必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 16.41.242.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35531
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;16.41.242.196.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 15:31:36 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 196.242.41.16.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 196.242.41.16.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.31.144 attackspambots
Jan 12 14:11:40 root sshd[18199]: Failed password for root from 222.186.31.144 port 38192 ssh2
Jan 12 14:11:43 root sshd[18199]: Failed password for root from 222.186.31.144 port 38192 ssh2
Jan 12 14:11:45 root sshd[18199]: Failed password for root from 222.186.31.144 port 38192 ssh2
...
2020-01-12 21:15:41
176.109.244.6 attack
" "
2020-01-12 21:19:38
46.209.106.18 attackspam
Scanning random ports - tries to find possible vulnerable services
2020-01-12 20:57:40
187.35.12.70 attackspambots
unauthorized connection attempt
2020-01-12 20:55:59
181.1.114.145 attackspam
unauthorized connection attempt
2020-01-12 21:10:58
61.92.83.135 attack
unauthorized connection attempt
2020-01-12 21:09:25
123.206.87.154 attackbots
Jan 12 14:04:22 vps691689 sshd[20146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.87.154
Jan 12 14:04:24 vps691689 sshd[20146]: Failed password for invalid user saima from 123.206.87.154 port 51094 ssh2
...
2020-01-12 21:21:05
79.31.209.216 attackbots
Telnet Server BruteForce Attack
2020-01-12 21:22:55
118.89.221.36 attackbots
SSH Brute Force
2020-01-12 21:33:23
72.195.130.225 attack
Unauthorized connection attempt detected from IP address 72.195.130.225 to port 5555 [J]
2020-01-12 20:52:27
81.215.3.193 attack
unauthorized connection attempt
2020-01-12 21:04:51
88.248.135.166 attack
Automatic report - Banned IP Access
2020-01-12 21:15:11
213.176.60.227 attackspam
Jan 12 10:24:31 vps46666688 sshd[22349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.176.60.227
Jan 12 10:24:33 vps46666688 sshd[22349]: Failed password for invalid user cs from 213.176.60.227 port 35085 ssh2
...
2020-01-12 21:34:32
83.21.124.86 attack
Unauthorized connection attempt detected from IP address 83.21.124.86 to port 81 [J]
2020-01-12 21:09:06
185.95.239.33 attackspam
Unauthorized connection attempt detected from IP address 185.95.239.33 to port 8080 [J]
2020-01-12 21:03:06

最近上报的IP列表

203.8.125.92 220.20.6.152 154.121.245.21 120.168.113.77
70.166.173.118 60.195.142.211 101.128.227.127 138.6.198.150
223.219.24.111 245.138.245.156 185.120.15.87 192.57.210.112
7.37.183.196 31.67.245.240 227.45.217.171 155.30.176.188
144.67.32.112 121.43.110.117 206.238.234.148 157.196.47.120