必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.107.24.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55563
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.107.24.249.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 00:10:44 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 249.24.107.142.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 249.24.107.142.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
111.67.199.161 attackbots
Jul 29 09:06:34 localhost sshd\[53821\]: Invalid user lemmein1 from 111.67.199.161 port 44404
Jul 29 09:06:34 localhost sshd\[53821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.199.161
...
2019-07-30 00:08:22
149.56.44.47 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-07-30 00:07:53
51.77.221.191 attack
2019-07-29T15:04:52.708753abusebot-5.cloudsearch.cf sshd\[32036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.ip-51-77-221.eu  user=root
2019-07-29 23:23:41
185.22.63.49 attackspam
DATE:2019-07-29 13:27:03, IP:185.22.63.49, PORT:ssh brute force auth on SSH service (patata)
2019-07-30 00:09:36
59.124.175.83 attack
Jul 29 08:42:30 * sshd[19098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.124.175.83
Jul 29 08:42:32 * sshd[19098]: Failed password for invalid user com from 59.124.175.83 port 44729 ssh2
2019-07-29 22:57:40
94.74.177.116 attack
Jul 29 08:26:12 pl3server postfix/smtpd[1264410]: connect from unknown[94.74.177.116]
Jul 29 08:26:15 pl3server postfix/smtpd[1264410]: warning: unknown[94.74.177.116]: SASL CRAM-MD5 authentication failed: authentication failure
Jul 29 08:26:15 pl3server postfix/smtpd[1264410]: warning: unknown[94.74.177.116]: SASL PLAIN authentication failed: authentication failure
Jul 29 08:26:16 pl3server postfix/smtpd[1264410]: warning: unknown[94.74.177.116]: SASL LOGIN authentication failed: authentication failure
Jul 29 08:26:16 pl3server postfix/smtpd[1264410]: disconnect from unknown[94.74.177.116]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=94.74.177.116
2019-07-29 23:24:51
77.247.109.33 attackbots
\[2019-07-29 10:44:40\] SECURITY\[1715\] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2019-07-29T10:44:40.391+0200",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="\",SessionID="236462233-179160195-794217650",LocalAddress="IPV4/UDP/188.40.118.248/5060",RemoteAddress="IPV4/UDP/77.247.109.33/61964",Challenge="1564389880/6975f405170fa91248732d94ac714ae1",Response="34d1a18f0059f1a64d2fc5569c54ab43",ExpectedResponse=""
\[2019-07-29 10:44:40\] SECURITY\[1715\] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2019-07-29T10:44:40.434+0200",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="\",SessionID="236462233-179160195-794217650",LocalAddress="IPV4/UDP/188.40.118.248/5060",RemoteAddress="IPV4/UDP/77.247.109.33/61964",Challenge="1564389880/6975f405170fa91248732d94ac714ae1",Response="7d2831d3f6dd082132078b68383b519d",ExpectedResponse=""
\[2019-07-29 10:44:40\] SECURITY\[1715\] res_security_log.c: SecurityEvent="ChallengeResponse
2019-07-30 00:08:45
117.93.96.62 attackbots
Jul 29 09:47:50 s64-1 sshd[28901]: Failed password for root from 117.93.96.62 port 53208 ssh2
Jul 29 09:52:04 s64-1 sshd[28990]: Failed password for root from 117.93.96.62 port 34492 ssh2
...
2019-07-29 23:13:29
31.172.80.89 attackspambots
Jul 29 06:40:39 thevastnessof sshd[4055]: Failed password for root from 31.172.80.89 port 53729 ssh2
...
