必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tokyo

省份(region): Tokyo

国家(country): Japan

运营商(isp): KDDI Corporation

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.154.192.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36508
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.154.192.242.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 16:29:40 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
242.192.154.118.in-addr.arpa domain name pointer KD118154192242.ppp-bb.dion.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.192.154.118.in-addr.arpa	name = KD118154192242.ppp-bb.dion.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
125.163.246.45 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-07 06:52:16,387 INFO [amun_request_handler] PortScan Detected on Port: 445 (125.163.246.45)
2019-08-07 19:47:16
193.105.134.95 attack
07.08.2019 10:24:10 SSH access blocked by firewall
2019-08-07 19:49:51
79.30.231.188 attackbotsspam
IT Italy host188-231-dynamic.30-79-r.retail.telecomitalia.it Hits: 11
2019-08-07 19:24:23
106.75.76.23 attackspam
Aug  5 18:51:37 toyboy sshd[32479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.76.23  user=r.r
Aug  5 18:51:40 toyboy sshd[32479]: Failed password for r.r from 106.75.76.23 port 59204 ssh2
Aug  5 18:51:43 toyboy sshd[32479]: Failed password for r.r from 106.75.76.23 port 59204 ssh2
Aug  5 18:51:45 toyboy sshd[32479]: Failed password for r.r from 106.75.76.23 port 59204 ssh2
Aug  5 18:51:47 toyboy sshd[32479]: Failed password for r.r from 106.75.76.23 port 59204 ssh2
Aug  5 18:51:50 toyboy sshd[32479]: Failed password for r.r from 106.75.76.23 port 59204 ssh2
Aug  5 18:51:50 toyboy sshd[32479]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.76.23  user=r.r
Aug  5 18:51:52 toyboy sshd[32481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.76.23  user=r.r
Aug  5 18:51:54 toyboy sshd[32481]: Failed password for r.r from 106.75.76.23 port........
-------------------------------
2019-08-07 19:58:47
51.38.131.1 attackspambots
ssh intrusion attempt
2019-08-07 19:37:04
78.100.18.81 attack
Aug  7 08:25:08 mail sshd[17532]: Invalid user ubuntu from 78.100.18.81
Aug  7 08:25:08 mail sshd[17532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.100.18.81
Aug  7 08:25:08 mail sshd[17532]: Invalid user ubuntu from 78.100.18.81
Aug  7 08:25:10 mail sshd[17532]: Failed password for invalid user ubuntu from 78.100.18.81 port 53509 ssh2
Aug  7 08:55:58 mail sshd[21270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.100.18.81  user=root
Aug  7 08:56:00 mail sshd[21270]: Failed password for root from 78.100.18.81 port 41795 ssh2
...
2019-08-07 19:55:41
59.49.99.124 attackbotsspam
Aug  7 14:01:55 yabzik sshd[26785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.49.99.124
Aug  7 14:01:57 yabzik sshd[26785]: Failed password for invalid user ruthie from 59.49.99.124 port 28752 ssh2
Aug  7 14:06:57 yabzik sshd[28390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.49.99.124
2019-08-07 19:15:43
188.165.211.201 attackspambots
SSH Bruteforce
2019-08-07 19:52:52
104.238.92.8 attackbots
WordPress wp-login brute force :: 104.238.92.8 0.052 BYPASS [07/Aug/2019:19:09:59  1000] [censored_4] "POST /wp-login.php HTTP/1.1" 200 3989 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-07 20:06:44
121.188.30.234 attack
" "
2019-08-07 19:58:10
177.139.161.81 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-07 07:21:51,464 INFO [amun_request_handler] PortScan Detected on Port: 445 (177.139.161.81)
2019-08-07 20:03:13
142.93.108.200 attackspambots
Aug  7 12:57:08 vpn01 sshd\[6233\]: Invalid user test from 142.93.108.200
Aug  7 12:57:08 vpn01 sshd\[6233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.108.200
Aug  7 12:57:10 vpn01 sshd\[6233\]: Failed password for invalid user test from 142.93.108.200 port 60210 ssh2
2019-08-07 19:49:17
36.232.128.38 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-07 07:03:35,152 INFO [shellcode_manager] (36.232.128.38) no match, writing hexdump (06cb1cdc794ded1faa9f8ed0bf4f6df0 :10711) - SMB (Unknown)
2019-08-07 19:41:42
54.39.145.59 attackspambots
Aug  7 13:03:49 MK-Soft-Root2 sshd\[5852\]: Invalid user radiusd from 54.39.145.59 port 60678
Aug  7 13:03:49 MK-Soft-Root2 sshd\[5852\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.145.59
Aug  7 13:03:51 MK-Soft-Root2 sshd\[5852\]: Failed password for invalid user radiusd from 54.39.145.59 port 60678 ssh2
...
2019-08-07 19:39:29
221.132.17.75 attackspam
Aug  7 09:57:28 localhost sshd\[32208\]: Invalid user angelo from 221.132.17.75 port 54686
Aug  7 09:57:29 localhost sshd\[32208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.132.17.75
Aug  7 09:57:30 localhost sshd\[32208\]: Failed password for invalid user angelo from 221.132.17.75 port 54686 ssh2
2019-08-07 19:26:11

最近上报的IP列表

97.162.146.191 224.28.220.72 54.166.199.144 64.27.238.145
47.34.136.45 121.43.208.55 227.85.46.92 191.13.154.234
73.69.91.159 47.37.122.169 62.179.200.72 119.199.91.102
226.196.253.252 195.129.132.129 253.53.25.170 73.190.241.76
143.229.61.9 46.94.153.126 57.255.197.35 117.208.61.3