必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea Republic of

运营商(isp): LG Dacom Corporation

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
类型 评论内容 时间
attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-05-29 08:02:24
attackspambots
Unauthorized connection attempt detected from IP address 61.42.20.36 to port 445
2019-12-28 14:20:05
attack
Unauthorized connection attempt from IP address 61.42.20.36 on Port 445(SMB)
2019-09-06 08:46:59
相同子网IP讨论:
IP 类型 评论内容 时间
61.42.20.128 attack
SSH bruteforce
2020-04-30 16:46:14
61.42.20.128 attack
Apr 27 03:59:13 work-partkepr sshd\[13117\]: Invalid user admin from 61.42.20.128 port 13296
Apr 27 03:59:13 work-partkepr sshd\[13117\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.42.20.128
...
2020-04-27 12:50:59
61.42.20.128 attackbots
SSH Brute-Forcing (server1)
2020-04-16 15:51:22
61.42.20.128 attack
SSH Brute-Force. Ports scanning.
2020-04-14 03:05:26
61.42.20.128 attack
Apr  8 13:41:14 v22019038103785759 sshd\[25645\]: Invalid user wilder from 61.42.20.128 port 57284
Apr  8 13:41:14 v22019038103785759 sshd\[25645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.42.20.128
Apr  8 13:41:16 v22019038103785759 sshd\[25645\]: Failed password for invalid user wilder from 61.42.20.128 port 57284 ssh2
Apr  8 13:49:31 v22019038103785759 sshd\[26153\]: Invalid user terraria from 61.42.20.128 port 10822
Apr  8 13:49:31 v22019038103785759 sshd\[26153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.42.20.128
...
2020-04-08 20:23:32
61.42.20.128 attackbotsspam
SSH auth scanning - multiple failed logins
2020-04-04 12:19:47
61.42.20.128 attack
Invalid user spl from 61.42.20.128 port 48952
2020-03-30 04:06:35
61.42.20.128 attackspambots
Invalid user epiconf from 61.42.20.128 port 10366
2020-03-14 09:25:17
61.42.20.128 attack
Mar  8 09:54:45 plusreed sshd[19147]: Invalid user agsadmin from 61.42.20.128
...
2020-03-08 22:05:44
61.42.20.128 attack
Invalid user default from 61.42.20.128 port 21048
2020-02-19 08:34:33
61.42.20.128 attackbots
Feb  5 03:39:07 firewall sshd[31956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.42.20.128
Feb  5 03:39:07 firewall sshd[31956]: Invalid user fn from 61.42.20.128
Feb  5 03:39:09 firewall sshd[31956]: Failed password for invalid user fn from 61.42.20.128 port 54640 ssh2
...
2020-02-05 15:18:23
61.42.20.128 attackbotsspam
Invalid user alx from 61.42.20.128 port 42106
2020-01-18 22:19:45
61.42.20.5 attackspambots
Dec  9 06:56:45 v22019058497090703 sshd[19894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.42.20.5
Dec  9 06:56:47 v22019058497090703 sshd[19894]: Failed password for invalid user smmsp from 61.42.20.5 port 56852 ssh2
Dec  9 07:08:16 v22019058497090703 sshd[21039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.42.20.5


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=61.42.20.5
2019-12-09 19:58:27
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.42.20.36
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20180
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;61.42.20.36.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019053100 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri May 31 18:03:56 CST 2019
;; MSG SIZE  rcvd: 115