2019-07-30 00:07:24
190.226.186.75 attackbotsspam
Jul 29 08:29:31 mxgate1 postfix/postscreen[26314]: CONNECT from [190.226.186.75]:12591 to [176.31.12.44]:25
Jul 29 08:29:31 mxgate1 postfix/dnsblog[26507]: addr 190.226.186.75 listed by domain zen.spamhaus.org as 127.0.0.11
Jul 29 08:29:31 mxgate1 postfix/dnsblog[26507]: addr 190.226.186.75 listed by domain zen.spamhaus.org as 127.0.0.4
Jul 29 08:29:31 mxgate1 postfix/dnsblog[26396]: addr 190.226.186.75 listed by domain cbl.abuseat.org as 127.0.0.2
Jul 29 08:29:31 mxgate1 postfix/dnsblog[26400]: addr 190.226.186.75 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jul 29 08:29:31 mxgate1 postfix/dnsblog[26398]: addr 190.226.186.75 listed by domain b.barracudacentral.org as 127.0.0.2
Jul 29 08:29:37 mxgate1 postfix/postscreen[26314]: DNSBL rank 5 for [190.226.186.75]:12591
Jul x@x
Jul 29 08:29:39 mxgate1 postfix/postscreen[26314]: HANGUP after 1.1 from [190.226.186.75]:12591 in tests after SMTP handshake
Jul 29 08:29:39 mxgate1 postfix/postscreen[26314]: DISCONNECT [190.........
-------------------------------
2019-07-29 23:34:49
2400:6180:0:d1::7e8:b001 attack
Jul 29 04:11:43 wildwolf wplogin[6822]: 2400:6180:0:d1::7e8:b001 prometheus.ngo [2019-07-29 04:11:43+0000] "POST /wp-login.php HTTP/1.1" "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "admin" "admin_2020"
Jul 29 04:11:45 wildwolf wplogin[7318]: 2400:6180:0:d1::7e8:b001 prometheus.ngo [2019-07-29 04:11:45+0000] "POST /wp-login.php HTTP/1.1" "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "alina" "alina_2020"
Jul 29 04:11:48 wildwolf wplogin[9843]: 2400:6180:0:d1::7e8:b001 prometheus.ngo [2019-07-29 04:11:48+0000] "POST /wp-login.php HTTP/1.1" "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "burko" "burko_2020"
Jul 29 04:11:49 wildwolf wplogin[7454]: 2400:6180:0:d1::7e8:b001 prometheus.ngo [2019-07-29 04:11:49+0000] "POST /wp-login.php HTTP/1.1" "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "pavlo" "pavlo_2020"
Jul 29 04:11:50 wildw........
------------------------------
2019-07-29 23:44:39
116.1.3.209 attack
Jul 29 12:38:40 localhost sshd\[24551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.1.3.209  user=root
Jul 29 12:38:42 localhost sshd\[24551\]: Failed password for root from 116.1.3.209 port 6001 ssh2
Jul 29 12:44:13 localhost sshd\[24768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.1.3.209  user=root
Jul 29 12:44:15 localhost sshd\[24768\]: Failed password for root from 116.1.3.209 port 5739 ssh2
Jul 29 12:49:50 localhost sshd\[24962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.1.3.209  user=root
...
2019-07-29 23:38:02
129.211.83.166 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-07-29 23:42:47
13.77.45.86 attackbots
SSH/22 MH Probe, BF, Hack -
2019-07-29 23:07:38
126.117.69.142 attackspam
Jul 29 11:01:28 Ubuntu-1404-trusty-64-minimal sshd\[29043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=126.117.69.142  user=root
Jul 29 11:01:30 Ubuntu-1404-trusty-64-minimal sshd\[29043\]: Failed password for root from 126.117.69.142 port 38388 ssh2
Jul 29 11:13:08 Ubuntu-1404-trusty-64-minimal sshd\[2764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=126.117.69.142  user=root
Jul 29 11:13:11 Ubuntu-1404-trusty-64-minimal sshd\[2764\]: Failed password for root from 126.117.69.142 port 55994 ssh2
Jul 29 11:18:12 Ubuntu-1404-trusty-64-minimal sshd\[4336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=126.117.69.142  user=root
2019-07-30 00:04:03

最近上报的IP列表

157.67.16.131 116.254.73.254 78.193.161.31 12.107.94.241
220.217.76.219 39.35.255.11 216.188.159.183 78.146.208.85
40.82.196.166 12.149.123.94 106.42.5.131 170.132.65.227
216.131.17.111 123.131.252.133 8.79.80.199 92.246.88.207
221.68.253.171 82.149.209.24 170.31.60.180 85.96.0.167