必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Kazakhstan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.132.242.96
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37666
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.132.242.96.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 15:06:23 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 96.242.132.2.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 96.242.132.2.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.117.181.88 attack
 TCP (SYN) 122.117.181.88:62014 -> port 23, len 44
2020-07-01 20:20:24
128.199.33.67 attack
" "
2020-07-01 20:35:30
206.189.73.164 attackbots
Multiple SSH authentication failures from 206.189.73.164
2020-07-01 20:59:32
222.186.42.136 attackbotsspam
30.06.2020 19:40:00 SSH access blocked by firewall
2020-07-01 20:43:18
113.161.26.177 attackspam
portscan
2020-07-01 20:36:18
80.244.179.6 attack
Jun 30 10:39:24 dignus sshd[31328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.244.179.6  user=root
Jun 30 10:39:26 dignus sshd[31328]: Failed password for root from 80.244.179.6 port 48930 ssh2
Jun 30 10:42:08 dignus sshd[31870]: Invalid user zs from 80.244.179.6 port 33498
Jun 30 10:42:08 dignus sshd[31870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.244.179.6
Jun 30 10:42:10 dignus sshd[31870]: Failed password for invalid user zs from 80.244.179.6 port 33498 ssh2
...
2020-07-01 20:45:54
216.10.242.85 attackbots
WordPress brute force
2020-07-01 20:22:22
49.233.214.188 attack
2020-06-29T08:35:00.982089hostname sshd[1901]: Failed password for invalid user user5 from 49.233.214.188 port 57828 ssh2
...
2020-07-01 20:24:55
150.109.182.32 attackspam
firewall-block, port(s): 32773/tcp
2020-07-01 20:30:05
162.243.132.159 attack
 TCP (SYN) 162.243.132.159:51149 -> port 139, len 40
2020-07-01 20:29:52
193.56.28.250 attack
Spam detected 2020.06.30 18:42:04
blocked until 2020.08.19 11:44:51
by HoneyPot
2020-07-01 21:04:29
117.218.245.158 attackspam
Honeypot attack, port: 81, PTR: static.ftth.cbt.117.218.245.158.bsnl.in.
2020-07-01 20:55:42
181.46.156.130 attackspambots
Honeypot attack, port: 445, PTR: cpe-181-46-156-130.telecentro-reversos.com.ar.
2020-07-01 20:58:14
104.248.237.70 attackbots
Jun 30 05:39:16 h2034429 sshd[32231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.237.70  user=r.r
Jun 30 05:39:18 h2034429 sshd[32231]: Failed password for r.r from 104.248.237.70 port 43402 ssh2
Jun 30 05:39:18 h2034429 sshd[32231]: Received disconnect from 104.248.237.70 port 43402:11: Bye Bye [preauth]
Jun 30 05:39:18 h2034429 sshd[32231]: Disconnected from 104.248.237.70 port 43402 [preauth]
Jun 30 05:55:23 h2034429 sshd[32445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.237.70  user=r.r
Jun 30 05:55:25 h2034429 sshd[32445]: Failed password for r.r from 104.248.237.70 port 43495 ssh2
Jun 30 05:55:25 h2034429 sshd[32445]: Received disconnect from 104.248.237.70 port 43495:11: Bye Bye [preauth]
Jun 30 05:55:25 h2034429 sshd[32445]: Disconnected from 104.248.237.70 port 43495 [preauth]
Jun 30 05:58:35 h2034429 sshd[32474]: Invalid user ralph from 104.248.237.70
Jun........
-------------------------------
2020-07-01 21:03:17
49.235.56.187 attackspam
invalid user
2020-07-01 20:46:18

最近上报的IP列表

223.149.5.65 107.172.100.251 83.110.136.69 177.141.17.225
190.71.96.18 103.87.24.245 118.240.7.21 176.44.112.250
218.89.4.27 114.119.143.151 188.4.86.138 165.227.174.218
2.178.84.81 85.104.253.249 8.209.76.58 201.220.154.228
213.232.121.98 176.221.6.156 221.5.224.59 222.78.194.56