必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Stockholm

省份(region): Stockholms

国家(country): Sweden

运营商(isp): Telia

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.18.108.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48212
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.18.108.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 08:07:43 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
242.108.18.194.in-addr.arpa domain name pointer 194-18-94-242.customer.telia.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.108.18.194.in-addr.arpa	name = 194-18-94-242.customer.telia.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.12.51.193 attackspambots
2020-03-16T16:56:35.329678luisaranguren sshd[3309205]: Invalid user next from 106.12.51.193 port 50830
2020-03-16T16:56:37.282637luisaranguren sshd[3309205]: Failed password for invalid user next from 106.12.51.193 port 50830 ssh2
...
2020-03-16 19:54:02
116.235.54.102 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-16 19:39:27
189.216.130.39 attackbots
Email rejected due to spam filtering
2020-03-16 19:14:10
159.192.96.195 attack
Email rejected due to spam filtering
2020-03-16 19:11:48
95.59.115.230 attack
Email rejected due to spam filtering
2020-03-16 19:10:13
216.74.77.62 attackbots
Chat Spam
2020-03-16 19:46:22
162.243.132.148 attackbotsspam
firewall-block, port(s): 81/tcp
2020-03-16 19:45:46
189.111.197.135 attackbotsspam
Honeypot attack, port: 81, PTR: 189-111-197-135.dsl.telesp.net.br.
2020-03-16 19:28:00
119.183.170.95 attack
Unauthorized connection attempt detected from IP address 119.183.170.95 to port 22 [T]
2020-03-16 19:53:46
69.247.97.19 attack
SSH auth scanning - multiple failed logins
2020-03-16 19:12:44
199.115.129.42 attackbots
Unauthorized connection attempt detected from IP address 199.115.129.42 to port 1433 [T]
2020-03-16 19:38:00
91.237.114.153 attackbotsspam
Honeypot attack, port: 445, PTR: ip-114-153.ncn.od.ua.
2020-03-16 19:34:03
77.76.182.244 attackspambots
Port probing on unauthorized port 9530
2020-03-16 19:54:34
206.189.91.97 attackspambots
Mar 16 10:23:17 ns382633 sshd\[19808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.91.97  user=root
Mar 16 10:23:19 ns382633 sshd\[19808\]: Failed password for root from 206.189.91.97 port 51346 ssh2
Mar 16 10:53:37 ns382633 sshd\[25406\]: Invalid user jboss from 206.189.91.97 port 56780
Mar 16 10:53:37 ns382633 sshd\[25406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.91.97
Mar 16 10:53:39 ns382633 sshd\[25406\]: Failed password for invalid user jboss from 206.189.91.97 port 56780 ssh2
2020-03-16 19:32:11
183.16.102.238 attack
Email rejected due to spam filtering
2020-03-16 19:23:14

最近上报的IP列表

223.218.198.36 253.46.110.194 246.6.43.158 61.109.220.23
109.122.250.195 235.131.109.61 175.208.136.68 146.58.185.140
160.30.144.84 180.236.252.113 219.109.201.27 193.17.88.157
201.128.60.124 215.250.76.191 19.112.60.61 122.65.195.210
237.51.210.37 57.97.71.231 201.255.62.164 207.83.111.226