必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.75.14.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 723
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;64.75.14.42.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 22:43:29 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 42.14.75.64.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.14.75.64.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
79.124.62.10 attackspambots
Mar 19 11:28:07 debian-2gb-nbg1-2 kernel: \[6872794.550653\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=79.124.62.10 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=587 PROTO=TCP SPT=46545 DPT=8236 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-19 18:30:27
67.49.214.36 attackspambots
Mar 19 00:53:44 firewall sshd[20217]: Invalid user admin from 67.49.214.36
Mar 19 00:53:46 firewall sshd[20217]: Failed password for invalid user admin from 67.49.214.36 port 57278 ssh2
Mar 19 00:53:49 firewall sshd[20219]: Invalid user admin from 67.49.214.36
...
2020-03-19 18:55:33
185.16.37.135 attack
2020-03-19T10:42:36.127882vps751288.ovh.net sshd\[22964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.16.37.135  user=root
2020-03-19T10:42:38.740920vps751288.ovh.net sshd\[22964\]: Failed password for root from 185.16.37.135 port 47504 ssh2
2020-03-19T10:50:15.297109vps751288.ovh.net sshd\[23022\]: Invalid user dodsserver from 185.16.37.135 port 48834
2020-03-19T10:50:15.307587vps751288.ovh.net sshd\[23022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.16.37.135
2020-03-19T10:50:17.599527vps751288.ovh.net sshd\[23022\]: Failed password for invalid user dodsserver from 185.16.37.135 port 48834 ssh2
2020-03-19 18:39:31
83.224.170.54 attack
SSH login attempts.
2020-03-19 19:05:12
195.158.29.222 attackbots
(sshd) Failed SSH login from 195.158.29.222 (UZ/Uzbekistan/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 19 11:47:17 ubnt-55d23 sshd[16493]: Invalid user ubuntu from 195.158.29.222 port 44314
Mar 19 11:47:20 ubnt-55d23 sshd[16493]: Failed password for invalid user ubuntu from 195.158.29.222 port 44314 ssh2
2020-03-19 19:13:33
200.194.53.67 attackspambots
Automatic report - Port Scan Attack
2020-03-19 19:02:08
41.90.56.35 attack
Email rejected due to spam filtering
2020-03-19 19:06:42
103.131.247.226 attack
20/3/18@23:54:03: FAIL: Alarm-Network address from=103.131.247.226
20/3/18@23:54:04: FAIL: Alarm-Network address from=103.131.247.226
...
2020-03-19 18:29:13
217.112.142.148 attackspam
Mar 19 05:45:38 mail.srvfarm.net postfix/smtpd[1960991]: NOQUEUE: reject: RCPT from unknown[217.112.142.148]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 19 05:45:52 mail.srvfarm.net postfix/smtpd[1957494]: NOQUEUE: reject: RCPT from unknown[217.112.142.148]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 19 05:46:26 mail.srvfarm.net postfix/smtpd[1942653]: NOQUEUE: reject: RCPT from unknown[217.112.142.148]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 19 05:47:18 mail.srvfarm.net postfix/smtpd[1942653]: NOQUEUE: reject: RCPT from unknown[217.112.142.148]: 450 4
2020-03-19 18:37:33
65.49.20.66 attack
Unauthorized connection attempt detected from IP address 65.49.20.66 to port 22
2020-03-19 18:35:59
140.136.210.145 attack
Unauthorized connection attempt detected from IP address 140.136.210.145 to port 23 [T]
2020-03-19 18:53:28
114.32.87.89 attack
SSH login attempts.
2020-03-19 18:48:18
185.175.93.18 attackbotsspam
03/19/2020-06:19:50.990591 185.175.93.18 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-19 19:02:36
114.47.18.216 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-19 18:47:15
189.112.179.115 attackspam
Mar 19 10:12:47 localhost sshd[57735]: Invalid user Administrator from 189.112.179.115 port 39896
Mar 19 10:12:47 localhost sshd[57735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.179.115
Mar 19 10:12:47 localhost sshd[57735]: Invalid user Administrator from 189.112.179.115 port 39896
Mar 19 10:12:48 localhost sshd[57735]: Failed password for invalid user Administrator from 189.112.179.115 port 39896 ssh2
Mar 19 10:19:17 localhost sshd[58424]: Invalid user ics from 189.112.179.115 port 41668
...
2020-03-19 18:27:30

最近上报的IP列表

84.161.167.86 153.27.66.255 92.29.44.65 46.126.66.175
16.83.83.87 47.62.121.93 205.133.162.248 191.237.46.239
167.57.92.213 62.2.105.208 201.127.235.239 83.96.70.104
99.53.53.16 162.118.113.165 201.46.226.34 209.141.216.240
69.82.29.170 64.252.29.45 206.122.64.62 60.80.70.65