必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.128.242.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35640
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.128.242.13.			IN	A

;; AUTHORITY SECTION:
.			529	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 11:36:33 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 13.242.128.124.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.242.128.124.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
73.189.112.132 attackspambots
Sep 28 09:26:41 srv206 sshd[3752]: Invalid user jhall from 73.189.112.132
Sep 28 09:26:41 srv206 sshd[3752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-189-112-132.hsd1.ca.comcast.net
Sep 28 09:26:41 srv206 sshd[3752]: Invalid user jhall from 73.189.112.132
Sep 28 09:26:43 srv206 sshd[3752]: Failed password for invalid user jhall from 73.189.112.132 port 47394 ssh2
...
2019-09-28 16:43:55
112.85.42.186 attackspam
Sep 28 03:52:54 aat-srv002 sshd[6217]: Failed password for root from 112.85.42.186 port 43886 ssh2
Sep 28 04:08:20 aat-srv002 sshd[6655]: Failed password for root from 112.85.42.186 port 16270 ssh2
Sep 28 04:09:04 aat-srv002 sshd[6661]: Failed password for root from 112.85.42.186 port 57738 ssh2
...
2019-09-28 17:16:19
162.243.158.185 attackbotsspam
Sep 28 09:06:09 markkoudstaal sshd[19028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.158.185
Sep 28 09:06:11 markkoudstaal sshd[19028]: Failed password for invalid user secure from 162.243.158.185 port 50930 ssh2
Sep 28 09:10:16 markkoudstaal sshd[19495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.158.185
2019-09-28 17:10:56
175.211.112.242 attackbotsspam
Sep 28 08:26:46 h2177944 sshd\[16126\]: Invalid user export from 175.211.112.242 port 34662
Sep 28 08:26:46 h2177944 sshd\[16126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.211.112.242
Sep 28 08:26:48 h2177944 sshd\[16126\]: Failed password for invalid user export from 175.211.112.242 port 34662 ssh2
Sep 28 09:27:46 h2177944 sshd\[18819\]: Invalid user studen from 175.211.112.242 port 50894
Sep 28 09:27:46 h2177944 sshd\[18819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.211.112.242
...
2019-09-28 17:09:41
200.54.170.198 attack
2019-09-28T10:39:52.366338centos sshd\[31896\]: Invalid user iec from 200.54.170.198 port 41064
2019-09-28T10:39:52.373138centos sshd\[31896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200-54-170-198.static.tie.cl
2019-09-28T10:39:54.582668centos sshd\[31896\]: Failed password for invalid user iec from 200.54.170.198 port 41064 ssh2
2019-09-28 16:54:34
51.83.46.178 attackspam
Sep 27 22:31:42 wbs sshd\[7366\]: Invalid user teamspeak3 from 51.83.46.178
Sep 27 22:31:42 wbs sshd\[7366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.ip-51-83-46.eu
Sep 27 22:31:44 wbs sshd\[7366\]: Failed password for invalid user teamspeak3 from 51.83.46.178 port 57690 ssh2
Sep 27 22:35:45 wbs sshd\[7724\]: Invalid user grid from 51.83.46.178
Sep 27 22:35:45 wbs sshd\[7724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.ip-51-83-46.eu
2019-09-28 16:41:06
175.124.43.123 attack
Invalid user newuser from 175.124.43.123 port 55698
2019-09-28 17:10:03
139.155.118.190 attackspam
Sep 28 11:04:34 localhost sshd\[17575\]: Invalid user changeme from 139.155.118.190 port 33568
Sep 28 11:04:34 localhost sshd\[17575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.118.190
Sep 28 11:04:36 localhost sshd\[17575\]: Failed password for invalid user changeme from 139.155.118.190 port 33568 ssh2
2019-09-28 17:13:28
92.79.179.89 attackbots
Sep 28 07:08:17 www sshd\[2142\]: Invalid user webserver from 92.79.179.89Sep 28 07:08:19 www sshd\[2142\]: Failed password for invalid user webserver from 92.79.179.89 port 34274 ssh2Sep 28 07:14:22 www sshd\[2284\]: Invalid user uirc from 92.79.179.89
...
2019-09-28 17:00:33
195.229.192.178 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2019-09-28 17:04:12
177.92.14.138 attack
2019-09-28T04:19:10.8987851495-001 sshd\[5127\]: Invalid user test from 177.92.14.138 port 56489
2019-09-28T04:19:10.9068351495-001 sshd\[5127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.92.14.138
2019-09-28T04:19:12.7184521495-001 sshd\[5127\]: Failed password for invalid user test from 177.92.14.138 port 56489 ssh2
2019-09-28T04:24:37.8435111495-001 sshd\[5477\]: Invalid user lynn from 177.92.14.138 port 43793
2019-09-28T04:24:37.8510691495-001 sshd\[5477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.92.14.138
2019-09-28T04:24:39.8884431495-001 sshd\[5477\]: Failed password for invalid user lynn from 177.92.14.138 port 43793 ssh2
...
2019-09-28 16:39:37
167.60.44.223 attackspam
Port scan on 2 port(s): 5984 9200
2019-09-28 16:47:06
159.65.160.105 attack
Sep 27 22:32:18 lcdev sshd\[5383\]: Invalid user password from 159.65.160.105
Sep 27 22:32:18 lcdev sshd\[5383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.160.105
Sep 27 22:32:20 lcdev sshd\[5383\]: Failed password for invalid user password from 159.65.160.105 port 53050 ssh2
Sep 27 22:37:09 lcdev sshd\[5776\]: Invalid user !!ccdos from 159.65.160.105
Sep 27 22:37:09 lcdev sshd\[5776\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.160.105
2019-09-28 17:12:10
157.55.39.92 attack
Automatic report - Banned IP Access
2019-09-28 17:12:56
193.188.22.209 attackspambots
3389BruteforceFW23
2019-09-28 17:04:34

最近上报的IP列表

124.126.141.152 124.128.242.149 124.126.29.77 124.128.140.192
124.129.166.75 124.128.46.69 124.129.191.61 124.13.115.200
124.131.145.11 124.131.217.198 124.131.135.248 124.132.20.243
124.132.136.177 124.131.232.157 124.132.81.38 124.133.220.216
124.13.117.31 124.133.221.147 124.133.221.94 124.133.223.147