HOST信息:
Host 36.20.42.61.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 36.20.42.61.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
52.151.38.54 attackbotsspam
Jul 26 02:52:23 SilenceServices sshd[12328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.151.38.54
Jul 26 02:52:25 SilenceServices sshd[12328]: Failed password for invalid user laura from 52.151.38.54 port 46420 ssh2
Jul 26 03:01:48 SilenceServices sshd[23260]: Failed password for root from 52.151.38.54 port 33158 ssh2
2019-07-26 09:03:03
154.72.92.98 attackspam
Jul 26 03:29:17 server sshd\[1411\]: Invalid user kathrin from 154.72.92.98 port 46350
Jul 26 03:29:17 server sshd\[1411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.72.92.98
Jul 26 03:29:20 server sshd\[1411\]: Failed password for invalid user kathrin from 154.72.92.98 port 46350 ssh2
Jul 26 03:34:38 server sshd\[15332\]: Invalid user isaque from 154.72.92.98 port 40374
Jul 26 03:34:38 server sshd\[15332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.72.92.98
2019-07-26 08:36:25
202.51.74.92 attack
202.51.74.92 - - [26/Jul/2019:01:08:28 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
202.51.74.92 - - [26/Jul/2019:01:08:29 +0200] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
202.51.74.92 - - [26/Jul/2019:01:08:30 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
202.51.74.92 - - [26/Jul/2019:01:08:31 +0200] "POST /wp-login.php HTTP/1.1" 200 1489 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
202.51.74.92 - - [26/Jul/2019:01:08:32 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
202.51.74.92 - - [26/Jul/2019:01:08:33 +0200] "POST /wp-login.php HTTP/1.1" 200 1491 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-07-26 08:38:50
129.204.65.101 attackspambots
Jul 26 01:26:54 mail sshd\[3351\]: Failed password for invalid user phion from 129.204.65.101 port 51340 ssh2
Jul 26 01:46:52 mail sshd\[4095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.65.101  user=root
...
2019-07-26 08:56:50
198.108.67.43 attack
Splunk® : port scan detected:
Jul 25 19:08:06 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:64:c3:d6:0b:ef:f0:08:00 SRC=198.108.67.43 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x00 TTL=39 ID=8334 PROTO=TCP SPT=22804 DPT=9092 WINDOW=1024 RES=0x00 SYN URGP=0
2019-07-26 08:55:30
46.118.155.222 attackspam
fail2ban honeypot
2019-07-26 08:23:49
68.160.128.60 attackbots
Jul 26 01:51:09 mail sshd\[4228\]: Failed password for invalid user biblioteca from 68.160.128.60 port 56816 ssh2
Jul 26 02:08:22 mail sshd\[5025\]: Invalid user seth from 68.160.128.60 port 36258
Jul 26 02:08:22 mail sshd\[5025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.160.128.60
...
2019-07-26 09:08:34
139.215.217.181 attackspambots
Invalid user subway from 139.215.217.181 port 59078
2019-07-26 08:36:59
141.8.196.131 attackspam
Jul 26 07:19:33 webhost01 sshd[13034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.8.196.131
Jul 26 07:19:35 webhost01 sshd[13034]: Failed password for invalid user alex from 141.8.196.131 port 35915 ssh2
...
2019-07-26 08:53:05
112.65.201.29 attackbots
Jul 26 03:10:14 srv-4 sshd\[1703\]: Invalid user qf from 112.65.201.29
Jul 26 03:10:14 srv-4 sshd\[1703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.65.201.29
Jul 26 03:10:16 srv-4 sshd\[1703\]: Failed password for invalid user qf from 112.65.201.29 port 53826 ssh2
...
2019-07-26 08:24:05
203.106.40.110 attack
Jul 26 03:53:17 yabzik sshd[12697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.106.40.110
Jul 26 03:53:18 yabzik sshd[12697]: Failed password for invalid user tian from 203.106.40.110 port 37522 ssh2
Jul 26 03:58:39 yabzik sshd[14455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.106.40.110
2019-07-26 09:03:51
37.212.205.231 attackspambots
Automatic report - Port Scan Attack
2019-07-26 08:30:22
112.166.68.193 attackbotsspam
ssh failed login
2019-07-26 08:26:29
34.211.96.12 attack
20 attempts against mh-ssh on wind.magehost.pro
2019-07-26 09:01:48
153.36.240.126 attackbots
Jul 26 03:38:42 server2 sshd\[18862\]: User root from 153.36.240.126 not allowed because not listed in AllowUsers
Jul 26 03:38:44 server2 sshd\[18864\]: User root from 153.36.240.126 not allowed because not listed in AllowUsers
Jul 26 03:38:45 server2 sshd\[18866\]: User root from 153.36.240.126 not allowed because not listed in AllowUsers
Jul 26 03:38:45 server2 sshd\[18868\]: User root from 153.36.240.126 not allowed because not listed in AllowUsers
Jul 26 03:43:56 server2 sshd\[19177\]: User root from 153.36.240.126 not allowed because not listed in AllowUsers
Jul 26 03:45:01 server2 sshd\[19207\]: User root from 153.36.240.126 not allowed because not listed in AllowUsers
2019-07-26 08:50:04

最近上报的IP列表

113.185.0.14 112.34.250.25 198.170.227.250 104.168.204.100
67.78.26.102 144.191.162.147 103.208.33.62 99.202.12.137
55.78.26.236 101.80.234.157 254.209.161.171 144.163.251.250
93.190.223.178 251.33.48.221 88.97.49.91 19.162.75.53
232.134.121.83 42.100.157.68 16.211.247.122 179.12.49.169