必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.114.22.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8312
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.114.22.242.			IN	A

;; AUTHORITY SECTION:
.			155	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 11:26:56 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 242.22.114.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.22.114.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
90.151.180.215 attack
Registration form abuse
2020-09-06 07:23:47
54.36.241.186 attack
2020-09-06T00:03:17.730400snf-827550 sshd[6944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip186.ip-54-36-241.eu  user=root
2020-09-06T00:03:19.356502snf-827550 sshd[6944]: Failed password for root from 54.36.241.186 port 58458 ssh2
2020-09-06T00:05:37.112104snf-827550 sshd[6966]: Invalid user 8r>bzvCUd_zH*9 from 54.36.241.186 port 55898
...
2020-09-06 07:04:28
51.223.213.73 attack
Unauthorized connection attempt from IP address 51.223.213.73 on Port 445(SMB)
2020-09-06 07:34:57
171.103.190.158 attackbots
failed attempts to access the website, searching for vulnerabilities, also using following IPs: 27.37.246.129 , 94.231.218.223 , 116.90.237.125 ,  190.235.214.78 ,  190.98.53.86 , 45.170.129.135 ,  170.239.242.222 , 43.249.113.243 ,  103.140.4.87 ,  171.103.190.158 , 72.210.252.135
2020-09-06 07:35:16
49.88.112.116 attack
Sep  6 01:14:43 mail sshd[2717]: refused connect from 49.88.112.116 (49.88.112.116)
Sep  6 01:15:09 mail sshd[2735]: refused connect from 49.88.112.116 (49.88.112.116)
Sep  6 01:16:09 mail sshd[2776]: refused connect from 49.88.112.116 (49.88.112.116)
Sep  6 01:17:07 mail sshd[2829]: refused connect from 49.88.112.116 (49.88.112.116)
Sep  6 01:18:07 mail sshd[2902]: refused connect from 49.88.112.116 (49.88.112.116)
...
2020-09-06 07:33:19
103.63.215.38 attackspam
Icarus honeypot on github
2020-09-06 07:13:14
62.234.20.135 attack
62.234.20.135 (CN/China/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep  5 17:24:57 server2 sshd[32511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.59.139  user=root
Sep  5 17:22:53 server2 sshd[31204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.92.233  user=root
Sep  5 17:24:38 server2 sshd[32217]: Failed password for root from 82.116.36.6 port 41178 ssh2
Sep  5 17:22:55 server2 sshd[31204]: Failed password for root from 134.175.92.233 port 41202 ssh2
Sep  5 17:23:35 server2 sshd[31591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.20.135  user=root
Sep  5 17:23:37 server2 sshd[31591]: Failed password for root from 62.234.20.135 port 59916 ssh2

IP Addresses Blocked:

118.25.59.139 (CN/China/-)
134.175.92.233 (CN/China/-)
82.116.36.6 (RU/Russia/-)
2020-09-06 07:21:44
92.63.197.71 attackspam
firewall-block, port(s): 3397/tcp
2020-09-06 07:08:30
106.12.84.63 attackspam
2020-09-05T22:55:30.921013shield sshd\[19682\]: Invalid user tom from 106.12.84.63 port 48966
2020-09-05T22:55:30.931370shield sshd\[19682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.84.63
2020-09-05T22:55:33.209048shield sshd\[19682\]: Failed password for invalid user tom from 106.12.84.63 port 48966 ssh2
2020-09-05T22:58:10.777600shield sshd\[19930\]: Invalid user dac from 106.12.84.63 port 32067
2020-09-05T22:58:10.787733shield sshd\[19930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.84.63
2020-09-06 07:01:41
218.92.0.173 attackspam
Sep  6 04:30:10 lunarastro sshd[25186]: Failed password for root from 218.92.0.173 port 39193 ssh2
Sep  6 04:30:14 lunarastro sshd[25186]: Failed password for root from 218.92.0.173 port 39193 ssh2
2020-09-06 07:03:55
125.94.150.141 attack
Icarus honeypot on github
2020-09-06 06:59:56
89.47.62.88 attack
(smtpauth) Failed SMTP AUTH login from 89.47.62.88 (GB/United Kingdom/-): 5 in the last 3600 secs
2020-09-06 07:22:09
221.225.229.60 attack
Aug 31 07:09:03 georgia postfix/smtpd[35470]: connect from unknown[221.225.229.60]
Aug 31 07:09:08 georgia postfix/smtpd[35470]: warning: unknown[221.225.229.60]: SASL LOGIN authentication failed: authentication failure
Aug 31 07:09:09 georgia postfix/smtpd[35470]: lost connection after AUTH from unknown[221.225.229.60]
Aug 31 07:09:09 georgia postfix/smtpd[35470]: disconnect from unknown[221.225.229.60] ehlo=1 auth=0/1 commands=1/2
Aug 31 07:09:10 georgia postfix/smtpd[35470]: connect from unknown[221.225.229.60]
Aug 31 07:09:16 georgia postfix/smtpd[35470]: warning: unknown[221.225.229.60]: SASL LOGIN authentication failed: authentication failure
Aug 31 07:09:17 georgia postfix/smtpd[35470]: lost connection after AUTH from unknown[221.225.229.60]
Aug 31 07:09:17 georgia postfix/smtpd[35470]: disconnect from unknown[221.225.229.60] ehlo=1 auth=0/1 commands=1/2
Aug 31 07:09:17 georgia postfix/smtpd[35470]: connect from unknown[221.225.229.60]
Aug 31 07:09:21 georgia pos........
-------------------------------
2020-09-06 07:08:45
52.125.140.56 attackbots
Unauthorized IMAP connection attempt
2020-09-06 07:29:15
45.95.168.96 attackbotsspam
2020-09-06 01:14:26 dovecot_login authenticator failed for pr.predictams.live \(USER\) \[45.95.168.96\]: 535 Incorrect authentication data \(set_id=account@opso.it\)
2020-09-06 01:14:26 dovecot_login authenticator failed for pr.predictams.live \(USER\) \[45.95.168.96\]: 535 Incorrect authentication data \(set_id=account@nophost.com\)
2020-09-06 01:16:53 dovecot_login authenticator failed for pr.predictams.live \(USER\) \[45.95.168.96\]: 535 Incorrect authentication data \(set_id=account@nopcommerce.it\)
2020-09-06 01:18:00 dovecot_login authenticator failed for pr.predictams.live \(USER\) \[45.95.168.96\]: 535 Incorrect authentication data \(set_id=account@nophost.com\)
2020-09-06 01:18:00 dovecot_login authenticator failed for pr.predictams.live \(USER\) \[45.95.168.96\]: 535 Incorrect authentication data \(set_id=account@opso.it\)
2020-09-06 07:31:25

最近上报的IP列表

119.114.22.220 119.114.22.39 119.114.22.51 119.115.70.52
119.115.70.59 119.115.71.98 119.115.72.197 119.115.72.205
109.5.13.53 119.115.73.215 119.115.73.224 119.115.73.237
119.115.73.42 119.115.73.87 119.115.74.105 119.115.74.224
119.115.75.187 119.115.75.43 119.115.75.52 119.115.75.71