必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Al Mansurah

省份(region): Ad Daqahliyah

国家(country): Egypt

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.53.42.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57348
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.53.42.212.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 12:09:42 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
212.42.53.197.in-addr.arpa domain name pointer host-197.53.42.212.tedata.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
212.42.53.197.in-addr.arpa	name = host-197.53.42.212.tedata.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.136.108.116 attackspambots
Dec 31 07:50:55 debian-2gb-nbg1-2 kernel: \[34390.871414\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.136.108.116 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=7006 PROTO=TCP SPT=52094 DPT=6674 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-31 15:04:11
209.251.180.190 attack
Dec 31 08:15:10 silence02 sshd[14546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.251.180.190
Dec 31 08:15:11 silence02 sshd[14546]: Failed password for invalid user reunion from 209.251.180.190 port 48036 ssh2
Dec 31 08:16:25 silence02 sshd[14584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.251.180.190
2019-12-31 15:37:59
14.205.207.116 attack
Port Scan
2019-12-31 15:23:57
2.228.163.157 attack
$f2bV_matches
2019-12-31 15:25:33
68.183.127.93 attackspambots
$f2bV_matches
2019-12-31 15:21:19
106.13.86.136 attackspam
2019-12-31T06:42:31.229115shield sshd\[31549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.86.136  user=root
2019-12-31T06:42:33.500964shield sshd\[31549\]: Failed password for root from 106.13.86.136 port 37966 ssh2
2019-12-31T06:48:02.724760shield sshd\[497\]: Invalid user sundsvold from 106.13.86.136 port 43608
2019-12-31T06:48:02.729486shield sshd\[497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.86.136
2019-12-31T06:48:04.773547shield sshd\[497\]: Failed password for invalid user sundsvold from 106.13.86.136 port 43608 ssh2
2019-12-31 15:20:38
183.131.110.114 attack
scan z
2019-12-31 15:24:33
201.161.58.204 attackspam
Dec 31 07:28:20 v22018076622670303 sshd\[30048\]: Invalid user oa from 201.161.58.204 port 51922
Dec 31 07:28:20 v22018076622670303 sshd\[30048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.161.58.204
Dec 31 07:28:22 v22018076622670303 sshd\[30048\]: Failed password for invalid user oa from 201.161.58.204 port 51922 ssh2
...
2019-12-31 15:33:08
120.71.133.75 attackspambots
Port Scan
2019-12-31 15:11:11
181.65.164.179 attack
Dec 31 08:18:48 ns382633 sshd\[5940\]: Invalid user zeita from 181.65.164.179 port 47126
Dec 31 08:18:48 ns382633 sshd\[5940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.65.164.179
Dec 31 08:18:50 ns382633 sshd\[5940\]: Failed password for invalid user zeita from 181.65.164.179 port 47126 ssh2
Dec 31 08:23:02 ns382633 sshd\[6707\]: Invalid user lichvarcik from 181.65.164.179 port 43190
Dec 31 08:23:02 ns382633 sshd\[6707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.65.164.179
2019-12-31 15:26:05
222.186.173.238 attack
Dec 31 08:35:39 silence02 sshd[15803]: Failed password for root from 222.186.173.238 port 4992 ssh2
Dec 31 08:35:52 silence02 sshd[15803]: error: maximum authentication attempts exceeded for root from 222.186.173.238 port 4992 ssh2 [preauth]
Dec 31 08:35:58 silence02 sshd[15819]: Failed password for root from 222.186.173.238 port 33770 ssh2
2019-12-31 15:40:10
80.78.240.76 attack
Dec 31 07:28:52 woltan sshd[4919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.78.240.76
2019-12-31 15:23:29
185.176.27.118 attack
12/31/2019-01:58:39.075761 185.176.27.118 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-31 15:05:01
182.253.226.212 attackbotsspam
leo_www
2019-12-31 15:30:00
94.191.50.51 attackspambots
no
2019-12-31 15:43:15

最近上报的IP列表

157.93.252.197 145.23.92.161 45.245.207.241 126.112.110.161
177.245.37.129 182.180.19.68 19.182.214.128 97.211.99.174
17.208.189.183 7.140.107.83 81.175.220.47 203.17.170.12
239.93.159.212 180.56.66.167 124.137.215.212 234.111.241.175
180.63.156.242 156.47.12.66 238.72.104.235 23.153.55.165