必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.242.103.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43399
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.242.103.244.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013101 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 02:23:02 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 244.103.242.142.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 244.103.242.142.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
120.70.100.54 attackbotsspam
Jul 29 12:24:43 inter-technics sshd[20770]: Invalid user zookeeper from 120.70.100.54 port 58514
Jul 29 12:24:43 inter-technics sshd[20770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.100.54
Jul 29 12:24:43 inter-technics sshd[20770]: Invalid user zookeeper from 120.70.100.54 port 58514
Jul 29 12:24:45 inter-technics sshd[20770]: Failed password for invalid user zookeeper from 120.70.100.54 port 58514 ssh2
Jul 29 12:30:01 inter-technics sshd[21099]: Invalid user word from 120.70.100.54 port 58163
...
2020-07-29 19:44:12
80.82.70.225 attackspambots
Jul 29 05:49:28 debian-2gb-nbg1-2 kernel: \[18253066.145635\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.70.225 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=40919 PROTO=TCP SPT=54516 DPT=27017 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-29 19:08:42
222.186.190.2 attack
Jul 29 13:32:35 sso sshd[7751]: Failed password for root from 222.186.190.2 port 63806 ssh2
Jul 29 13:32:38 sso sshd[7751]: Failed password for root from 222.186.190.2 port 63806 ssh2
...
2020-07-29 19:39:30
49.235.222.191 attackbots
Jul 29 13:58:15 lunarastro sshd[1469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.222.191 
Jul 29 13:58:16 lunarastro sshd[1469]: Failed password for invalid user jieba-php from 49.235.222.191 port 50526 ssh2
2020-07-29 19:18:03
175.123.253.220 attack
Jul 29 12:14:49 santamaria sshd\[1440\]: Invalid user amrita from 175.123.253.220
Jul 29 12:14:49 santamaria sshd\[1440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.123.253.220
Jul 29 12:14:51 santamaria sshd\[1440\]: Failed password for invalid user amrita from 175.123.253.220 port 50090 ssh2
...
2020-07-29 19:23:47
23.101.173.33 attackspam
 TCP (SYN) 23.101.173.33:53151 -> port 23, len 44
2020-07-29 19:35:39
172.93.188.229 attackbots
E-Mail Spam (RBL) [REJECTED]
2020-07-29 19:42:23
181.57.168.174 attackspambots
Automatic Fail2ban report - Trying login SSH
2020-07-29 19:26:40
37.187.181.155 attackbots
2020-07-29T07:50:54.057737ks3355764 sshd[11849]: Invalid user andy from 37.187.181.155 port 57786
2020-07-29T07:50:56.252100ks3355764 sshd[11849]: Failed password for invalid user andy from 37.187.181.155 port 57786 ssh2
...
2020-07-29 19:05:15
196.20.110.189 attackspambots
Port Scan
2020-07-29 19:13:47
106.52.135.239 attackbots
fail2ban detected bruce force on ssh iptables
2020-07-29 19:16:10
165.227.66.224 attack
Jul 29 08:20:01 marvibiene sshd[12899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.66.224 
Jul 29 08:20:02 marvibiene sshd[12899]: Failed password for invalid user wendy from 165.227.66.224 port 51354 ssh2
2020-07-29 19:27:02
202.129.41.94 attack
Jul 29 05:46:27 icinga sshd[56167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.129.41.94 
Jul 29 05:46:29 icinga sshd[56167]: Failed password for invalid user jxw from 202.129.41.94 port 37508 ssh2
Jul 29 05:49:16 icinga sshd[60734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.129.41.94 
...
2020-07-29 19:20:48
190.223.26.38 attackbots
2020-07-29T13:33:17+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-07-29 19:36:27
138.99.216.171 attack
Multihost portscan.
2020-07-29 19:35:15

最近上报的IP列表

95.122.9.11 188.194.8.45 172.186.215.227 54.242.172.10
174.200.186.49 191.221.221.195 95.145.230.213 76.222.84.186
117.197.103.28 107.78.55.184 144.181.70.129 234.9.38.134
121.220.191.75 16.61.143.3 227.202.248.226 39.225.234.232
157.243.33.125 53.209.253.90 193.14.41.33 5.125.246.14