必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 71.225.42.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60512
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;71.225.42.57.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021101 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 04:49:56 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
57.42.225.71.in-addr.arpa domain name pointer c-71-225-42-57.hsd1.pa.comcast.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
57.42.225.71.in-addr.arpa	name = c-71-225-42-57.hsd1.pa.comcast.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.239.78.88 attackbotsspam
Invalid user firebird from 222.239.78.88 port 51599
2020-01-23 09:19:45
218.92.0.191 attack
Jan 23 01:38:04 dcd-gentoo sshd[21237]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Jan 23 01:38:07 dcd-gentoo sshd[21237]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Jan 23 01:38:04 dcd-gentoo sshd[21237]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Jan 23 01:38:07 dcd-gentoo sshd[21237]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Jan 23 01:38:04 dcd-gentoo sshd[21237]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Jan 23 01:38:07 dcd-gentoo sshd[21237]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Jan 23 01:38:07 dcd-gentoo sshd[21237]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.191 port 46406 ssh2
...
2020-01-23 08:49:26
190.214.26.249 attack
Honeypot attack, port: 445, PTR: 249.26.214.190.static.anycast.cnt-grms.ec.
2020-01-23 08:53:42
139.198.13.178 attackspambots
Unauthorized connection attempt detected from IP address 139.198.13.178 to port 2220 [J]
2020-01-23 09:21:10
222.186.175.216 attackspam
2020-01-23T01:05:28.360562abusebot-3.cloudsearch.cf sshd[5054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216  user=root
2020-01-23T01:05:30.316133abusebot-3.cloudsearch.cf sshd[5054]: Failed password for root from 222.186.175.216 port 59856 ssh2
2020-01-23T01:05:33.479632abusebot-3.cloudsearch.cf sshd[5054]: Failed password for root from 222.186.175.216 port 59856 ssh2
2020-01-23T01:05:28.360562abusebot-3.cloudsearch.cf sshd[5054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216  user=root
2020-01-23T01:05:30.316133abusebot-3.cloudsearch.cf sshd[5054]: Failed password for root from 222.186.175.216 port 59856 ssh2
2020-01-23T01:05:33.479632abusebot-3.cloudsearch.cf sshd[5054]: Failed password for root from 222.186.175.216 port 59856 ssh2
2020-01-23T01:05:28.360562abusebot-3.cloudsearch.cf sshd[5054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
...
2020-01-23 09:09:01
190.205.224.74 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-23 08:55:11
112.85.42.180 attackbots
SSH Brute Force, server-1 sshd[25998]: Failed password for root from 112.85.42.180 port 25530 ssh2
2020-01-23 08:56:17
154.202.55.146 attackspambots
Unauthorized connection attempt detected from IP address 154.202.55.146 to port 2220 [J]
2020-01-23 08:57:52
219.93.106.33 attackspambots
Jan 23 01:10:41 *** sshd[7515]: Invalid user ubuntu from 219.93.106.33
2020-01-23 09:22:28
162.243.158.198 attackspambots
$f2bV_matches
2020-01-23 09:14:22
222.186.175.154 attack
Unauthorized connection attempt detected from IP address 222.186.175.154 to port 22 [J]
2020-01-23 09:12:07
121.229.13.229 attackbots
Lines containing failures of 121.229.13.229
Jan 22 22:10:47 shared11 sshd[19196]: Invalid user carol from 121.229.13.229 port 35826
Jan 22 22:10:47 shared11 sshd[19196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.13.229
Jan 22 22:10:49 shared11 sshd[19196]: Failed password for invalid user carol from 121.229.13.229 port 35826 ssh2
Jan 22 22:10:49 shared11 sshd[19196]: Received disconnect from 121.229.13.229 port 35826:11: Bye Bye [preauth]
Jan 22 22:10:49 shared11 sshd[19196]: Disconnected from invalid user carol 121.229.13.229 port 35826 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=121.229.13.229
2020-01-23 09:26:37
61.7.183.52 attackspambots
Unauthorized connection attempt detected from IP address 61.7.183.52 to port 445
2020-01-23 09:17:07
147.139.138.183 attackspambots
Jan 23 00:44:49 ns382633 sshd\[10926\]: Invalid user clouduser from 147.139.138.183 port 47480
Jan 23 00:44:49 ns382633 sshd\[10926\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.139.138.183
Jan 23 00:44:51 ns382633 sshd\[10926\]: Failed password for invalid user clouduser from 147.139.138.183 port 47480 ssh2
Jan 23 00:50:21 ns382633 sshd\[12168\]: Invalid user suzuki from 147.139.138.183 port 54912
Jan 23 00:50:21 ns382633 sshd\[12168\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.139.138.183
2020-01-23 09:00:55
186.251.130.199 attackspambots
[ 🇺🇸 ] From return-fbo9si6o@hospedagembrasil.net Wed Jan 22 15:49:50 2020
 Received: from server0.hospedagembrasil.net ([186.251.130.199]:41573)
2020-01-23 09:18:06

最近上报的IP列表

252.210.124.236 246.141.194.104 4.67.120.68 209.97.255.147
24.64.126.168 18.35.100.157 96.191.93.44 247.209.126.63
98.106.188.45 201.17.246.173 189.137.68.203 221.84.250.121
217.70.115.117 32.255.176.253 66.245.14.247 191.125.44.20
63.45.117.84 113.39.62.185 90.235.206.22 230.135.231.73