必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Taiwan, China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.67.204.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32468
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.67.204.3.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 09:26:30 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
3.204.67.42.in-addr.arpa domain name pointer 42-67-204-3.emome-ip.hinet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
3.204.67.42.in-addr.arpa	name = 42-67-204-3.emome-ip.hinet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
69.167.210.118 attackspambots
2019-11-20T17:53:41.866039abusebot-4.cloudsearch.cf sshd\[28669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.167.210.118  user=root
2019-11-21 06:12:51
49.235.38.225 attackbotsspam
SSHScan
2019-11-21 05:55:10
121.184.64.15 attackspambots
Nov 20 23:57:00 sauna sshd[125467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.184.64.15
Nov 20 23:57:02 sauna sshd[125467]: Failed password for invalid user swimming from 121.184.64.15 port 9813 ssh2
...
2019-11-21 06:00:07
121.241.244.93 attackspam
Nov 20 20:35:54 vserver sshd\[734\]: Invalid user hb from 121.241.244.93Nov 20 20:35:56 vserver sshd\[734\]: Failed password for invalid user hb from 121.241.244.93 port 34202 ssh2Nov 20 20:39:26 vserver sshd\[800\]: Invalid user pcressan from 121.241.244.93Nov 20 20:39:28 vserver sshd\[800\]: Failed password for invalid user pcressan from 121.241.244.93 port 56022 ssh2
...
2019-11-21 06:17:32
212.129.145.64 attackspam
Nov 20 17:00:25 tuxlinux sshd[53006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.145.64  user=root
Nov 20 17:00:27 tuxlinux sshd[53006]: Failed password for root from 212.129.145.64 port 51584 ssh2
Nov 20 17:00:25 tuxlinux sshd[53006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.145.64  user=root
Nov 20 17:00:27 tuxlinux sshd[53006]: Failed password for root from 212.129.145.64 port 51584 ssh2
Nov 20 17:07:17 tuxlinux sshd[53121]: Invalid user bernadette from 212.129.145.64 port 41157
...
2019-11-21 06:09:12
92.46.171.47 attackbots
Unauthorised access (Nov 20) SRC=92.46.171.47 LEN=40 TTL=53 ID=1662 TCP DPT=23 WINDOW=38112 SYN
2019-11-21 06:21:50
93.87.94.4 attackspam
Unauthorized access or intrusion attempt detected from Thor banned IP
2019-11-21 05:54:37
107.170.20.247 attackbots
Nov 20 19:39:41 cavern sshd[13683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.20.247
2019-11-21 05:53:52
42.115.221.40 attackbots
Repeated brute force against a port
2019-11-21 06:18:44
129.45.49.94 attackbots
Spam
2019-11-21 06:04:31
5.196.217.177 attackspambots
Nov 20 22:22:52 mail postfix/smtpd[24729]: warning: unknown[5.196.217.177]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 20 22:23:47 mail postfix/smtpd[24696]: warning: unknown[5.196.217.177]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 20 22:23:52 mail postfix/smtpd[24799]: warning: unknown[5.196.217.177]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-21 06:08:45
178.128.117.55 attackspambots
Invalid user hduser from 178.128.117.55 port 52000
2019-11-21 06:13:45
45.80.65.82 attackspambots
Repeated brute force against a port
2019-11-21 06:13:15
103.47.16.2 attackspambots
Nov 20 17:05:48 server sshd\[1454\]: Invalid user hetherington from 103.47.16.2
Nov 20 17:05:48 server sshd\[1454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.47.16.2 
Nov 20 17:05:50 server sshd\[1454\]: Failed password for invalid user hetherington from 103.47.16.2 port 45868 ssh2
Nov 20 17:36:29 server sshd\[8832\]: Invalid user yfujiwar from 103.47.16.2
Nov 20 17:36:29 server sshd\[8832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.47.16.2 
...
2019-11-21 06:18:05
49.232.11.112 attack
Repeated brute force against a port
2019-11-21 06:06:10

最近上报的IP列表

44.126.88.205 60.34.55.59 31.15.15.255 68.229.243.163
229.168.51.36 234.14.78.110 232.121.117.123 40.246.31.31
123.82.42.9 13.154.230.78 192.191.173.30 44.35.64.168
123.158.247.211 57.28.83.63 190.151.169.98 232.191.40.206
197.218.96.139 17.175.150.100 163.253.188.75 145.109.171.252