必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Bosnia and Herzegovina

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.165.136.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 461
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.165.136.242.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 10:51:08 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
242.136.165.109.in-addr.arpa domain name pointer adsl-165-136-242.teol.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.136.165.109.in-addr.arpa	name = adsl-165-136-242.teol.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.13.44.83 attack
Oct 17 04:20:16 venus sshd\[24399\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.44.83  user=root
Oct 17 04:20:17 venus sshd\[24399\]: Failed password for root from 106.13.44.83 port 35516 ssh2
Oct 17 04:24:17 venus sshd\[24458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.44.83  user=root
...
2019-10-17 12:51:19
103.133.110.77 attack
Oct 17 05:56:00 mail postfix/smtpd\[23562\]: warning: unknown\[103.133.110.77\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 17 05:56:07 mail postfix/smtpd\[23562\]: warning: unknown\[103.133.110.77\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 17 05:56:18 mail postfix/smtpd\[23562\]: warning: unknown\[103.133.110.77\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-10-17 12:59:45
62.234.141.48 attackbotsspam
Oct 17 04:50:17 venus sshd\[24851\]: Invalid user pass from 62.234.141.48 port 33944
Oct 17 04:50:17 venus sshd\[24851\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.141.48
Oct 17 04:50:19 venus sshd\[24851\]: Failed password for invalid user pass from 62.234.141.48 port 33944 ssh2
...
2019-10-17 12:56:52
129.204.115.214 attackbotsspam
Oct 17 00:52:07 firewall sshd[9240]: Failed password for invalid user sy from 129.204.115.214 port 43726 ssh2
Oct 17 00:56:34 firewall sshd[9341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.115.214  user=root
Oct 17 00:56:35 firewall sshd[9341]: Failed password for root from 129.204.115.214 port 56482 ssh2
...
2019-10-17 12:50:19
49.207.33.2 attack
Oct 17 06:27:53 minden010 sshd[15437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.207.33.2
Oct 17 06:27:55 minden010 sshd[15437]: Failed password for invalid user Root1q2w3e from 49.207.33.2 port 41412 ssh2
Oct 17 06:32:02 minden010 sshd[21260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.207.33.2
...
2019-10-17 13:04:37
124.195.201.233 attackspambots
Automatic report - Port Scan Attack
2019-10-17 12:31:39
221.9.135.85 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/221.9.135.85/ 
 CN - 1H : (557)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4837 
 
 IP : 221.9.135.85 
 
 CIDR : 221.9.0.0/16 
 
 PREFIX COUNT : 1262 
 
 UNIQUE IP COUNT : 56665856 
 
 
 WYKRYTE ATAKI Z ASN4837 :  
  1H - 8 
  3H - 28 
  6H - 61 
 12H - 101 
 24H - 191 
 
 DateTime : 2019-10-17 05:56:44 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-17 12:44:37
62.234.83.50 attackspam
Invalid user nginx from 62.234.83.50 port 32775
2019-10-17 13:08:28
103.28.2.60 attackbotsspam
Oct 16 18:08:34 php1 sshd\[16221\]: Invalid user abc123 from 103.28.2.60
Oct 16 18:08:34 php1 sshd\[16221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.28.2.60
Oct 16 18:08:36 php1 sshd\[16221\]: Failed password for invalid user abc123 from 103.28.2.60 port 48254 ssh2
Oct 16 18:14:11 php1 sshd\[16994\]: Invalid user qwerty from 103.28.2.60
Oct 16 18:14:11 php1 sshd\[16994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.28.2.60
2019-10-17 12:30:15
168.63.154.174 attack
Oct 17 05:56:53 icinga sshd[14276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.63.154.174
Oct 17 05:56:55 icinga sshd[14276]: Failed password for invalid user wasadrc from 168.63.154.174 port 45200 ssh2
...
2019-10-17 12:40:55
92.207.166.44 attackbots
$f2bV_matches
2019-10-17 12:58:51
193.112.143.141 attackspam
Oct 17 05:52:34 v22019058497090703 sshd[29470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.143.141
Oct 17 05:52:36 v22019058497090703 sshd[29470]: Failed password for invalid user onetwothree from 193.112.143.141 port 43854 ssh2
Oct 17 05:56:53 v22019058497090703 sshd[29794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.143.141
...
2019-10-17 12:41:42
107.172.80.103 attackspambots
(From shortraquel040@gmail.com) Hi!

There are some issues on your website that needs to be fixed in order for your website to move up in the rankings in Google and the other search engines. Would you be interested in getting a free consultation to learn a little more about how search engine optimization (SEO) can help make your website more profitable? 

I'm a freelancer who provides search engine optimization services, and I'm seeking new clients that have good businesses, but are struggling with their search engine rankings. I'd like to bring more traffic/sales to your site, so please let me know about your preferred contact number and the best time for a call. Talk to you soon! 

Thanks!
Raquel Short
2019-10-17 13:04:22
118.141.215.184 attackbotsspam
2019-10-17T05:56:39.492193lon01.zurich-datacenter.net sshd\[22653\]: Invalid user pi from 118.141.215.184 port 58824
2019-10-17T05:56:39.710342lon01.zurich-datacenter.net sshd\[22653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.141.215.184
2019-10-17T05:56:39.851576lon01.zurich-datacenter.net sshd\[22654\]: Invalid user pi from 118.141.215.184 port 58828
2019-10-17T05:56:40.111234lon01.zurich-datacenter.net sshd\[22654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.141.215.184
2019-10-17T05:56:41.272164lon01.zurich-datacenter.net sshd\[22653\]: Failed password for invalid user pi from 118.141.215.184 port 58824 ssh2
...
2019-10-17 12:47:42
188.214.255.241 attackbotsspam
Oct 17 06:07:25 vps01 sshd[13425]: Failed password for root from 188.214.255.241 port 33636 ssh2
2019-10-17 13:06:13

最近上报的IP列表

55.118.230.141 17.37.139.137 207.52.3.141 234.178.191.211
92.134.234.252 47.164.67.207 250.87.26.8 17.233.123.119
118.160.62.165 30.207.149.98 221.203.18.47 92.30.128.238
100.241.199.155 49.167.16.80 82.255.235.192 159.91.113.233
146.37.93.4 204.165.84.50 240.226.161.105 74.201.147.201