必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 205.144.252.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14697
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;205.144.252.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031601 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 17 12:27:27 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 42.252.144.205.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.252.144.205.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.248.33.51 attackbotsspam
detected by Fail2Ban
2020-05-16 02:30:19
103.78.215.150 attack
2020-05-14 23:01:40 server sshd[51747]: Failed password for invalid user delphine from 103.78.215.150 port 59512 ssh2
2020-05-16 01:56:55
173.14.103.166 attackspambots
Automatic report - Port Scan Attack
2020-05-16 02:09:58
188.246.224.219 attack
May 15 18:54:57 debian-2gb-nbg1-2 kernel: \[11820546.052311\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=188.246.224.219 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=9610 PROTO=TCP SPT=56696 DPT=3320 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-16 01:55:41
103.18.162.231 attackspambots
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-05-16 02:15:27
221.142.56.160 attackbots
May 15 17:49:27 cloud sshd[32100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.142.56.160 
May 15 17:49:29 cloud sshd[32100]: Failed password for invalid user pepper from 221.142.56.160 port 40756 ssh2
2020-05-16 02:08:49
106.12.205.237 attackbotsspam
Brute-force attempt banned
2020-05-16 02:05:20
185.148.83.139 attackbotsspam
Port probing on unauthorized port 2001
2020-05-16 02:07:19
202.29.80.133 attackspambots
May 15 15:24:31 vps639187 sshd\[3942\]: Invalid user analy from 202.29.80.133 port 44895
May 15 15:24:31 vps639187 sshd\[3942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.80.133
May 15 15:24:33 vps639187 sshd\[3942\]: Failed password for invalid user analy from 202.29.80.133 port 44895 ssh2
...
2020-05-16 01:50:02
68.183.156.109 attackbotsspam
SSH Brute Force
2020-05-16 02:21:55
51.91.56.33 attackspam
2020-05-15T20:11:07.214224mail.broermann.family sshd[17791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=33.ip-51-91-56.eu
2020-05-15T20:11:07.206844mail.broermann.family sshd[17791]: Invalid user pg from 51.91.56.33 port 58764
2020-05-15T20:11:09.055146mail.broermann.family sshd[17791]: Failed password for invalid user pg from 51.91.56.33 port 58764 ssh2
2020-05-15T20:14:44.834462mail.broermann.family sshd[17920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=33.ip-51-91-56.eu  user=root
2020-05-15T20:14:46.464797mail.broermann.family sshd[17920]: Failed password for root from 51.91.56.33 port 37670 ssh2
...
2020-05-16 02:16:03
178.128.72.80 attack
May 15 18:39:20 * sshd[6057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.72.80
May 15 18:39:22 * sshd[6057]: Failed password for invalid user postgres from 178.128.72.80 port 60730 ssh2
2020-05-16 02:14:18
49.234.115.143 attackbotsspam
May 15 14:31:42 prox sshd[26220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.115.143 
May 15 14:31:44 prox sshd[26220]: Failed password for invalid user admin from 49.234.115.143 port 43022 ssh2
2020-05-16 01:53:35
209.17.96.194 attack
The IP has triggered Cloudflare WAF. CF-Ray: 593b2c76ee02eaae | WAF_Rule_ID: 4c344d8609cf47c88674e7c5f743a22c | WAF_Kind: firewall | CF_Action: drop | Country: US | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: dl.wevg.org | User-Agent: Mozilla/5.0 (compatible; Nimbostratus-Bot/v1.3.2; http://cloudsystemnetworks.com) | CF_DC: IAD. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2020-05-16 02:29:08
72.172.134.146 attackspam
72.172.134.146 has been banned for [spam]
...
2020-05-16 02:26:23

最近上报的IP列表

177.125.135.190 50.164.194.113 176.215.158.100 106.58.139.127
2.159.253.98 196.234.87.50 198.22.154.238 174.18.162.202
38.161.126.206 53.43.144.198 104.40.67.138 234.6.171.34
56.53.57.213 177.72.6.24 211.154.203.71 233.243.250.233
209.199.143.167 204.209.208.138 19.9.100.135 141.239.221.4