必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.61.42.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19238
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.61.42.229.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 19:34:15 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
229.42.61.80.in-addr.arpa domain name pointer 80-61-42-229.fixed.kpn.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
229.42.61.80.in-addr.arpa	name = 80-61-42-229.fixed.kpn.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
217.112.142.145 attackbots
Jun 18 10:03:02 mail.srvfarm.net postfix/smtpd[1383425]: NOQUEUE: reject: RCPT from lovely.yobaat.com[217.112.142.145]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Jun 18 10:09:17 mail.srvfarm.net postfix/smtpd[1382543]: NOQUEUE: reject: RCPT from lovely.yobaat.com[217.112.142.145]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Jun 18 10:09:17 mail.srvfarm.net postfix/smtpd[1383766]: NOQUEUE: reject: RCPT from lovely.yobaat.com[217.112.142.145]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Jun 18 10:09:17 mail.srvfarm.net postfix/smtpd[1383765]: NOQU
2020-06-19 04:33:08
47.107.169.136 attackspambots
Jun 18 08:02:30 Tower sshd[30715]: Connection from 47.107.169.136 port 55610 on 192.168.10.220 port 22 rdomain ""
Jun 18 08:02:32 Tower sshd[30715]: Invalid user phd from 47.107.169.136 port 55610
Jun 18 08:02:32 Tower sshd[30715]: error: Could not get shadow information for NOUSER
Jun 18 08:02:32 Tower sshd[30715]: Failed password for invalid user phd from 47.107.169.136 port 55610 ssh2
Jun 18 08:02:32 Tower sshd[30715]: Received disconnect from 47.107.169.136 port 55610:11: Bye Bye [preauth]
Jun 18 08:02:32 Tower sshd[30715]: Disconnected from invalid user phd 47.107.169.136 port 55610 [preauth]
2020-06-19 04:44:19
106.13.64.132 attackbotsspam
DATE:2020-06-18 15:33:32, IP:106.13.64.132, PORT:ssh SSH brute force auth (docker-dc)
2020-06-19 04:20:08
78.189.170.40 attack
CMS (WordPress or Joomla) login attempt.
2020-06-19 04:27:57
68.183.71.55 attack
Jun 18 16:18:06 *** sshd[29062]: Invalid user nick from 68.183.71.55
2020-06-19 04:19:13
129.213.133.158 attackbotsspam
2020-01-31T23:57:01.631Z CLOSE host=129.213.133.158 port=33788 fd=4 time=20.011 bytes=18
...
2020-06-19 04:45:39
177.221.97.238 attack
Jun 18 10:14:31 mail.srvfarm.net postfix/smtps/smtpd[1383709]: warning: unknown[177.221.97.238]: SASL PLAIN authentication failed: 
Jun 18 10:14:32 mail.srvfarm.net postfix/smtps/smtpd[1383709]: lost connection after AUTH from unknown[177.221.97.238]
Jun 18 10:19:02 mail.srvfarm.net postfix/smtps/smtpd[1383001]: warning: unknown[177.221.97.238]: SASL PLAIN authentication failed: 
Jun 18 10:19:03 mail.srvfarm.net postfix/smtps/smtpd[1383001]: lost connection after AUTH from unknown[177.221.97.238]
Jun 18 10:23:56 mail.srvfarm.net postfix/smtpd[1384360]: warning: unknown[177.221.97.238]: SASL PLAIN authentication failed:
2020-06-19 04:31:03
46.166.187.111 attack
[Fri Jan 31 20:37:24.949362 2020] [access_compat:error] [pid 32085] [client 46.166.187.111:56567] AH01797: client denied by server configuration: /var/www/html/luke/editBlackAndWhiteList
...
2020-06-19 04:44:43
187.86.132.227 attackbots
Honeypot attack, port: 445, PTR: ip-187-86-132-227.vetorialnet.com.br.
2020-06-19 04:19:54
189.91.5.22 attackspam
Jun 18 10:00:14 mail.srvfarm.net postfix/smtps/smtpd[1382768]: warning: unknown[189.91.5.22]: SASL PLAIN authentication failed: 
Jun 18 10:00:15 mail.srvfarm.net postfix/smtps/smtpd[1382768]: lost connection after AUTH from unknown[189.91.5.22]
Jun 18 10:05:35 mail.srvfarm.net postfix/smtpd[1383333]: warning: unknown[189.91.5.22]: SASL PLAIN authentication failed: 
Jun 18 10:05:36 mail.srvfarm.net postfix/smtpd[1383333]: lost connection after AUTH from unknown[189.91.5.22]
Jun 18 10:08:45 mail.srvfarm.net postfix/smtps/smtpd[1383642]: warning: unknown[189.91.5.22]: SASL PLAIN authentication failed:
2020-06-19 04:34:58
46.24.44.151 attackbotsspam
[Tue Nov 26 03:37:26.185096 2019] [access_compat:error] [pid 8761] [client 46.24.44.151:43832] AH01797: client denied by server configuration: /var/www/html/luke/editBlackAndWhiteList
...
2020-06-19 04:27:01
159.203.102.122 attackbotsspam
Jun 18 19:06:55 vps639187 sshd\[16398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.102.122  user=root
Jun 18 19:06:56 vps639187 sshd\[16398\]: Failed password for root from 159.203.102.122 port 44630 ssh2
Jun 18 19:10:29 vps639187 sshd\[16455\]: Invalid user gw from 159.203.102.122 port 40238
Jun 18 19:10:29 vps639187 sshd\[16455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.102.122
...
2020-06-19 04:18:47
194.169.225.94 attackbotsspam
Mar 22 07:46:34 mercury wordpress(lukegirvin.com)[4536]: XML-RPC authentication failure for luke from 194.169.225.94
...
2020-06-19 04:15:22
46.174.191.32 attackbotsspam
TCP port 8080: Scan and connection
2020-06-19 04:12:20
129.213.86.27 attackspambots
2020-05-05T01:28:16.060Z CLOSE host=129.213.86.27 port=42248 fd=4 time=20.017 bytes=15
...
2020-06-19 04:11:29

最近上报的IP列表

219.156.3.108 132.102.100.103 76.68.35.169 47.94.86.35
17.153.202.26 159.170.4.0 147.215.251.152 130.178.249.112
87.241.43.132 135.78.81.52 135.33.105.5 197.98.195.200
79.70.130.177 237.119.114.78 255.224.250.5 87.20.186.2
72.154.102.82 226.202.180.70 241.158.126.180 3.242.92.232