必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Buenos Aires

省份(region): Ciudad Autónoma de Buenos Aires

国家(country): Argentina

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.243.219.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33002
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.243.219.242.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 01:56:22 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 242.219.243.147.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.219.243.147.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
163.172.157.162 attackbots
SSH Brute-Force reported by Fail2Ban
2019-09-15 13:03:09
106.52.230.77 attackbots
Sep 15 01:19:58 ny01 sshd[18090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.230.77
Sep 15 01:20:00 ny01 sshd[18090]: Failed password for invalid user testdev from 106.52.230.77 port 58780 ssh2
Sep 15 01:25:20 ny01 sshd[19630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.230.77
2019-09-15 13:47:18
40.118.46.159 attackbotsspam
Unauthorized SSH login attempts
2019-09-15 13:16:22
147.139.135.52 attackspambots
Invalid user developer from 147.139.135.52 port 45376
2019-09-15 13:00:25
213.58.195.185 attackbotsspam
2019-09-15T05:14:02.127120abusebot.cloudsearch.cf sshd\[20733\]: Invalid user lll from 213.58.195.185 port 32953
2019-09-15 13:44:33
139.99.62.10 attack
Sep 15 07:37:17 vps647732 sshd[14868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.62.10
Sep 15 07:37:19 vps647732 sshd[14868]: Failed password for invalid user q2w3e4R from 139.99.62.10 port 51936 ssh2
...
2019-09-15 13:50:48
178.62.54.79 attackbotsspam
Sep 14 19:26:36 php1 sshd\[18878\]: Invalid user 123456 from 178.62.54.79
Sep 14 19:26:36 php1 sshd\[18878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=vpn.philatov.com
Sep 14 19:26:37 php1 sshd\[18878\]: Failed password for invalid user 123456 from 178.62.54.79 port 34564 ssh2
Sep 14 19:30:14 php1 sshd\[19489\]: Invalid user mya from 178.62.54.79
Sep 14 19:30:14 php1 sshd\[19489\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=vpn.philatov.com
2019-09-15 13:40:07
49.83.1.96 attackspambots
Sep 15 06:01:45 extapp sshd[27788]: Invalid user admin from 49.83.1.96
Sep 15 06:01:46 extapp sshd[27788]: Failed password for invalid user admin from 49.83.1.96 port 43972 ssh2
Sep 15 06:01:51 extapp sshd[27788]: Failed password for invalid user admin from 49.83.1.96 port 43972 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.83.1.96
2019-09-15 12:49:52
91.189.239.144 attackbotsspam
[portscan] Port scan
2019-09-15 12:55:59
223.16.216.92 attackbotsspam
Sep 15 06:55:21 www sshd\[49051\]: Invalid user developer from 223.16.216.92Sep 15 06:55:23 www sshd\[49051\]: Failed password for invalid user developer from 223.16.216.92 port 50116 ssh2Sep 15 06:59:30 www sshd\[49119\]: Invalid user itump from 223.16.216.92Sep 15 06:59:32 www sshd\[49119\]: Failed password for invalid user itump from 223.16.216.92 port 34448 ssh2
...
2019-09-15 13:49:04
49.234.107.238 attack
Sep 14 18:53:57 php1 sshd\[13967\]: Invalid user laura from 49.234.107.238
Sep 14 18:53:57 php1 sshd\[13967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.107.238
Sep 14 18:53:59 php1 sshd\[13967\]: Failed password for invalid user laura from 49.234.107.238 port 32828 ssh2
Sep 14 18:58:22 php1 sshd\[14863\]: Invalid user nathaniel from 49.234.107.238
Sep 14 18:58:22 php1 sshd\[14863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.107.238
2019-09-15 13:08:06
185.46.15.254 attackbots
$f2bV_matches
2019-09-15 13:14:54
156.233.5.2 attack
Sep 15 04:04:56 MK-Soft-VM5 sshd\[2613\]: Invalid user accounts from 156.233.5.2 port 54018
Sep 15 04:04:56 MK-Soft-VM5 sshd\[2613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.233.5.2
Sep 15 04:04:58 MK-Soft-VM5 sshd\[2613\]: Failed password for invalid user accounts from 156.233.5.2 port 54018 ssh2
...
2019-09-15 13:05:44
195.154.27.239 attackbots
Fail2Ban - SSH Bruteforce Attempt
2019-09-15 12:58:29
51.68.136.36 attack
Sep 15 07:16:17 SilenceServices sshd[23801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.136.36
Sep 15 07:16:19 SilenceServices sshd[23801]: Failed password for invalid user victor from 51.68.136.36 port 53014 ssh2
Sep 15 07:21:10 SilenceServices sshd[25599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.136.36
2019-09-15 13:28:41

最近上报的IP列表

7.48.56.55 173.30.16.116 221.19.158.14 25.202.123.218
239.90.111.214 214.216.33.72 40.208.237.73 68.33.61.137
52.245.234.214 131.231.154.88 165.120.172.194 129.192.74.23
69.29.254.82 35.72.193.222 36.95.161.253 13.33.221.165
85.223.71.0 245.132.162.170 145.104.182.160 244.7.177.51