必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.64.249.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37597
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.64.249.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021101 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 04:34:59 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 242.249.64.113.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.249.64.113.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
111.231.68.2 attackbotsspam
Nov  7 00:20:34 hcbbdb sshd\[28563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.68.2  user=root
Nov  7 00:20:36 hcbbdb sshd\[28563\]: Failed password for root from 111.231.68.2 port 47148 ssh2
Nov  7 00:24:56 hcbbdb sshd\[29045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.68.2  user=root
Nov  7 00:24:58 hcbbdb sshd\[29045\]: Failed password for root from 111.231.68.2 port 55450 ssh2
Nov  7 00:29:15 hcbbdb sshd\[29499\]: Invalid user test from 111.231.68.2
2019-11-07 09:16:37
222.186.173.180 attackspam
$f2bV_matches
2019-11-07 13:25:37
59.96.83.92 attack
Automatic report - Port Scan Attack
2019-11-07 13:06:22
138.68.148.177 attack
Nov  7 05:51:10 MainVPS sshd[32326]: Invalid user jeanmarc from 138.68.148.177 port 57706
Nov  7 05:51:10 MainVPS sshd[32326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.148.177
Nov  7 05:51:10 MainVPS sshd[32326]: Invalid user jeanmarc from 138.68.148.177 port 57706
Nov  7 05:51:12 MainVPS sshd[32326]: Failed password for invalid user jeanmarc from 138.68.148.177 port 57706 ssh2
Nov  7 05:57:26 MainVPS sshd[32764]: Invalid user monday from 138.68.148.177 port 39064
...
2019-11-07 13:04:00
69.85.70.37 attack
Nov  7 01:17:48 server sshd\[20312\]: Invalid user lx from 69.85.70.37 port 32944
Nov  7 01:17:48 server sshd\[20312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.85.70.37
Nov  7 01:17:50 server sshd\[20312\]: Failed password for invalid user lx from 69.85.70.37 port 32944 ssh2
Nov  7 01:22:04 server sshd\[1935\]: Invalid user info4 from 69.85.70.37 port 44862
Nov  7 01:22:04 server sshd\[1935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.85.70.37
2019-11-07 09:13:03
206.189.153.178 attackbotsspam
Nov  7 06:09:23 vps691689 sshd[14449]: Failed password for root from 206.189.153.178 port 60286 ssh2
Nov  7 06:13:35 vps691689 sshd[14468]: Failed password for root from 206.189.153.178 port 41052 ssh2
...
2019-11-07 13:18:54
183.111.125.199 attackbots
2019-11-07T00:18:04.100050abusebot-3.cloudsearch.cf sshd\[3320\]: Invalid user asdfg12345\^\& from 183.111.125.199 port 43954
2019-11-07 09:11:57
222.186.52.86 attack
Nov  6 19:45:28 ny01 sshd[28200]: Failed password for root from 222.186.52.86 port 57988 ssh2
Nov  6 19:45:31 ny01 sshd[28200]: Failed password for root from 222.186.52.86 port 57988 ssh2
Nov  6 19:45:33 ny01 sshd[28200]: Failed password for root from 222.186.52.86 port 57988 ssh2
2019-11-07 09:11:15
106.12.16.234 attack
Nov  7 05:51:02 v22019058497090703 sshd[5207]: Failed password for root from 106.12.16.234 port 46744 ssh2
Nov  7 05:56:36 v22019058497090703 sshd[5670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.234
Nov  7 05:56:39 v22019058497090703 sshd[5670]: Failed password for invalid user administrator from 106.12.16.234 port 56740 ssh2
...
2019-11-07 13:26:48
148.72.210.28 attackspam
2019-11-07T06:17:33.267906host3.slimhost.com.ua sshd[1219735]: Invalid user suck from 148.72.210.28 port 39608
2019-11-07T06:17:33.277270host3.slimhost.com.ua sshd[1219735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-148-72-210-28.ip.secureserver.net
2019-11-07T06:17:33.267906host3.slimhost.com.ua sshd[1219735]: Invalid user suck from 148.72.210.28 port 39608
2019-11-07T06:17:35.063377host3.slimhost.com.ua sshd[1219735]: Failed password for invalid user suck from 148.72.210.28 port 39608 ssh2
2019-11-07T06:21:50.418204host3.slimhost.com.ua sshd[1222570]: Invalid user Gabrielle from 148.72.210.28 port 48380
...
2019-11-07 13:29:10
210.217.124.203 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/210.217.124.203/ 
 
 KR - 1H : (149)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : KR 
 NAME ASN : ASN4766 
 
 IP : 210.217.124.203 
 
 CIDR : 210.217.0.0/17 
 
 PREFIX COUNT : 8136 
 
 UNIQUE IP COUNT : 44725248 
 
 
 ATTACKS DETECTED ASN4766 :  
  1H - 6 
  3H - 13 
  6H - 21 
 12H - 58 
 24H - 83 
 
 DateTime : 2019-11-07 05:56:38 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-07 13:26:01
113.161.160.93 attackspam
Helo
2019-11-07 13:21:58
182.148.100.11 attack
Nov  7 03:04:00 site3 sshd\[41300\]: Invalid user pentrudealerudavid from 182.148.100.11
Nov  7 03:04:00 site3 sshd\[41300\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.148.100.11
Nov  7 03:04:02 site3 sshd\[41300\]: Failed password for invalid user pentrudealerudavid from 182.148.100.11 port 56111 ssh2
Nov  7 03:08:25 site3 sshd\[41373\]: Invalid user dioge from 182.148.100.11
Nov  7 03:08:25 site3 sshd\[41373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.148.100.11
...
2019-11-07 09:12:14
185.176.27.18 attackspambots
185.176.27.18 was recorded 132 times by 30 hosts attempting to connect to the following ports: 33831,33832,33800,33886,33828,33889,33878,33808,33882,33860,33817,33834,33876,33825,33846,33843,33848,33823,33835,33871,33811,33875,33863,33858,33862,33887,33853,33883,33805,33839,33838,33815,33847,33869,33830,33888,33851,33833,33849,33881,33880,33844,33866,33842,33801,33852,33809,33803,33879,33841,33872,33861,33868,33867,33810,33845,33836,33885,33859,33807,33870,33802,33865,33873,33813,33864,33818,33814,33816,33840. Incident counter (4h, 24h, all-time): 132, 645, 1536
2019-11-07 13:14:46
106.53.72.83 attackbotsspam
Nov  7 00:58:41 MK-Soft-VM5 sshd[19669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.72.83 
Nov  7 00:58:43 MK-Soft-VM5 sshd[19669]: Failed password for invalid user zebra from 106.53.72.83 port 33296 ssh2
...
2019-11-07 09:10:16

最近上报的IP列表

147.88.190.57 188.183.118.62 203.223.53.65 56.169.21.61
8.31.234.158 43.241.15.97 238.101.183.75 244.70.171.13
127.177.228.91 236.181.49.175 128.186.129.109 154.237.238.157
113.27.22.250 44.128.211.189 241.199.16.210 83.52.75.36
210.96.223.31 135.43.238.179 213.149.231.69 17.140.81.114