必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 6.117.142.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38796
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;6.117.142.58.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 15:47:10 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 58.142.117.6.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 6.117.142.58.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.1.29.105 attack
2019-06-27 03:14:12 1hgIzL-00057D-TY SMTP connection from bed.bookywook.com \(bed.akindolu.icu\) \[14.1.29.105\]:37436 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-27 03:16:51 1hgJ1v-0005BS-HU SMTP connection from bed.bookywook.com \(bed.akindolu.icu\) \[14.1.29.105\]:54667 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-27 03:16:57 1hgJ21-0005BX-7O SMTP connection from bed.bookywook.com \(bed.akindolu.icu\) \[14.1.29.105\]:33686 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-04 23:59:21
41.249.250.93 attackbotsspam
Feb  4 14:51:36 grey postfix/smtpd\[25486\]: NOQUEUE: reject: RCPT from iserver.firstinformatique.ma\[41.249.250.93\]: 554 5.7.1 Service unavailable\; Client host \[41.249.250.93\] blocked using cbl.abuseat.org\; Blocked - see http://www.abuseat.org/lookup.cgi\?ip=41.249.250.93\; from=\ to=\ proto=ESMTP helo=\
...
2020-02-04 23:57:55
31.209.104.88 attackspambots
Feb  4 14:52:08 grey postfix/smtpd\[11663\]: NOQUEUE: reject: RCPT from unknown\[31.209.104.88\]: 554 5.7.1 Service unavailable\; Client host \[31.209.104.88\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[31.209.104.88\]\; from=\ to=\ proto=ESMTP helo=\<\[31.209.104.88\]\>
...
2020-02-04 23:19:59
113.172.196.120 attack
Brute force attempt
2020-02-04 23:28:26
14.160.34.214 attackbots
2019-03-11 15:55:06 H=\(static.vnpt.vn\) \[14.160.34.214\]:25708 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-11 15:55:15 H=\(static.vnpt.vn\) \[14.160.34.214\]:25768 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-11 15:55:22 H=\(static.vnpt.vn\) \[14.160.34.214\]:25839 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-02-04 23:22:52
14.1.29.102 attackbotsspam
2019-06-25 06:21:41 1hfcxh-0007id-Ja SMTP connection from observe.bookywook.com \(observe.thaiparttimejob.icu\) \[14.1.29.102\]:43116 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-25 06:21:55 1hfcxu-0007iy-Vy SMTP connection from observe.bookywook.com \(observe.thaiparttimejob.icu\) \[14.1.29.102\]:60159 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-25 06:23:30 1hfczS-0007kg-DO SMTP connection from observe.bookywook.com \(observe.thaiparttimejob.icu\) \[14.1.29.102\]:40458 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-05 00:02:05
165.22.48.169 attackspambots
Feb  4 16:20:53 debian-2gb-nbg1-2 kernel: \[3088902.679489\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=165.22.48.169 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x40 TTL=242 ID=29155 PROTO=TCP SPT=49651 DPT=2375 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-04 23:23:38
189.238.215.166 attackbots
$f2bV_matches
2020-02-04 23:26:47
31.207.34.147 attack
Unauthorized connection attempt detected from IP address 31.207.34.147 to port 2220 [J]
2020-02-04 23:55:09
89.248.168.221 attackspambots
Feb  4 16:06:25 h2177944 kernel: \[4026893.055117\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.221 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=36537 PROTO=TCP SPT=50113 DPT=23903 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  4 16:06:25 h2177944 kernel: \[4026893.055132\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.221 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=36537 PROTO=TCP SPT=50113 DPT=23903 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  4 16:14:24 h2177944 kernel: \[4027372.251934\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.221 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=64946 PROTO=TCP SPT=50113 DPT=24421 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  4 16:14:24 h2177944 kernel: \[4027372.251949\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.221 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=64946 PROTO=TCP SPT=50113 DPT=24421 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  4 16:26:42 h2177944 kernel: \[4028109.837338\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.221 DST=85.
2020-02-04 23:30:45
40.124.4.131 attackspambots
Feb  4 16:17:27 hosting180 sshd[27016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.124.4.131  user=root
Feb  4 16:17:29 hosting180 sshd[27016]: Failed password for root from 40.124.4.131 port 36976 ssh2
...
2020-02-04 23:56:44
14.1.29.113 attackbotsspam
2019-06-20 09:33:04 1hdrZA-0007lb-Nq SMTP connection from mice.bookywook.com \(mice.surosatesafar.icu\) \[14.1.29.113\]:37923 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-20 09:33:05 1hdrZA-0007lc-Nq SMTP connection from mice.bookywook.com \(mice.surosatesafar.icu\) \[14.1.29.113\]:38372 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-20 09:33:05 1hdrZA-0007la-Nq SMTP connection from mice.bookywook.com \(mice.surosatesafar.icu\) \[14.1.29.113\]:44149 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-04 23:47:23
152.136.72.17 attackspam
Feb  4 11:52:26 vps46666688 sshd[15513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.72.17
Feb  4 11:52:27 vps46666688 sshd[15513]: Failed password for invalid user kazakov from 152.136.72.17 port 35050 ssh2
...
2020-02-04 23:44:55
110.78.23.131 attackspambots
Feb  4 15:31:22 game-panel sshd[22362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.78.23.131
Feb  4 15:31:24 game-panel sshd[22362]: Failed password for invalid user saify from 110.78.23.131 port 49022 ssh2
Feb  4 15:33:35 game-panel sshd[22428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.78.23.131
2020-02-04 23:43:16
180.150.187.159 attackbotsspam
Feb  4 15:23:39 ns382633 sshd\[4786\]: Invalid user fa from 180.150.187.159 port 49168
Feb  4 15:23:39 ns382633 sshd\[4786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.150.187.159
Feb  4 15:23:41 ns382633 sshd\[4786\]: Failed password for invalid user fa from 180.150.187.159 port 49168 ssh2
Feb  4 15:31:41 ns382633 sshd\[6412\]: Invalid user admin1 from 180.150.187.159 port 42798
Feb  4 15:31:41 ns382633 sshd\[6412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.150.187.159
2020-02-04 23:48:29

最近上报的IP列表

86.97.136.136 66.119.136.110 16.6.231.138 43.39.231.58
61.8.244.100 78.126.116.180 230.149.20.28 49.103.93.172
206.1.41.188 201.51.24.57 200.168.156.234 205.96.145.228
15.4.152.129 175.22.173.101 86.172.103.80 84.72.126.207
65.209.222.240 248.229.32.41 171.229.201.148 92.224.205.60