必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Taiwan (Province of China)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.16.219.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22427
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;163.16.219.242.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 00:42:43 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
242.219.16.163.in-addr.arpa domain name pointer pc242.tgn.kh.edu.tw.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.219.16.163.in-addr.arpa	name = pc242.tgn.kh.edu.tw.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
140.130.88.171 attackbotsspam
[portscan] Port scan
2020-07-17 18:23:47
157.230.245.91 attackspam
TCP port : 32657
2020-07-17 18:19:25
132.232.11.218 attack
Invalid user rst from 132.232.11.218 port 42516
2020-07-17 18:28:13
2.228.87.194 attack
Jul 17 11:03:42 web-main sshd[641684]: Invalid user bip from 2.228.87.194 port 36992
Jul 17 11:03:44 web-main sshd[641684]: Failed password for invalid user bip from 2.228.87.194 port 36992 ssh2
Jul 17 11:18:30 web-main sshd[641721]: Invalid user admin from 2.228.87.194 port 45554
2020-07-17 17:54:38
106.12.171.253 attack
Jul 17 07:49:42 piServer sshd[22212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.171.253 
Jul 17 07:49:43 piServer sshd[22212]: Failed password for invalid user userftp from 106.12.171.253 port 58870 ssh2
Jul 17 07:56:19 piServer sshd[22882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.171.253 
...
2020-07-17 18:07:59
120.92.111.13 attackbotsspam
2020-07-17T04:14:51.258593vps2034 sshd[5272]: Invalid user hadoop from 120.92.111.13 port 6774
2020-07-17T04:14:51.263834vps2034 sshd[5272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.111.13
2020-07-17T04:14:51.258593vps2034 sshd[5272]: Invalid user hadoop from 120.92.111.13 port 6774
2020-07-17T04:14:53.575188vps2034 sshd[5272]: Failed password for invalid user hadoop from 120.92.111.13 port 6774 ssh2
2020-07-17T04:19:49.443150vps2034 sshd[17258]: Invalid user yxy from 120.92.111.13 port 59672
...
2020-07-17 18:25:45
178.32.221.225 attackbotsspam
$f2bV_matches
2020-07-17 17:56:37
86.170.109.103 attack
Automatic report - Port Scan Attack
2020-07-17 18:16:18
41.63.1.43 attackbotsspam
Jul 17 05:04:24 django-0 sshd[12568]: Invalid user testuser from 41.63.1.43
...
2020-07-17 18:29:24
65.49.20.114 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-07-17 18:20:42
61.144.96.20 attackspam
Invalid user yt from 61.144.96.20 port 49150
2020-07-17 18:26:36
93.174.93.31 attack
firewall-block, port(s): 18007/tcp, 18061/tcp, 18067/tcp, 18074/tcp, 18077/tcp, 18115/tcp, 18136/tcp, 18178/tcp, 18222/tcp, 18242/tcp, 18243/tcp, 18265/tcp, 18344/tcp, 18354/tcp, 18356/tcp, 18357/tcp, 18376/tcp, 18398/tcp, 18408/tcp, 18478/tcp, 18479/tcp, 18506/tcp, 18544/tcp, 18603/tcp, 18609/tcp, 18618/tcp, 18620/tcp, 18621/tcp, 18624/tcp, 18695/tcp, 18814/tcp, 18861/tcp, 18888/tcp, 18927/tcp, 18960/tcp
2020-07-17 18:01:19
103.142.139.114 attackbotsspam
Jul 17 09:49:28 jane sshd[8069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.142.139.114 
Jul 17 09:49:30 jane sshd[8069]: Failed password for invalid user radio from 103.142.139.114 port 58218 ssh2
...
2020-07-17 17:58:29
122.51.57.78 attack
Jul 17 06:05:07 server sshd[28444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.57.78
Jul 17 06:05:09 server sshd[28444]: Failed password for invalid user idp from 122.51.57.78 port 42504 ssh2
Jul 17 06:07:57 server sshd[28512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.57.78
...
2020-07-17 17:57:14
37.238.220.14 attackbotsspam
(smtpauth) Failed SMTP AUTH login from 37.238.220.14 (IQ/Iraq/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-17 08:21:34 plain authenticator failed for ([37.238.220.14]) [37.238.220.14]: 535 Incorrect authentication data (set_id=asrollahi)
2020-07-17 18:05:17

最近上报的IP列表

221.104.19.130 188.177.133.152 104.130.245.222 159.90.44.166
156.235.205.135 139.98.113.236 4.5.1.87 51.46.53.87
62.163.132.213 178.143.73.36 98.200.176.232 40.33.68.125
85.68.161.120 189.204.84.142 176.8.69.137 146.35.127.35
7.233.15.125 193.4.99.103 71.169.181.86 231.182.157.249