attackspambots
DATE:2020-03-19 22:52:12, IP:42.51.195.216, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc)
2020-03-20 07:52:28
42.51.195.216 attack
DATE:2020-02-28 14:28:25, IP:42.51.195.216, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc)
2020-02-29 03:02:16
42.51.195.205 attackbots
account brute force by foreign IP
2019-08-06 11:18:44
42.51.195.155 attackspambots
Unauthorised access (Aug  4) SRC=42.51.195.155 LEN=40 TTL=110 ID=256 TCP DPT=3306 WINDOW=16384 SYN
2019-08-04 23:52:11
42.51.195.204 attackbots
postfix-failedauth jail [dl]
2019-08-04 03:06:06
42.51.195.155 attackspambots
:
2019-07-26 20:20:31
42.51.195.155 attack
CloudCIX Reconnaissance Scan Detected, PTR: idc.ly.ha.
2019-07-26 15:10:37
42.51.195.214 attackbots
SASL broute force
2019-07-22 11:29:35
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.51.195.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16983
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.51.195.138.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062900 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jun 30 01:01:31 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
138.195.51.42.in-addr.arpa domain name pointer idc.ly.ha.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
138.195.51.42.in-addr.arpa	name = idc.ly.ha.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
188.166.217.182 attack
DNS
2019-11-25 03:40:56
201.93.196.241 attackspam
Nov 22 21:59:33 CT721 sshd[5136]: Invalid user spiros from 201.93.196.241
Nov 22 21:59:33 CT721 sshd[5136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201-93-196-241.dsl.telesp.net.br
Nov 22 21:59:36 CT721 sshd[5136]: Failed password for invalid user spiros from 201.93.196.241 port 43896 ssh2
Nov 22 21:59:36 CT721 sshd[5136]: Received disconnect from 201.93.196.241: 11: Bye Bye [preauth]
Nov 22 22:04:00 CT721 sshd[5452]: Invalid user patsy from 201.93.196.241
Nov 22 22:04:00 CT721 sshd[5452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201-93-196-241.dsl.telesp.net.br
Nov 22 22:04:03 CT721 sshd[5452]: Failed password for invalid user patsy from 201.93.196.241 port 33875 ssh2
Nov 22 22:04:03 CT721 sshd[5452]: Received disconnect from 201.93.196.241: 11: Bye Bye [preauth]
Nov 22 22:08:24 CT721 sshd[5527]: Invalid user vmailpass from 201.93.196.241
Nov 22 22:08:24 CT721 sshd[5527]: pam........
-------------------------------
2019-11-25 03:23:36
83.97.20.46 attack
firewall-block, port(s): 135/tcp, 139/tcp, 2181/tcp
2019-11-25 03:28:20
41.221.64.17 attack
Telnet/23 MH Probe, BF, Hack -
2019-11-25 03:46:22
104.254.246.220 attackspam
Nov 24 09:06:49 hanapaa sshd\[23057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.254.246.220  user=root
Nov 24 09:06:51 hanapaa sshd\[23057\]: Failed password for root from 104.254.246.220 port 49384 ssh2
Nov 24 09:13:15 hanapaa sshd\[23632\]: Invalid user guest from 104.254.246.220
Nov 24 09:13:15 hanapaa sshd\[23632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.254.246.220
Nov 24 09:13:16 hanapaa sshd\[23632\]: Failed password for invalid user guest from 104.254.246.220 port 57456 ssh2
2019-11-25 03:13:20
90.100.116.82 attack
Nov 23 03:28:17 mail sshd[24003]: Invalid user pi from 90.100.116.82
Nov 23 03:28:17 mail sshd[24005]: Invalid user pi from 90.100.116.82
Nov 23 03:28:17 mail sshd[24003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.100.116.82
Nov 23 03:28:17 mail sshd[24003]: Invalid user pi from 90.100.116.82
Nov 23 03:28:19 mail sshd[24003]: Failed password for invalid user pi from 90.100.116.82 port 37668 ssh2
Nov 23 03:28:17 mail sshd[24005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.100.116.82
Nov 23 03:28:17 mail sshd[24005]: Invalid user pi from 90.100.116.82
Nov 23 03:28:19 mail sshd[24005]: Failed password for invalid user pi from 90.100.116.82 port 37678 ssh2
...
