必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Poland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.12.196.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42763
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;83.12.196.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 166 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 20:58:19 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
42.196.12.83.in-addr.arpa domain name pointer gho42.internetdsl.tpnet.pl.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.196.12.83.in-addr.arpa	name = gho42.internetdsl.tpnet.pl.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
119.54.83.17 attackspambots
Automatic report - Port Scan Attack
2020-06-14 08:57:25
222.186.175.216 attackspam
Jun 14 03:06:19 PorscheCustomer sshd[17569]: Failed password for root from 222.186.175.216 port 21270 ssh2
Jun 14 03:06:34 PorscheCustomer sshd[17569]: error: maximum authentication attempts exceeded for root from 222.186.175.216 port 21270 ssh2 [preauth]
Jun 14 03:06:40 PorscheCustomer sshd[17578]: Failed password for root from 222.186.175.216 port 41766 ssh2
...
2020-06-14 09:08:41
62.234.145.195 attack
(sshd) Failed SSH login from 62.234.145.195 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 14 02:15:12 amsweb01 sshd[11577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.145.195  user=root
Jun 14 02:15:14 amsweb01 sshd[11577]: Failed password for root from 62.234.145.195 port 54860 ssh2
Jun 14 02:31:08 amsweb01 sshd[14794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.145.195  user=root
Jun 14 02:31:09 amsweb01 sshd[14794]: Failed password for root from 62.234.145.195 port 37266 ssh2
Jun 14 02:32:54 amsweb01 sshd[15708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.145.195  user=root
2020-06-14 08:59:17
45.89.174.46 attack
[2020-06-13 20:30:24] NOTICE[1273] chan_sip.c: Registration from '' failed for '45.89.174.46:64406' - Wrong password
[2020-06-13 20:30:24] SECURITY[1288] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-06-13T20:30:24.072-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="6459",SessionID="0x7f31c0311868",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.89.174.46/64406",Challenge="6e6b311c",ReceivedChallenge="6e6b311c",ReceivedHash="ff25d3255165897261df1e2c02d9b3fc"
[2020-06-13 20:31:13] NOTICE[1273] chan_sip.c: Registration from '' failed for '45.89.174.46:59690' - Wrong password
[2020-06-13 20:31:13] SECURITY[1288] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-06-13T20:31:13.384-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="3295",SessionID="0x7f31c018ea98",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.89.174.46/596
...
2020-06-14 08:51:29
201.166.145.219 attackbots
571. On Jun 13 2020 experienced a Brute Force SSH login attempt -> 4 unique times by 201.166.145.219.
2020-06-14 09:10:18
121.229.18.144 attack
no
2020-06-14 09:14:55
114.231.105.233 attackspambots
Jun 13 20:59:47 delaware postfix/smtpd[7644]: warning: hostname 233.105.231.114.broad.nt.js.dynamic.163data.com.cn does not resolve to address 114.231.105.233: Name or service not known
Jun 13 20:59:47 delaware postfix/smtpd[7644]: connect from unknown[114.231.105.233]
Jun 13 20:59:48 delaware postfix/smtpd[7644]: NOQUEUE: reject: RCPT from unknown[114.231.105.233]: 554 5.7.1 Service unavailable; Client host [114.231.105.233] blocked using ix.dnsbl.xxxxxx.net; Your e-mail service was detected by spam.over.port25.me (NiX Spam) as spamming at Sat, 13 Jun 2020 17:07:07 +0200. Your admin should vishostname hxxp://www.dnsbl.xxxxxx.net/lookup.php?value=114.231.105.233; from=x@x helo=
Jun 13 20:59:48 delaware postfix/smtpd[7644]: disconnect from unknown[114.231.105.233] ehlo=1 mail=1 rcpt=0/1 quhostname=1 commands=3/4
Jun 13 20:59:48 delaware postfix/smtpd[7644]: warning: hostname 233.105.231.114.broad.nt.js.dynamic.163data.com.cn does not resolve to address 114.231.........
-------------------------------
2020-06-14 09:06:44
61.177.125.242 attackspambots
2020-06-13T21:47:48.200306shield sshd\[2273\]: Invalid user zhangwei from 61.177.125.242 port 44253
2020-06-13T21:47:48.204370shield sshd\[2273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.125.242
2020-06-13T21:47:50.097859shield sshd\[2273\]: Failed password for invalid user zhangwei from 61.177.125.242 port 44253 ssh2
2020-06-13T21:48:16.243582shield sshd\[2321\]: Invalid user presta from 61.177.125.242 port 20846
2020-06-13T21:48:16.247488shield sshd\[2321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.125.242
2020-06-14 09:24:27
62.171.144.195 attack
[2020-06-13 21:19:45] NOTICE[1273] chan_sip.c: Registration from '' failed for '62.171.144.195:34076' - Wrong password
[2020-06-13 21:19:45] SECURITY[1288] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-06-13T21:19:45.798-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="231abc",SessionID="0x7f31c02f7128",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.171.144.195/34076",Challenge="41723184",ReceivedChallenge="41723184",ReceivedHash="609b27e7a9a8b0445575e0efcf68ff87"
[2020-06-13 21:23:46] NOTICE[1273] chan_sip.c: Registration from '' failed for '62.171.144.195:53551' - Wrong password
[2020-06-13 21:23:46] SECURITY[1288] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-06-13T21:23:46.344-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="240abc",SessionID="0x7f31c018ea98",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62
...
2020-06-14 09:24:50
75.75.140.113 attackspam
400 BAD REQUEST
2020-06-14 09:19:18
222.186.30.167 attack
Jun 14 02:50:09 v22018053744266470 sshd[9104]: Failed password for root from 222.186.30.167 port 51751 ssh2
Jun 14 02:50:18 v22018053744266470 sshd[9115]: Failed password for root from 222.186.30.167 port 35093 ssh2
...
2020-06-14 08:52:14
218.92.0.172 attackspambots
Jun 13 21:58:31 firewall sshd[27369]: Failed password for root from 218.92.0.172 port 55103 ssh2
Jun 13 21:58:33 firewall sshd[27369]: Failed password for root from 218.92.0.172 port 55103 ssh2
Jun 13 21:58:37 firewall sshd[27369]: Failed password for root from 218.92.0.172 port 55103 ssh2
...
2020-06-14 09:17:22
138.68.50.18 attackbots
Jun 13 23:03:10 vps sshd[899884]: Failed password for invalid user mmadmin from 138.68.50.18 port 39616 ssh2
Jun 13 23:04:09 vps sshd[903541]: Invalid user Welkome$#1234 from 138.68.50.18 port 49994
Jun 13 23:04:09 vps sshd[903541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.50.18
Jun 13 23:04:11 vps sshd[903541]: Failed password for invalid user Welkome$#1234 from 138.68.50.18 port 49994 ssh2
Jun 13 23:05:09 vps sshd[911289]: Invalid user meres from 138.68.50.18 port 60372
...
2020-06-14 09:19:01
45.4.220.217 attackbots
Breking htpasswd / WordPress brute force attempts
2020-06-14 09:07:50
103.126.244.229 attackspambots
DATE:2020-06-13 23:05:02, IP:103.126.244.229, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-06-14 09:23:45

最近上报的IP列表

17.97.221.215 50.71.175.249 243.109.62.97 193.162.26.158
128.1.186.37 5.239.34.82 210.238.83.147 41.33.56.200
98.92.25.167 13.154.208.79 253.127.133.172 206.116.255.216
86.84.248.69 124.46.151.138 215.184.246.211 76.76.82.153
38.194.140.35 206.198.104.93 32.93.140.45 15.240.115.168