必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Reserved

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.249.54.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57578
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.249.54.22.			IN	A

;; AUTHORITY SECTION:
.			145	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 23:25:42 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 22.54.249.142.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 22.54.249.142.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.199.168.184 attackspam
Automatic report - Banned IP Access
2019-09-28 18:32:27
81.248.70.60 attack
Sep 28 06:48:24 www5 sshd\[59672\]: Invalid user acct from 81.248.70.60
Sep 28 06:48:24 www5 sshd\[59672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.248.70.60
Sep 28 06:48:26 www5 sshd\[59672\]: Failed password for invalid user acct from 81.248.70.60 port 57185 ssh2
...
2019-09-28 18:40:52
223.245.213.189 attackspambots
Email spam message
2019-09-28 18:08:36
129.226.156.168 attackbots
1040/tcp 731/tcp
[2019-09-23/28]2pkt
2019-09-28 18:13:04
54.37.88.73 attackbots
Sep 28 07:13:59 web8 sshd\[28880\]: Invalid user luma from 54.37.88.73
Sep 28 07:13:59 web8 sshd\[28880\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.88.73
Sep 28 07:14:01 web8 sshd\[28880\]: Failed password for invalid user luma from 54.37.88.73 port 42116 ssh2
Sep 28 07:17:16 web8 sshd\[30525\]: Invalid user dw from 54.37.88.73
Sep 28 07:17:16 web8 sshd\[30525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.88.73
2019-09-28 18:28:43
218.92.0.182 attack
Sep 28 11:03:33 dedicated sshd[7309]: Failed password for root from 218.92.0.182 port 8934 ssh2
Sep 28 11:03:36 dedicated sshd[7309]: Failed password for root from 218.92.0.182 port 8934 ssh2
Sep 28 11:03:39 dedicated sshd[7309]: Failed password for root from 218.92.0.182 port 8934 ssh2
Sep 28 11:03:41 dedicated sshd[7309]: Failed password for root from 218.92.0.182 port 8934 ssh2
Sep 28 11:03:44 dedicated sshd[7309]: Failed password for root from 218.92.0.182 port 8934 ssh2
2019-09-28 18:07:38
129.28.123.37 attackspam
Sep 28 09:01:25 minden010 sshd[9683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.123.37
Sep 28 09:01:27 minden010 sshd[9683]: Failed password for invalid user jesebel from 129.28.123.37 port 34744 ssh2
Sep 28 09:05:34 minden010 sshd[14401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.123.37
...
2019-09-28 18:06:45
150.107.213.168 attackspambots
Sep 28 10:03:27 work-partkepr sshd\[30601\]: Invalid user disney from 150.107.213.168 port 54026
Sep 28 10:03:27 work-partkepr sshd\[30601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.107.213.168
...
2019-09-28 18:47:57
45.129.2.222 attackbotsspam
22/tcp
[2019-09-28]1pkt
2019-09-28 18:37:11
167.99.168.27 attack
fail2ban honeypot
2019-09-28 18:21:43
121.32.151.202 attackbotsspam
Sep 28 08:00:03 meumeu sshd[32244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.32.151.202 
Sep 28 08:00:05 meumeu sshd[32244]: Failed password for invalid user terminfo from 121.32.151.202 port 42530 ssh2
Sep 28 08:03:09 meumeu sshd[32650]: Failed password for root from 121.32.151.202 port 36768 ssh2
...
2019-09-28 18:40:11
36.90.114.60 attack
445/tcp 445/tcp 445/tcp
[2019-09-28]3pkt
2019-09-28 18:42:59
167.71.244.67 attackbots
2019-09-27T05:27:23.457431 server010.mediaedv.de sshd[10485]: Invalid user sur from 167.71.244.67
2019-09-27T05:27:23.461388 server010.mediaedv.de sshd[10485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.244.67
2019-09-27T05:27:25.320323 server010.mediaedv.de sshd[10485]: Failed password for invalid user sur from 167.71.244.67 port 45738 ssh2
2019-09-27T05:31:01.945364 server010.mediaedv.de sshd[10589]: Invalid user silverline from 167.71.244.67
2019-09-27T05:31:01.948733 server010.mediaedv.de sshd[10589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.244.67

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=167.71.244.67
2019-09-28 18:16:50
129.150.70.20 attackbots
Sep 28 00:08:57 hanapaa sshd\[1053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-129-150-70-20.compute.oraclecloud.com  user=mysql
Sep 28 00:08:59 hanapaa sshd\[1053\]: Failed password for mysql from 129.150.70.20 port 38042 ssh2
Sep 28 00:12:13 hanapaa sshd\[1409\]: Invalid user pos from 129.150.70.20
Sep 28 00:12:13 hanapaa sshd\[1409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-129-150-70-20.compute.oraclecloud.com
Sep 28 00:12:15 hanapaa sshd\[1409\]: Failed password for invalid user pos from 129.150.70.20 port 57638 ssh2
2019-09-28 18:14:36
103.210.238.81 attackspam
Sep 27 05:01:32 fv15 sshd[27475]: Failed password for invalid user ghostname from 103.210.238.81 port 42870 ssh2
Sep 27 05:01:32 fv15 sshd[27475]: Received disconnect from 103.210.238.81: 11: Bye Bye [preauth]
Sep 27 05:08:51 fv15 sshd[12260]: Failed password for invalid user sinus from 103.210.238.81 port 39646 ssh2
Sep 27 05:08:51 fv15 sshd[12260]: Received disconnect from 103.210.238.81: 11: Bye Bye [preauth]
Sep 27 05:13:56 fv15 sshd[18763]: Failed password for invalid user s-cbockk from 103.210.238.81 port 52744 ssh2
Sep 27 05:13:56 fv15 sshd[18763]: Received disconnect from 103.210.238.81: 11: Bye Bye [preauth]
Sep 27 05:18:41 fv15 sshd[26572]: Failed password for invalid user yk from 103.210.238.81 port 37606 ssh2
Sep 27 05:18:41 fv15 sshd[26572]: Received disconnect from 103.210.238.81: 11: Bye Bye [preauth]
Sep 27 05:23:40 fv15 sshd[32488]: Failed password for invalid user router from 103.210.238.81 port 50722 ssh2
Sep 27 05:23:40 fv15 sshd[32488]: Received dis........
-------------------------------
2019-09-28 18:11:14

最近上报的IP列表

227.44.19.151 40.140.41.252 122.119.116.209 152.189.217.84
131.34.87.72 80.239.38.135 174.90.171.130 241.17.31.100
56.165.80.164 23.102.233.70 140.5.200.180 107.39.233.170
128.59.214.85 252.195.208.247 0.252.104.35 123.64.112.78
184.165.36.214 193.237.245.44 136.67.232.253 207.232.252.220