必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 205.242.207.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2253
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;205.242.207.116.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 11:36:21 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 116.207.242.205.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 116.207.242.205.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
125.25.153.204 attackbotsspam
1596975197 - 08/09/2020 14:13:17 Host: 125.25.153.204/125.25.153.204 Port: 445 TCP Blocked
2020-08-09 22:27:10
123.27.67.255 attack
Automated report (2020-08-09T20:13:30+08:00). Referrer spam originating from this address detected (anti-crisis-seo.com).
2020-08-09 22:14:10
41.76.169.8 attackspambots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 60
2020-08-09 22:26:46
112.85.42.176 attack
Aug  9 16:25:52 server sshd[45952]: Failed none for root from 112.85.42.176 port 21280 ssh2
Aug  9 16:25:55 server sshd[45952]: Failed password for root from 112.85.42.176 port 21280 ssh2
Aug  9 16:25:58 server sshd[45952]: Failed password for root from 112.85.42.176 port 21280 ssh2
2020-08-09 22:39:19
91.191.209.153 attackspam
2020-08-09 16:17:28 dovecot_login authenticator failed for \(User\) \[91.191.209.153\]: 535 Incorrect authentication data \(set_id=cadvisor@hosting1.no-server.de\)
2020-08-09 16:17:39 dovecot_login authenticator failed for \(User\) \[91.191.209.153\]: 535 Incorrect authentication data \(set_id=cadvisor@hosting1.no-server.de\)
2020-08-09 16:17:46 dovecot_login authenticator failed for \(User\) \[91.191.209.153\]: 535 Incorrect authentication data \(set_id=cadvisor@hosting1.no-server.de\)
2020-08-09 16:17:48 dovecot_login authenticator failed for \(User\) \[91.191.209.153\]: 535 Incorrect authentication data \(set_id=cadvisor@hosting1.no-server.de\)
2020-08-09 16:18:07 dovecot_login authenticator failed for \(User\) \[91.191.209.153\]: 535 Incorrect authentication data \(set_id=margaux@hosting1.no-server.de\)
...
2020-08-09 22:24:41
72.184.240.116 attack
2020-08-09T14:13[Censored Hostname] sshd[1982]: Invalid user admin from 72.184.240.116 port 41489
2020-08-09T14:13[Censored Hostname] sshd[1982]: Failed password for invalid user admin from 72.184.240.116 port 41489 ssh2
2020-08-09T14:13[Censored Hostname] sshd[1984]: Invalid user admin from 72.184.240.116 port 41635[...]
2020-08-09 22:25:16
180.66.207.67 attackspambots
Aug  9 15:04:46 ajax sshd[9225]: Failed password for root from 180.66.207.67 port 44979 ssh2
2020-08-09 22:55:48
20.188.107.54 attackspambots
Aug  9 05:31:37 mockhub sshd[21446]: Failed password for root from 20.188.107.54 port 1024 ssh2
...
2020-08-09 22:41:44
177.125.236.220 attackbotsspam
Automatic report - Port Scan Attack
2020-08-09 22:44:13
112.85.42.89 attack
Aug  9 19:26:28 dhoomketu sshd[2258081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.89  user=root
Aug  9 19:26:30 dhoomketu sshd[2258081]: Failed password for root from 112.85.42.89 port 48965 ssh2
Aug  9 19:26:28 dhoomketu sshd[2258081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.89  user=root
Aug  9 19:26:30 dhoomketu sshd[2258081]: Failed password for root from 112.85.42.89 port 48965 ssh2
Aug  9 19:26:32 dhoomketu sshd[2258081]: Failed password for root from 112.85.42.89 port 48965 ssh2
...
2020-08-09 22:12:04
159.65.185.253 attack
159.65.185.253 - - [09/Aug/2020:14:43:22 +0100] "POST /wp-login.php HTTP/1.1" 200 1843 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.65.185.253 - - [09/Aug/2020:14:43:23 +0100] "POST /wp-login.php HTTP/1.1" 200 1779 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.65.185.253 - - [09/Aug/2020:14:43:28 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-09 22:48:32
54.39.50.204 attack
Aug  9 16:12:22 piServer sshd[30130]: Failed password for root from 54.39.50.204 port 18210 ssh2
Aug  9 16:17:20 piServer sshd[30745]: Failed password for root from 54.39.50.204 port 9246 ssh2
...
2020-08-09 22:35:50
46.9.167.197 attack
Aug  9 15:25:58 vpn01 sshd[25967]: Failed password for root from 46.9.167.197 port 42757 ssh2
...
2020-08-09 22:28:17
87.251.74.223 attack
 TCP (SYN) 87.251.74.223:56923 -> port 40004, len 44
2020-08-09 22:54:20
191.54.56.168 attack
Port probing on unauthorized port 23
2020-08-09 22:16:25

最近上报的IP列表

127.173.102.10 17.184.152.34 135.68.134.106 128.135.176.79
138.65.167.235 7.106.223.226 237.150.58.153 70.33.22.73
19.172.239.128 29.178.153.180 252.85.219.98 155.29.3.245
191.114.84.34 31.227.244.129 182.122.134.245 7.4.121.198
129.73.225.197 206.52.236.153 208.155.230.114 13.172.81.166