2019-11-25 03:14:43
128.199.244.150 attackspambots
11/24/2019-15:49:33.999031 128.199.244.150 Protocol: 6 ET POLICY Cleartext WordPress Login
2019-11-25 03:12:08
182.254.135.14 attack
Nov 24 18:01:37 ovpn sshd\[15228\]: Invalid user lara from 182.254.135.14
Nov 24 18:01:37 ovpn sshd\[15228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.135.14
Nov 24 18:01:39 ovpn sshd\[15228\]: Failed password for invalid user lara from 182.254.135.14 port 58598 ssh2
Nov 24 18:08:43 ovpn sshd\[16989\]: Invalid user fink from 182.254.135.14
Nov 24 18:08:43 ovpn sshd\[16989\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.135.14
2019-11-25 03:41:10
78.47.123.225 attackspambots
Nov 22 22:07:55 netserv300 sshd[18080]: Connection from 78.47.123.225 port 53242 on 188.40.78.230 port 22
Nov 22 22:07:55 netserv300 sshd[18082]: Connection from 78.47.123.225 port 38796 on 188.40.78.228 port 22
Nov 22 22:07:55 netserv300 sshd[18081]: Connection from 78.47.123.225 port 45946 on 188.40.78.229 port 22
Nov 22 22:07:55 netserv300 sshd[18083]: Connection from 78.47.123.225 port 35136 on 188.40.78.197 port 22
Nov 22 22:07:58 netserv300 sshd[18084]: Connection from 78.47.123.225 port 47000 on 188.40.78.197 port 22
Nov 22 22:08:00 netserv300 sshd[18085]: Connection from 78.47.123.225 port 55176 on 188.40.78.197 port 22
Nov 22 22:08:02 netserv300 sshd[18100]: Connection from 78.47.123.225 port 33822 on 188.40.78.197 port 22
Nov 22 22:08:05 netserv300 sshd[18101]: Connection from 78.47.123.225 port 42234 on 188.40.78.197 port 22
Nov 22 22:11:03 netserv300 sshd[18158]: Connection from 78.47.123.225 port 58132 on 188.40.78.228 port 22
Nov 22 22:11:08 netserv300 sshd........
------------------------------
2019-11-25 03:48:14
222.188.109.227 attack
Nov 24 15:48:54 www sshd\[12922\]: Invalid user svukovic from 222.188.109.227 port 60082
...
2019-11-25 03:39:57
220.98.84.31 attackspambots
Nov 25 00:27:07 areeb-Workstation sshd[7479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.98.84.31
Nov 25 00:27:09 areeb-Workstation sshd[7479]: Failed password for invalid user baske from 220.98.84.31 port 61404 ssh2
...
2019-11-25 03:17:07
45.182.137.16 attack
Telnet/23 MH Probe, BF, Hack -
2019-11-25 03:44:02
141.98.81.117 attackspam
Nov 23 20:22:41 debian sshd[1611]: Unable to negotiate with 141.98.81.117 port 49858: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group-exchange-sha256 [preauth]
Nov 24 13:47:27 debian sshd[15057]: Unable to negotiate with 141.98.81.117 port 43786: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group-exchange-sha256 [preauth]
...
2019-11-25 03:21:46
118.126.111.108 attackspambots
2019-11-24T14:48:47.826259abusebot.cloudsearch.cf sshd\[3451\]: Invalid user nildev from 118.126.111.108 port 40038
2019-11-25 03:45:21
82.207.114.64 attack
Lines containing failures of 82.207.114.64
Nov 23 08:41:01 shared09 sshd[14728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.207.114.64  user=r.r
Nov 23 08:41:03 shared09 sshd[14728]: Failed password for r.r from 82.207.114.64 port 54406 ssh2
Nov 23 08:41:03 shared09 sshd[14728]: Received disconnect from 82.207.114.64 port 54406:11: Bye Bye [preauth]
Nov 23 08:41:03 shared09 sshd[14728]: Disconnected from authenticating user r.r 82.207.114.64 port 54406 [preauth]
Nov 23 08:57:56 shared09 sshd[19354]: Invalid user vidya from 82.207.114.64 port 57572
Nov 23 08:57:56 shared09 sshd[19354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.207.114.64
Nov 23 08:57:57 shared09 sshd[19354]: Failed password for invalid user vidya from 82.207.114.64 port 57572 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=82.207.114.64
2019-11-25 03:20:14

最近上报的IP列表

2a01:e34:ee9b:3e0:85ab:fb0a:f369:811a 39.130.200.12 57.220.132.28 82.223.69.53
181.215.203.244 117.41.97.247 186.180.208.248 177.10.100.115
123.120.191.224 37.39.71.100 123.232.28.218 110.18.140.63
93.22.171.18 216.208.3.255 17.117.102.235 215.124.239.240
2403:6200:88a6:ca17:904f:ff15:5e10:5c41 52.83.215.164 8.148.47.131 119.118.102.56