必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 188.99.42.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47039
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;188.99.42.221.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030101 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 02 04:54:44 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
221.42.99.188.in-addr.arpa domain name pointer dslb-188-099-042-221.188.099.pools.vodafone-ip.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
221.42.99.188.in-addr.arpa	name = dslb-188-099-042-221.188.099.pools.vodafone-ip.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.114.106.181 attack
Aug  7 17:37:44 lcl-usvr-02 sshd[26601]: Invalid user admin from 103.114.106.181 port 57877
...
2019-08-07 21:03:20
106.13.144.8 attack
Aug  7 13:06:42 h2177944 sshd\[18678\]: Invalid user phuket from 106.13.144.8 port 43640
Aug  7 13:06:42 h2177944 sshd\[18678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.144.8
Aug  7 13:06:44 h2177944 sshd\[18678\]: Failed password for invalid user phuket from 106.13.144.8 port 43640 ssh2
Aug  7 13:09:10 h2177944 sshd\[18719\]: Invalid user vs from 106.13.144.8 port 38088
Aug  7 13:09:10 h2177944 sshd\[18719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.144.8
...
2019-08-07 21:24:54
81.23.3.232 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-07 06:35:10,334 INFO [amun_request_handler] PortScan Detected on Port: 445 (81.23.3.232)
2019-08-07 20:58:06
167.114.153.77 attack
Automatic report
2019-08-07 21:54:58
49.69.212.179 attackspambots
Aug  6 07:50:25 pl3server sshd[3371972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.69.212.179  user=r.r
Aug  6 07:50:27 pl3server sshd[3371972]: Failed password for r.r from 49.69.212.179 port 56654 ssh2
Aug  6 07:50:30 pl3server sshd[3371972]: Failed password for r.r from 49.69.212.179 port 56654 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.69.212.179
2019-08-07 21:10:00
46.119.118.213 attackspambots
This client attempted to login to an administrator account on a Website, or abused from another resource.
2019-08-07 21:22:38
49.249.232.190 attackbotsspam
19/8/7@08:44:36: FAIL: Alarm-Intrusion address from=49.249.232.190
...
2019-08-07 20:55:57
185.100.87.207 attackspam
Aug  7 14:21:00 ns37 sshd[25786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.100.87.207
Aug  7 14:21:02 ns37 sshd[25786]: Failed password for invalid user cisco from 185.100.87.207 port 25718 ssh2
Aug  7 14:21:05 ns37 sshd[25807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.100.87.207
2019-08-07 21:43:29
125.234.109.236 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-07 06:32:42,159 INFO [amun_request_handler] PortScan Detected on Port: 445 (125.234.109.236)
2019-08-07 21:20:49
111.77.112.84 attack
Lines containing failures of 111.77.112.84


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=111.77.112.84
2019-08-07 20:57:03
180.126.220.247 attackbotsspam
Aug 07 07:05:26 askasleikir sshd[9243]: Failed password for invalid user admin from 180.126.220.247 port 33706 ssh2
Aug 07 07:13:08 askasleikir sshd[9518]: Failed password for root from 180.126.220.247 port 33327 ssh2
Aug 07 07:14:43 askasleikir sshd[9566]: Failed password for invalid user nexthink from 180.126.220.247 port 40360 ssh2
2019-08-07 21:22:13
118.174.199.142 attack
Honeypot attack, port: 445, PTR: node-1hq.pool-118-174.dynamic.totinternet.net.
2019-08-07 21:56:04
27.192.100.209 attackbots
Aug  7 06:54:28   DDOS Attack: SRC=27.192.100.209 DST=[Masked] LEN=40 TOS=0x00 PREC=0x00 TTL=48  DF PROTO=TCP SPT=42136 DPT=80 WINDOW=0 RES=0x00 RST URGP=0
2019-08-07 20:51:44
138.197.142.181 attack
Automatic report - Banned IP Access
2019-08-07 21:49:38
159.65.185.225 attackbotsspam
Aug  7 09:21:23 debian sshd\[2421\]: Invalid user user from 159.65.185.225 port 48768
Aug  7 09:21:23 debian sshd\[2421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.185.225
...
2019-08-07 21:47:43

最近上报的IP列表

19.149.73.147 109.187.96.41 207.68.167.85 66.71.164.83
91.39.114.106 248.145.1.22 187.103.134.78 230.170.18.146
104.212.143.215 146.123.34.118 223.113.58.118 206.14.22.251
58.13.174.104 43.176.63.231 72.22.141.186 193.110.207.144
107.117.242.37 170.108.228.29 187.23.60.121 59.39.119.212