必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Owensboro

省份(region): Kentucky

国家(country): United States

运营商(isp): AT&T

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.182.5.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56853
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;74.182.5.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062900 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 29 23:08:49 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 42.5.182.74.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 74.182.5.42.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
94.152.193.40 attackspam
Autoban   94.152.193.40 AUTH/CONNECT
2019-08-05 06:43:52
94.152.193.193 attack
Autoban   94.152.193.193 AUTH/CONNECT
2019-08-05 06:45:10
36.158.251.73 attackbotsspam
...
2019-08-05 06:35:38
62.37.101.89 attackbots
port scan and connect, tcp 23 (telnet)
2019-08-05 05:47:08
147.135.255.107 attack
Aug  4 22:33:28 www_kotimaassa_fi sshd[5454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.255.107
Aug  4 22:33:29 www_kotimaassa_fi sshd[5454]: Failed password for invalid user tsukamoto from 147.135.255.107 port 45526 ssh2
...
2019-08-05 06:47:55
94.132.164.7 attackbots
Autoban   94.132.164.7 AUTH/CONNECT
2019-08-05 06:49:47
94.23.196.177 attackbots
Autoban   94.23.196.177 AUTH/CONNECT
2019-08-05 05:46:44
94.176.189.159 attack
Autoban   94.176.189.159 AUTH/CONNECT
2019-08-05 05:52:56
94.152.193.45 attack
Autoban   94.152.193.45 AUTH/CONNECT
2019-08-05 06:43:07
94.132.166.133 attack
Autoban   94.132.166.133 AUTH/CONNECT
2019-08-05 06:48:20
51.75.25.164 attackbotsspam
Aug  4 23:10:51 SilenceServices sshd[1768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.25.164
Aug  4 23:10:52 SilenceServices sshd[1768]: Failed password for invalid user lxy from 51.75.25.164 port 33828 ssh2
Aug  4 23:17:07 SilenceServices sshd[5331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.25.164
2019-08-05 05:43:47
94.230.113.60 attackbots
Autoban   94.230.113.60 AUTH/CONNECT
2019-08-05 05:45:34
94.152.199.11 attackspam
Autoban   94.152.199.11 AUTH/CONNECT
2019-08-05 06:35:07
94.176.189.147 attack
Autoban   94.176.189.147 AUTH/CONNECT
2019-08-05 05:56:40
94.34.223.130 attackbots
Autoban   94.34.223.130 AUTH/CONNECT
2019-08-05 05:37:46

最近上报的IP列表

51.140.124.210 36.175.77.16 60.29.210.210 74.132.30.247
27.215.211.236 175.73.153.45 157.37.86.17 197.109.70.234
73.14.53.218 124.179.21.240 111.194.58.45 165.122.229.199
104.109.8.198 15.60.34.12 137.138.104.4 8.206.213.165
2.70.250.100 150.3.37.219 14.89.131.90 95.33.219.42