必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.17.105.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16633
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.17.105.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 01:10:01 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
42.105.17.68.in-addr.arpa domain name pointer adsl-068-017-105-042.sip.gnv.bellsouth.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.105.17.68.in-addr.arpa	name = adsl-068-017-105-042.sip.gnv.bellsouth.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
37.120.33.30 attackspam
Automatic report
2019-08-09 07:37:32
95.58.194.141 attackbotsspam
Aug  9 01:35:35 MK-Soft-Root2 sshd\[10945\]: Invalid user squid from 95.58.194.141 port 54444
Aug  9 01:35:35 MK-Soft-Root2 sshd\[10945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.58.194.141
Aug  9 01:35:37 MK-Soft-Root2 sshd\[10945\]: Failed password for invalid user squid from 95.58.194.141 port 54444 ssh2
...
2019-08-09 07:57:39
112.85.42.174 attackspambots
Aug  8 23:53:24 plex sshd[32374]: Failed password for root from 112.85.42.174 port 5820 ssh2
Aug  8 23:53:18 plex sshd[32374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
Aug  8 23:53:21 plex sshd[32374]: Failed password for root from 112.85.42.174 port 5820 ssh2
Aug  8 23:53:24 plex sshd[32374]: Failed password for root from 112.85.42.174 port 5820 ssh2
Aug  8 23:53:27 plex sshd[32374]: Failed password for root from 112.85.42.174 port 5820 ssh2
2019-08-09 07:55:34
5.62.41.134 attackbotsspam
\[2019-08-08 19:22:12\] NOTICE\[2288\] chan_sip.c: Registration from '\' failed for '5.62.41.134:1101' - Wrong password
\[2019-08-08 19:22:12\] SECURITY\[2326\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-08-08T19:22:12.823-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="94198",SessionID="0x7ff4d07952f8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/5.62.41.134/63666",Challenge="288bbc40",ReceivedChallenge="288bbc40",ReceivedHash="084165557b852b1ac58eced516fc92ec"
\[2019-08-08 19:22:53\] NOTICE\[2288\] chan_sip.c: Registration from '\' failed for '5.62.41.134:1064' - Wrong password
\[2019-08-08 19:22:53\] SECURITY\[2326\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-08-08T19:22:53.557-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="67597",SessionID="0x7ff4d0160998",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/5.62.41.134/6
2019-08-09 07:42:24
51.79.25.146 attackspambots
2019-08-09T01:11:58.462553stark.klein-stark.info sshd\[31446\]: Invalid user testuser from 51.79.25.146 port 39726
2019-08-09T01:11:58.466544stark.klein-stark.info sshd\[31446\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.25.146
2019-08-09T01:12:00.590326stark.klein-stark.info sshd\[31446\]: Failed password for invalid user testuser from 51.79.25.146 port 39726 ssh2
...
2019-08-09 07:24:50
45.55.15.134 attackbots
Aug  8 23:53:21 ks10 sshd[13174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.15.134 
Aug  8 23:53:23 ks10 sshd[13174]: Failed password for invalid user gerente from 45.55.15.134 port 45063 ssh2
...
2019-08-09 07:57:18
14.161.29.126 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 21:39:18,867 INFO [amun_request_handler] PortScan Detected on Port: 445 (14.161.29.126)
2019-08-09 07:38:55
89.248.172.169 attack
fire
2019-08-09 08:05:56
119.193.111.120 attackbots
Aug  9 00:31:21 rpi sshd[24318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.193.111.120 
Aug  9 00:31:23 rpi sshd[24318]: Failed password for invalid user raspberry from 119.193.111.120 port 53672 ssh2
2019-08-09 07:28:38
178.128.52.162 attack
2019-08-09T01:50:20.852915centos sshd\[2725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.52.162  user=root
2019-08-09T01:50:22.333407centos sshd\[2725\]: Failed password for root from 178.128.52.162 port 55648 ssh2
2019-08-09T01:56:16.763140centos sshd\[2860\]: Invalid user legal3 from 178.128.52.162 port 60446
2019-08-09 07:58:43
141.98.80.74 attackspam
Aug  8 23:47:09 heicom postfix/smtpd\[14813\]: warning: unknown\[141.98.80.74\]: SASL PLAIN authentication failed: authentication failure
Aug  8 23:47:11 heicom postfix/smtpd\[14813\]: warning: unknown\[141.98.80.74\]: SASL PLAIN authentication failed: authentication failure
Aug  8 23:55:00 heicom postfix/smtpd\[15066\]: warning: unknown\[141.98.80.74\]: SASL PLAIN authentication failed: authentication failure
Aug  8 23:55:02 heicom postfix/smtpd\[15066\]: warning: unknown\[141.98.80.74\]: SASL PLAIN authentication failed: authentication failure
Aug  8 23:55:23 heicom postfix/smtpd\[15066\]: warning: unknown\[141.98.80.74\]: SASL PLAIN authentication failed: authentication failure
...
2019-08-09 08:03:49
218.92.0.154 attackspambots
Aug  8 23:53:36 dedicated sshd[31803]: Failed password for root from 218.92.0.154 port 42561 ssh2
Aug  8 23:53:39 dedicated sshd[31803]: Failed password for root from 218.92.0.154 port 42561 ssh2
Aug  8 23:53:41 dedicated sshd[31803]: Failed password for root from 218.92.0.154 port 42561 ssh2
Aug  8 23:53:44 dedicated sshd[31803]: Failed password for root from 218.92.0.154 port 42561 ssh2
Aug  8 23:53:47 dedicated sshd[31803]: Failed password for root from 218.92.0.154 port 42561 ssh2
2019-08-09 07:47:39
186.148.172.19 attack
Aug  8 23:54:24 mout sshd[5739]: Invalid user 25 from 186.148.172.19 port 45816
2019-08-09 07:35:01
51.75.248.241 attackbotsspam
Aug  9 01:20:15 SilenceServices sshd[25986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.248.241
Aug  9 01:20:17 SilenceServices sshd[25986]: Failed password for invalid user tud from 51.75.248.241 port 60526 ssh2
Aug  9 01:21:40 SilenceServices sshd[27183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.248.241
2019-08-09 07:38:35
129.211.147.91 attack
vps1:pam-generic
2019-08-09 07:40:21

最近上报的IP列表

76.241.66.182 213.149.127.27 47.204.150.219 235.153.122.117
167.183.93.158 182.103.139.149 30.203.67.137 236.185.107.74
250.255.23.70 82.245.54.144 74.180.103.5 224.157.232.243
80.63.234.221 52.168.46.210 174.108.65.4 71.92.88.215
182.146.77.54 234.132.7.60 182.179.218.8 189.185.0.136