必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Africa

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.254.242.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21291
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;102.254.242.242.		IN	A

;; AUTHORITY SECTION:
.			340	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023102100 1800 900 604800 86400

;; Query time: 97 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 22 00:44:22 CST 2023
;; MSG SIZE  rcvd: 108
HOST信息:
Host 242.242.254.102.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.242.254.102.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
221.133.1.11 attack
Nov  2 02:07:36 sachi sshd\[12098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.133.1.11  user=root
Nov  2 02:07:38 sachi sshd\[12098\]: Failed password for root from 221.133.1.11 port 45188 ssh2
Nov  2 02:15:39 sachi sshd\[12849\]: Invalid user ow from 221.133.1.11
Nov  2 02:15:39 sachi sshd\[12849\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.133.1.11
Nov  2 02:15:42 sachi sshd\[12849\]: Failed password for invalid user ow from 221.133.1.11 port 55902 ssh2
2019-11-03 01:41:45
185.36.219.127 attackspam
slow and persistent scanner
2019-11-03 01:32:13
149.202.55.18 attack
Nov  2 09:14:44 debian sshd\[22364\]: Invalid user gamasucc from 149.202.55.18 port 34470
Nov  2 09:14:44 debian sshd\[22364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.55.18
Nov  2 09:14:46 debian sshd\[22364\]: Failed password for invalid user gamasucc from 149.202.55.18 port 34470 ssh2
...
2019-11-03 01:22:36
222.186.31.204 attack
Nov  2 15:02:31 ip-172-31-1-72 sshd\[2375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.204  user=root
Nov  2 15:02:33 ip-172-31-1-72 sshd\[2375\]: Failed password for root from 222.186.31.204 port 64142 ssh2
Nov  2 15:03:09 ip-172-31-1-72 sshd\[2386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.204  user=root
Nov  2 15:03:11 ip-172-31-1-72 sshd\[2386\]: Failed password for root from 222.186.31.204 port 30825 ssh2
Nov  2 15:05:32 ip-172-31-1-72 sshd\[2435\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.204  user=root
2019-11-03 02:02:28
50.67.178.164 attack
Nov  2 03:09:00 tdfoods sshd\[19866\]: Invalid user senlinyan from 50.67.178.164
Nov  2 03:09:00 tdfoods sshd\[19866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s0106ac202e1dbfb3.va.shawcable.net
Nov  2 03:09:02 tdfoods sshd\[19866\]: Failed password for invalid user senlinyan from 50.67.178.164 port 50800 ssh2
Nov  2 03:15:58 tdfoods sshd\[20494\]: Invalid user budlite from 50.67.178.164
Nov  2 03:15:58 tdfoods sshd\[20494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s0106ac202e1dbfb3.va.shawcable.net
2019-11-03 01:24:08
177.73.104.199 attack
Automatic report - Banned IP Access
2019-11-03 01:24:41
134.175.151.40 attackbots
Nov  2 22:53:10 gw1 sshd[2705]: Failed password for root from 134.175.151.40 port 40392 ssh2
...
2019-11-03 01:59:24
193.32.160.146 attackbotsspam
NOQUEUE: reject: RCPT from unknown[193.32.160.150]: 450 4.7.1 Client host rejected: cannot find your reverse hostname, [193.32.160.150]; from=
2019-11-03 01:59:02
212.82.100.150 attack
bulk spam - @yahoo.in
2019-11-03 02:05:46
203.91.114.6 attack
Nov  2 14:37:08 server sshd\[7651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.91.114.6  user=root
Nov  2 14:37:10 server sshd\[7651\]: Failed password for root from 203.91.114.6 port 46548 ssh2
Nov  2 14:51:27 server sshd\[11432\]: Invalid user tomcat from 203.91.114.6
Nov  2 14:51:27 server sshd\[11432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.91.114.6 
Nov  2 14:51:29 server sshd\[11432\]: Failed password for invalid user tomcat from 203.91.114.6 port 51056 ssh2
...
2019-11-03 01:57:21
185.36.218.73 attack
slow and persistent scanner
2019-11-03 01:28:40
51.91.212.79 attackbotsspam
Connection by 51.91.212.79 on port: 1025 got caught by honeypot at 11/2/2019 5:46:09 PM
2019-11-03 02:03:34
42.115.11.81 attackspambots
port scan and connect, tcp 23 (telnet)
2019-11-03 01:57:45
45.150.140.125 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/45.150.140.125/ 
 
 EU - 1H : (9)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : EU 
 NAME ASN : ASN0 
 
 IP : 45.150.140.125 
 
 CIDR : 45.148.0.0/14 
 
 PREFIX COUNT : 50243 
 
 UNIQUE IP COUNT : 856105392 
 
 
 ATTACKS DETECTED ASN0 :  
  1H - 2 
  3H - 2 
  6H - 4 
 12H - 7 
 24H - 7 
 
 DateTime : 2019-11-02 16:58:03 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-11-03 01:38:55
220.130.222.156 attack
Automatic report - Banned IP Access
2019-11-03 01:25:26

最近上报的IP列表

102.254.67.97 102.254.234.92 102.254.213.28 102.254.238.132
102.254.233.73 102.254.2.255 102.254.92.176 102.255.15.210
102.255.102.118 102.254.51.1 102.254.3.211 102.254.29.96
102.254.148.236 102.254.218.50 102.254.209.53 102.255.139.148
102.254.140.113 102.254.55.2 102.254.170.65 102.254.107.29