必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Poland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.242.138.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43617
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;193.242.138.241.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 11:18:56 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 241.138.242.193.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 241.138.242.193.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.59.161.78 attackspam
(sshd) Failed SSH login from 139.59.161.78 (GB/United Kingdom/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Dec 30 02:39:05 host sshd[85063]: Invalid user sulit from 139.59.161.78 port 52852
2019-12-30 18:28:05
148.70.223.53 attackspam
Dec 30 10:21:58 lnxweb61 sshd[27130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.223.53
2019-12-30 18:31:17
123.190.150.60 attackspambots
Telnet Server BruteForce Attack
2019-12-30 18:56:21
222.254.24.227 attackspam
Dec 30 11:03:50 intra sshd\[45382\]: Invalid user woshixiaowenqi from 222.254.24.227Dec 30 11:03:52 intra sshd\[45382\]: Failed password for invalid user woshixiaowenqi from 222.254.24.227 port 55246 ssh2Dec 30 11:08:41 intra sshd\[45441\]: Invalid user 1qaz2wsx from 222.254.24.227Dec 30 11:08:43 intra sshd\[45441\]: Failed password for invalid user 1qaz2wsx from 222.254.24.227 port 38790 ssh2Dec 30 11:13:43 intra sshd\[45498\]: Invalid user Nature@123 from 222.254.24.227Dec 30 11:13:44 intra sshd\[45498\]: Failed password for invalid user Nature@123 from 222.254.24.227 port 50438 ssh2
...
2019-12-30 18:49:34
104.244.79.181 attack
Unauthorized connection attempt detected from IP address 104.244.79.181 to port 22
2019-12-30 18:35:31
89.216.124.253 attackbotsspam
Automatic report - Banned IP Access
2019-12-30 19:01:53
181.211.112.2 attackbotsspam
Dec 30 06:25:30 *** sshd[8240]: Invalid user supervisor from 181.211.112.2
2019-12-30 18:27:30
123.206.216.65 attack
Dec 30 11:34:30 mout sshd[22204]: Invalid user apache from 123.206.216.65 port 48246
2019-12-30 19:05:03
171.241.73.83 attack
1577687099 - 12/30/2019 07:24:59 Host: 171.241.73.83/171.241.73.83 Port: 445 TCP Blocked
2019-12-30 18:55:36
124.105.200.26 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 30-12-2019 06:25:10.
2019-12-30 18:47:46
218.92.0.184 attackbots
Dec 30 10:46:06 unicornsoft sshd\[3291\]: User root from 218.92.0.184 not allowed because not listed in AllowUsers
Dec 30 10:46:07 unicornsoft sshd\[3291\]: Failed none for invalid user root from 218.92.0.184 port 29923 ssh2
Dec 30 10:46:07 unicornsoft sshd\[3291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.184  user=root
2019-12-30 19:06:50
189.213.59.32 attack
Automatic report - Port Scan Attack
2019-12-30 18:28:30
185.209.0.51 attackbots
12/30/2019-11:15:07.484980 185.209.0.51 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-30 18:28:59
202.70.80.27 attack
Dec 30 06:20:30 raspberrypi sshd\[1320\]: Invalid user test6 from 202.70.80.27Dec 30 06:20:32 raspberrypi sshd\[1320\]: Failed password for invalid user test6 from 202.70.80.27 port 41536 ssh2Dec 30 06:25:10 raspberrypi sshd\[1510\]: Invalid user zr from 202.70.80.27
...
2019-12-30 18:46:41
186.136.207.241 attack
SSH/22 MH Probe, BF, Hack -
2019-12-30 19:00:10

最近上报的IP列表

21.111.28.152 190.185.23.227 164.148.39.59 162.52.218.15
22.43.216.118 53.126.178.66 101.102.57.137 141.11.199.81
150.168.38.90 244.124.64.90 175.248.25.78 167.14.66.108
199.154.0.223 214.76.115.59 63.5.103.25 100.255.68.16
132.140.246.111 220.180.64.19 232.198.193.90 232.213.169.195