必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Taipei

省份(region): Taipei City

国家(country): Taiwan, China

运营商(isp): Chunghwa

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.164.248.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17435
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.164.248.42.			IN	A

;; AUTHORITY SECTION:
.			255	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040101 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 01 19:43:41 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
42.248.164.1.in-addr.arpa domain name pointer 1-164-248-42.dynamic-ip.hinet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.248.164.1.in-addr.arpa	name = 1-164-248-42.dynamic-ip.hinet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
104.236.124.45 attack
Sep 18 04:47:57 meumeu sshd[17445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.124.45 
Sep 18 04:48:00 meumeu sshd[17445]: Failed password for invalid user bruna from 104.236.124.45 port 42246 ssh2
Sep 18 04:57:10 meumeu sshd[18661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.124.45 
...
2019-11-30 18:59:45
91.121.211.59 attack
2019-11-30T10:19:42.094669shield sshd\[32126\]: Invalid user csgo from 91.121.211.59 port 48818
2019-11-30T10:19:42.098837shield sshd\[32126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns364518.ip-91-121-211.eu
2019-11-30T10:19:43.635503shield sshd\[32126\]: Failed password for invalid user csgo from 91.121.211.59 port 48818 ssh2
2019-11-30T10:22:38.232315shield sshd\[519\]: Invalid user jalar from 91.121.211.59 port 56072
2019-11-30T10:22:38.236359shield sshd\[519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns364518.ip-91-121-211.eu
2019-11-30 19:10:44
189.89.94.242 attackbotsspam
Nov 29 06:05:23 hgb10502 sshd[9810]: Invalid user stoneboy from 189.89.94.242 port 56522
Nov 29 06:05:25 hgb10502 sshd[9810]: Failed password for invalid user stoneboy from 189.89.94.242 port 56522 ssh2
Nov 29 06:05:25 hgb10502 sshd[9810]: Received disconnect from 189.89.94.242 port 56522:11: Bye Bye [preauth]
Nov 29 06:05:25 hgb10502 sshd[9810]: Disconnected from 189.89.94.242 port 56522 [preauth]
Nov 29 06:25:30 hgb10502 sshd[11510]: Invalid user uri from 189.89.94.242 port 46432
Nov 29 06:25:32 hgb10502 sshd[11510]: Failed password for invalid user uri from 189.89.94.242 port 46432 ssh2
Nov 29 06:25:32 hgb10502 sshd[11510]: Received disconnect from 189.89.94.242 port 46432:11: Bye Bye [preauth]
Nov 29 06:25:32 hgb10502 sshd[11510]: Disconnected from 189.89.94.242 port 46432 [preauth]
Nov 29 06:29:16 hgb10502 sshd[11802]: Invalid user newuser from 189.89.94.242 port 57174
Nov 29 06:29:18 hgb10502 sshd[11802]: Failed password for invalid user newuser from 189.89.94.242........
-------------------------------
2019-11-30 19:19:25
125.124.30.186 attackspam
Nov 30 10:40:23 server sshd\[28169\]: Invalid user hope from 125.124.30.186 port 48992
Nov 30 10:40:23 server sshd\[28169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.30.186
Nov 30 10:40:25 server sshd\[28169\]: Failed password for invalid user hope from 125.124.30.186 port 48992 ssh2
Nov 30 10:48:07 server sshd\[17042\]: Invalid user splashmc123 from 125.124.30.186 port 54180
Nov 30 10:48:07 server sshd\[17042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.30.186
2019-11-30 18:51:58
128.199.88.188 attackspambots
Oct  2 13:32:48 meumeu sshd[7855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.88.188 
Oct  2 13:32:51 meumeu sshd[7855]: Failed password for invalid user mysql from 128.199.88.188 port 56774 ssh2
Oct  2 13:36:54 meumeu sshd[8438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.88.188 
...
2019-11-30 18:47:39
194.61.26.34 attack
2019-11-29 UTC: 5x - (5x)
2019-11-30 19:05:26
74.115.140.250 attackbotsspam
Nov 30 11:19:46 v22018053744266470 sshd[7189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.115.140.250
Nov 30 11:19:47 v22018053744266470 sshd[7189]: Failed password for invalid user brooker from 74.115.140.250 port 55074 ssh2
Nov 30 11:27:13 v22018053744266470 sshd[7706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.115.140.250
...
2019-11-30 18:49:39
45.143.221.26 attackbots
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-11-30 18:53:27
88.246.2.148 attackbotsspam
Automatic report - Banned IP Access
2019-11-30 19:16:46
148.243.62.178 attackbots
Win32.Conficker.C p2p CVE-2008-4250, PTR: na-148-243-63-178.static.avantel.net.mx.
2019-11-30 19:13:17
95.73.81.246 attackbotsspam
'IP reached maximum auth failures for a one day block'
2019-11-30 18:56:42
222.188.109.227 attack
Nov 30 07:24:01 venus sshd\[1975\]: Invalid user sonatine from 222.188.109.227 port 45404
Nov 30 07:24:01 venus sshd\[1975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.188.109.227
Nov 30 07:24:03 venus sshd\[1975\]: Failed password for invalid user sonatine from 222.188.109.227 port 45404 ssh2
...
2019-11-30 19:07:49
111.230.143.110 attackbotsspam
Nov 30 08:49:02 localhost sshd\[99165\]: Invalid user zxc from 111.230.143.110 port 39428
Nov 30 08:49:02 localhost sshd\[99165\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.143.110
Nov 30 08:49:04 localhost sshd\[99165\]: Failed password for invalid user zxc from 111.230.143.110 port 39428 ssh2
Nov 30 08:52:56 localhost sshd\[99221\]: Invalid user Senha1qaz from 111.230.143.110 port 44320
Nov 30 08:52:56 localhost sshd\[99221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.143.110
...
2019-11-30 19:20:51
35.189.29.42 attackbotsspam
Automatic report - XMLRPC Attack
2019-11-30 19:21:31
5.182.210.228 attack
5.182.210.228 - - \[30/Nov/2019:09:12:48 +0100\] "POST /wp-login.php HTTP/1.0" 200 7656 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
5.182.210.228 - - \[30/Nov/2019:09:12:49 +0100\] "POST /wp-login.php HTTP/1.0" 200 7486 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
5.182.210.228 - - \[30/Nov/2019:09:12:49 +0100\] "POST /wp-login.php HTTP/1.0" 200 7480 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-30 19:04:27

最近上报的IP列表

1.164.246.113 79.85.71.52 1.164.50.217 1.164.51.185
1.164.54.40 1.165.121.179 1.165.159.12 1.165.162.144
1.165.187.21 1.165.230.243 1.165.62.3 1.165.71.138
1.165.8.169 1.165.8.63 1.165.85.19 1.168.10.160
1.168.195.2 1.168.80.121 1.168.86.79 1.168.90.34