必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Taiwan (Province of China)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.75.104.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3078
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.75.104.97.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 17:10:12 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
97.104.75.42.in-addr.arpa domain name pointer 42-75-104-97.emome-ip.hinet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
97.104.75.42.in-addr.arpa	name = 42-75-104-97.emome-ip.hinet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
59.61.166.228 attack
Lines containing failures of 59.61.166.228
Jan 23 17:01:36 kmh-vmh-003-fsn07 sshd[6931]: Invalid user kdj from 59.61.166.228 port 33470
Jan 23 17:01:36 kmh-vmh-003-fsn07 sshd[6931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.61.166.228 
Jan 23 17:01:38 kmh-vmh-003-fsn07 sshd[6931]: Failed password for invalid user kdj from 59.61.166.228 port 33470 ssh2
Jan 23 17:01:39 kmh-vmh-003-fsn07 sshd[6931]: Received disconnect from 59.61.166.228 port 33470:11: Bye Bye [preauth]
Jan 23 17:01:39 kmh-vmh-003-fsn07 sshd[6931]: Disconnected from invalid user kdj 59.61.166.228 port 33470 [preauth]
Jan 23 17:04:35 kmh-vmh-003-fsn07 sshd[16087]: Invalid user user from 59.61.166.228 port 57788
Jan 23 17:04:35 kmh-vmh-003-fsn07 sshd[16087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.61.166.228 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=59.61.166.228
2020-01-24 05:42:50
113.90.237.138 attack
Unauthorized connection attempt detected from IP address 113.90.237.138 to port 2220 [J]
2020-01-24 06:11:15
185.175.93.17 attack
01/23/2020-17:04:04.781864 185.175.93.17 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-24 06:07:52
122.155.1.148 attackspambots
Unauthorized connection attempt detected from IP address 122.155.1.148 to port 2220 [J]
2020-01-24 06:17:21
89.120.116.250 attackspam
Jan 23 17:31:56 sso sshd[20856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.120.116.250
Jan 23 17:31:58 sso sshd[20856]: Failed password for invalid user test from 89.120.116.250 port 51686 ssh2
...
2020-01-24 05:37:16
222.212.84.221 attack
unauthorized connection attempt
2020-01-24 06:10:42
165.22.144.206 attackbots
Jan 23 23:00:45 jupiter sshd[53458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.144.206
Jan 23 23:00:46 jupiter sshd[53458]: Failed password for invalid user test from 165.22.144.206 port 43234 ssh2
...
2020-01-24 06:08:11
45.184.69.68 attackspambots
Unauthorized connection attempt detected from IP address 45.184.69.68 to port 2220 [J]
2020-01-24 06:01:45
134.209.226.157 attackspam
$f2bV_matches
2020-01-24 05:41:29
51.68.210.22 attack
Port scan on 2 port(s): 139 445
2020-01-24 05:36:24
41.138.90.77 attack
my email account was hacked two times the last 4 weeks by IP 41.138.90.77 and used for sending over 1.500 spams around the world !
2020-01-24 05:50:50
62.150.51.201 attack
Unauthorized connection attempt from IP address 62.150.51.201 on Port 445(SMB)
2020-01-24 06:00:49
201.234.178.151 attack
20/1/23@11:02:12: FAIL: Alarm-Network address from=201.234.178.151
20/1/23@11:02:12: FAIL: Alarm-Network address from=201.234.178.151
...
2020-01-24 05:51:39
188.131.217.33 attack
Unauthorized connection attempt detected from IP address 188.131.217.33 to port 2220 [J]
2020-01-24 05:46:08
171.229.243.58 attackbots
Unauthorized connection attempt detected from IP address 171.229.243.58 to port 23 [J]
2020-01-24 05:49:09

最近上报的IP列表

210.0.109.75 64.18.238.216 43.62.200.79 18.212.55.151
152.84.26.15 209.97.147.116 192.41.36.1 185.210.30.183
24.198.88.198 255.177.176.88 185.16.143.185 2.73.88.2
37.213.253.5 154.195.208.144 239.167.130.187 12.238.227.226
108.110.153.55 81.44.75.227 199.207.89.58 172.74.92.243