必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.242.73.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39051
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.242.73.48.			IN	A

;; AUTHORITY SECTION:
.			304	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 23:17:54 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 48.73.242.122.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.73.242.122.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.230.161.168 attack
Dec 15 11:21:50 nextcloud sshd\[25336\]: Invalid user ubuntu from 185.230.161.168
Dec 15 11:21:50 nextcloud sshd\[25336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.230.161.168
Dec 15 11:21:53 nextcloud sshd\[25336\]: Failed password for invalid user ubuntu from 185.230.161.168 port 37010 ssh2
...
2019-12-15 18:35:09
14.186.194.19 attackspam
Brute force attempt
2019-12-15 18:39:49
210.86.228.18 attack
Unauthorized connection attempt detected from IP address 210.86.228.18 to port 445
2019-12-15 18:11:40
220.174.33.222 attack
Scanning
2019-12-15 18:36:48
45.113.77.26 attackbots
Dec 15 10:23:04 OPSO sshd\[21615\]: Invalid user benzick from 45.113.77.26 port 39370
Dec 15 10:23:04 OPSO sshd\[21615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.113.77.26
Dec 15 10:23:06 OPSO sshd\[21615\]: Failed password for invalid user benzick from 45.113.77.26 port 39370 ssh2
Dec 15 10:30:11 OPSO sshd\[23163\]: Invalid user kamstra from 45.113.77.26 port 47498
Dec 15 10:30:11 OPSO sshd\[23163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.113.77.26
2019-12-15 18:46:08
96.64.7.59 attack
Dec 15 07:37:55 eventyay sshd[6680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.64.7.59
Dec 15 07:37:57 eventyay sshd[6680]: Failed password for invalid user gudmundur from 96.64.7.59 port 60968 ssh2
Dec 15 07:43:35 eventyay sshd[6858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.64.7.59
...
2019-12-15 18:47:46
118.32.223.32 attack
Dec 15 13:34:40 server sshd\[10004\]: Invalid user webinterface from 118.32.223.32
Dec 15 13:34:40 server sshd\[10004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.32.223.32 
Dec 15 13:34:41 server sshd\[10004\]: Failed password for invalid user webinterface from 118.32.223.32 port 34484 ssh2
Dec 15 13:43:28 server sshd\[12793\]: Invalid user huelvasport from 118.32.223.32
Dec 15 13:43:28 server sshd\[12793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.32.223.32 
...
2019-12-15 18:45:15
193.32.161.71 attackbotsspam
Fail2Ban Ban Triggered
2019-12-15 18:13:34
109.239.12.152 attack
Unauthorized connection attempt from IP address 109.239.12.152 on Port 445(SMB)
2019-12-15 18:32:14
92.1.97.59 attack
Dec 15 12:43:56 debian-2gb-vpn-nbg1-1 kernel: [781409.260891] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=92.1.97.59 DST=78.46.192.101 LEN=44 TOS=0x00 PREC=0x00 TTL=52 ID=45946 PROTO=TCP SPT=17277 DPT=60001 WINDOW=28457 RES=0x00 SYN URGP=0
2019-12-15 18:49:24
77.247.181.165 attack
Automatic report - XMLRPC Attack
2019-12-15 18:12:31
51.158.124.59 attackspam
Dec 13 08:21:22 penfold sshd[3395]: Did not receive identification string from 51.158.124.59 port 33766
Dec 13 08:21:22 penfold sshd[3396]: Did not receive identification string from 51.158.124.59 port 60326
Dec 13 08:23:22 penfold sshd[3493]: Did not receive identification string from 51.158.124.59 port 36922
Dec 13 08:23:22 penfold sshd[3494]: Did not receive identification string from 51.158.124.59 port 38602
Dec 13 08:23:34 penfold sshd[3511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.124.59  user=r.r
Dec 13 08:23:34 penfold sshd[3538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.124.59  user=r.r
Dec 13 08:23:34 penfold sshd[3532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.124.
.... truncated .... 

Dec 13 08:21:22 penfold sshd[3395]: Did not receive identification string from 51.158.124.59 port 33766
Dec 13 08:........
-------------------------------
2019-12-15 18:40:20
58.56.140.62 attack
Dec 15 07:26:44 herz-der-gamer sshd[1871]: Invalid user rpm from 58.56.140.62 port 41057
Dec 15 07:26:44 herz-der-gamer sshd[1871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.140.62
Dec 15 07:26:44 herz-der-gamer sshd[1871]: Invalid user rpm from 58.56.140.62 port 41057
Dec 15 07:26:46 herz-der-gamer sshd[1871]: Failed password for invalid user rpm from 58.56.140.62 port 41057 ssh2
...
2019-12-15 18:31:20
51.68.70.175 attack
Dec 15 00:37:59 web1 sshd\[10850\]: Invalid user student10 from 51.68.70.175
Dec 15 00:37:59 web1 sshd\[10850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.70.175
Dec 15 00:38:01 web1 sshd\[10850\]: Failed password for invalid user student10 from 51.68.70.175 port 52750 ssh2
Dec 15 00:43:11 web1 sshd\[11691\]: Invalid user ferencik from 51.68.70.175
Dec 15 00:43:11 web1 sshd\[11691\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.70.175
2019-12-15 18:47:59
103.48.141.126 attack
Unauthorized connection attempt detected from IP address 103.48.141.126 to port 445
2019-12-15 18:25:14

最近上报的IP列表

131.122.180.43 124.67.223.233 217.213.181.6 103.226.58.25
174.178.27.135 176.82.125.123 159.173.3.67 14.164.109.55
167.133.26.32 12.164.179.148 18.56.30.106 153.45.225.28
165.123.165.102 144.120.112.9 159.229.61.141 161.185.123.129
161.91.148.15 214.173.210.196 200.253.50.78 127.28.73.169