必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): Henan

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.193.195.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4051
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;1.193.195.242.			IN	A

;; AUTHORITY SECTION:
.			334	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019122401 1800 900 604800 86400

;; Query time: 103 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 25 03:57:43 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
Host 242.195.193.1.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.195.193.1.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
66.249.64.222 attackbotsspam
EventTime:Mon Oct 7 06:52:19 AEDT 2019,EventName:Script not found,TargetDataNamespace:/,TargetDataContainer:srv/www/upperbay.info/site/media/js/,TargetDataName:register.ub,SourceIP:66.249.64.222,VendorOutcomeCode:E_NULL,InitiatorServiceName:44790
2019-10-07 04:45:34
71.40.80.50 attack
Unauthorised access (Oct  6) SRC=71.40.80.50 LEN=52 TOS=0x10 PREC=0x40 TTL=115 ID=23448 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-07 05:08:56
149.56.96.78 attackspambots
Oct  6 22:34:03 SilenceServices sshd[8688]: Failed password for root from 149.56.96.78 port 50468 ssh2
Oct  6 22:37:51 SilenceServices sshd[9741]: Failed password for root from 149.56.96.78 port 25806 ssh2
2019-10-07 04:46:47
187.107.136.134 attackbotsspam
Oct  6 22:13:00 mail postfix/smtpd[15879]: warning: unknown[187.107.136.134]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  6 22:13:05 mail postfix/smtpd[13299]: warning: unknown[187.107.136.134]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  6 22:21:27 mail postfix/smtpd[15343]: warning: unknown[187.107.136.134]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  6 22:21:27 mail postfix/smtpd[15281]: warning: unknown[187.107.136.134]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-07 04:51:20
168.232.128.248 attackspambots
Automatic report - Banned IP Access
2019-10-07 05:07:23
212.47.246.150 attackbotsspam
Oct  6 10:19:39 hpm sshd\[20060\]: Invalid user Passwort1@ from 212.47.246.150
Oct  6 10:19:39 hpm sshd\[20060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150-246-47-212.rev.cloud.scaleway.com
Oct  6 10:19:41 hpm sshd\[20060\]: Failed password for invalid user Passwort1@ from 212.47.246.150 port 49094 ssh2
Oct  6 10:23:28 hpm sshd\[20367\]: Invalid user 1qa@WS\#ED from 212.47.246.150
Oct  6 10:23:28 hpm sshd\[20367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150-246-47-212.rev.cloud.scaleway.com
2019-10-07 05:05:00
181.39.37.101 attackbots
Oct  6 10:49:09 php1 sshd\[23395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.39.37.101  user=root
Oct  6 10:49:10 php1 sshd\[23395\]: Failed password for root from 181.39.37.101 port 43358 ssh2
Oct  6 10:53:38 php1 sshd\[23785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.39.37.101  user=root
Oct  6 10:53:40 php1 sshd\[23785\]: Failed password for root from 181.39.37.101 port 55192 ssh2
Oct  6 10:58:02 php1 sshd\[24155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.39.37.101  user=root
2019-10-07 05:11:10
94.191.30.193 attackbotsspam
Oct  6 22:54:49 minden010 sshd[22309]: Failed password for root from 94.191.30.193 port 55602 ssh2
Oct  6 22:58:13 minden010 sshd[23555]: Failed password for root from 94.191.30.193 port 55722 ssh2
...
2019-10-07 05:11:25
116.203.76.61 attackspam
Oct  6 10:38:58 sachi sshd\[22804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static.61.76.203.116.clients.your-server.de  user=root
Oct  6 10:39:00 sachi sshd\[22804\]: Failed password for root from 116.203.76.61 port 38036 ssh2
Oct  6 10:42:36 sachi sshd\[23159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static.61.76.203.116.clients.your-server.de  user=root
Oct  6 10:42:38 sachi sshd\[23159\]: Failed password for root from 116.203.76.61 port 49720 ssh2
Oct  6 10:46:18 sachi sshd\[23452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static.61.76.203.116.clients.your-server.de  user=root
2019-10-07 04:50:24
12.109.85.254 attackspambots
" "
2019-10-07 04:51:01
185.107.243.84 attack
WordPress XMLRPC scan :: 185.107.243.84 0.120 BYPASS [07/Oct/2019:06:52:03  1100] www.[censored_1] "GET /xmlrpc.php?rsd HTTP/1.1" 200 760 "https://www.[censored_1]/knowledge-base/wordpress/wordpress-how-to-remove-all-query-args-from-a-url/" "Mozilla/5.0 (Windows NT 5.1; WOW64; rv:47.0) Gecko/20100101 Firefox/47.0"
2019-10-07 05:12:00
150.249.192.154 attack
Oct  6 16:55:51 TORMINT sshd\[25633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.249.192.154  user=root
Oct  6 16:55:54 TORMINT sshd\[25633\]: Failed password for root from 150.249.192.154 port 42116 ssh2
Oct  6 17:00:01 TORMINT sshd\[26051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.249.192.154  user=root
...
2019-10-07 05:05:43
157.245.53.190 attack
web-1 [ssh_2] SSH Attack
2019-10-07 04:40:23
182.253.105.93 attack
2019-10-06T20:29:06.142059shield sshd\[31342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.105.93  user=root
2019-10-06T20:29:08.103955shield sshd\[31342\]: Failed password for root from 182.253.105.93 port 41588 ssh2
2019-10-06T20:33:49.179974shield sshd\[31617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.105.93  user=root
2019-10-06T20:33:51.327362shield sshd\[31617\]: Failed password for root from 182.253.105.93 port 52944 ssh2
2019-10-06T20:38:29.963006shield sshd\[31837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.105.93  user=root
2019-10-07 04:42:45
222.186.190.2 attack
Oct  6 22:35:09 nextcloud sshd\[12811\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
Oct  6 22:35:10 nextcloud sshd\[12811\]: Failed password for root from 222.186.190.2 port 45108 ssh2
Oct  6 22:35:24 nextcloud sshd\[12811\]: Failed password for root from 222.186.190.2 port 45108 ssh2
...
2019-10-07 04:43:59

最近上报的IP列表

112.21.181.201 213.134.37.84 180.148.102.184 185.46.197.77
196.86.85.121 222.239.40.144 198.100.96.220 198.211.106.147
75.205.225.25 90.136.238.86 59.95.237.201 215.176.107.223
208.199.12.170 201.43.241.7 150.116.211.111 203.42.134.114
130.240.187.165 46.217.169.56 79.64.187.155 56.165.128.37