必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.18.59.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35033
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.18.59.242.			IN	A

;; AUTHORITY SECTION:
.			238	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091401 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 15 03:12:23 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 242.59.18.149.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.59.18.149.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.99.180.47 attackbotsspam
Many RDP login attempts detected by IDS script
2019-07-11 14:08:37
177.54.121.167 attackbots
Brute force attempt
2019-07-11 14:37:12
210.100.216.98 attack
RDP Bruteforce
2019-07-11 14:01:30
124.119.173.39 attack
port scan and connect, tcp 23 (telnet)
2019-07-11 13:53:54
106.12.19.196 attackbotsspam
Jul 10 22:55:01 gcems sshd\[20331\]: Invalid user gok from 106.12.19.196 port 51484
Jul 10 22:55:01 gcems sshd\[20331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.19.196
Jul 10 22:55:03 gcems sshd\[20331\]: Failed password for invalid user gok from 106.12.19.196 port 51484 ssh2
Jul 10 22:56:04 gcems sshd\[20382\]: Invalid user sftp from 106.12.19.196 port 60108
Jul 10 22:56:04 gcems sshd\[20382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.19.196
...
2019-07-11 14:35:10
213.172.158.83 attack
2019-07-11T05:59:20.094026 X postfix/smtpd[62067]: NOQUEUE: reject: RCPT from unknown[213.172.158.83]: 554 5.7.1 Service unavailable; Client host [213.172.158.83] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/213.172.158.83; from= to= proto=ESMTP helo=
2019-07-11 13:56:13
218.92.0.131 attackspam
tried it too often
2019-07-11 13:51:29
52.160.126.123 attack
2019-07-11T05:57:24.162019stark.klein-stark.info sshd\[3732\]: Invalid user support from 52.160.126.123 port 51330
2019-07-11T05:57:24.331710stark.klein-stark.info sshd\[3732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.160.126.123
2019-07-11T05:57:26.314313stark.klein-stark.info sshd\[3732\]: Failed password for invalid user support from 52.160.126.123 port 51330 ssh2
...
2019-07-11 14:02:27
185.176.26.103 attackbots
firewall-block, port(s): 4500/tcp
2019-07-11 14:32:49
46.4.84.115 attackbots
2019-07-11T07:41:47.0524871240 sshd\[8856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.4.84.115  user=irc
2019-07-11T07:41:48.8385761240 sshd\[8856\]: Failed password for irc from 46.4.84.115 port 43149 ssh2
2019-07-11T07:43:45.6763791240 sshd\[8948\]: Invalid user webmaster from 46.4.84.115 port 53685
2019-07-11T07:43:45.6817171240 sshd\[8948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.4.84.115
...
2019-07-11 14:25:28
198.108.66.224 attack
3389BruteforceFW21
2019-07-11 14:24:44
27.50.24.83 attackspam
Jul 11 08:02:42 srv-4 sshd\[29224\]: Invalid user toni from 27.50.24.83
Jul 11 08:02:42 srv-4 sshd\[29224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.50.24.83
Jul 11 08:02:44 srv-4 sshd\[29224\]: Failed password for invalid user toni from 27.50.24.83 port 59329 ssh2
...
2019-07-11 14:19:52
188.131.146.22 attackbotsspam
Jul 11 07:19:46 lnxded64 sshd[13215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.146.22
Jul 11 07:19:49 lnxded64 sshd[13215]: Failed password for invalid user tom from 188.131.146.22 port 41810 ssh2
Jul 11 07:28:43 lnxded64 sshd[15304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.146.22
2019-07-11 14:29:06
51.68.152.26 attackspambots
Automatic report - Web App Attack
2019-07-11 14:06:44
218.92.0.194 attackspambots
2019-07-11T05:03:32.770423abusebot-3.cloudsearch.cf sshd\[18496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.194  user=root
2019-07-11 14:11:44

最近上报的IP列表

221.230.238.68 120.237.244.86 222.218.77.45 91.188.247.185
126.219.67.228 125.164.21.247 172.250.115.169 191.251.39.129
23.108.15.181 76.237.101.224 58.255.136.168 77.108.55.139
185.202.223.190 43.134.202.178 159.223.60.4 86.106.186.234
178.197.220.107 193.56.67.76 101.109.39.229 101.51.47.4