必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.251.148.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42491
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;21.251.148.42.			IN	A

;; AUTHORITY SECTION:
.			529	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019122201 1800 900 604800 86400

;; Query time: 100 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 23 03:35:56 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
Host 42.148.251.21.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.148.251.21.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
212.237.54.236 attackspambots
2019-11-09T00:58:42.235505scmdmz1 sshd\[20327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.54.236  user=root
2019-11-09T00:58:44.433184scmdmz1 sshd\[20327\]: Failed password for root from 212.237.54.236 port 55588 ssh2
2019-11-09T01:05:35.857064scmdmz1 sshd\[20832\]: Invalid user debian-spamd from 212.237.54.236 port 44050
...
2019-11-09 08:11:37
201.140.211.123 attackspam
Unauthorised access (Nov  9) SRC=201.140.211.123 LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=48513 TCP DPT=23 WINDOW=27627 SYN
2019-11-09 08:27:10
5.20.131.6 attackspam
Nov  8 17:13:18 aragorn sshd[10228]: User sshd from data-131-6.cgates.lt not allowed because not listed in AllowUsers
Nov  8 17:15:31 aragorn sshd[11124]: User sshd from data-131-6.cgates.lt not allowed because not listed in AllowUsers
Nov  8 17:15:45 aragorn sshd[11129]: User sshd from data-131-6.cgates.lt not allowed because not listed in AllowUsers
Nov  8 17:38:14 aragorn sshd[14749]: Invalid user user1 from 5.20.131.6
...
2019-11-09 08:14:13
148.70.3.199 attack
Nov  8 18:10:19 ny01 sshd[15929]: Failed password for root from 148.70.3.199 port 52390 ssh2
Nov  8 18:15:07 ny01 sshd[16410]: Failed password for root from 148.70.3.199 port 33834 ssh2
Nov  8 18:19:51 ny01 sshd[16790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.3.199
2019-11-09 08:40:08
94.23.25.77 attackspam
Nov  8 19:41:25 ws24vmsma01 sshd[237582]: Failed password for root from 94.23.25.77 port 34582 ssh2
Nov  8 19:49:22 ws24vmsma01 sshd[244335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.25.77
...
2019-11-09 08:29:57
165.227.96.190 attack
Nov  9 01:11:41 [host] sshd[26957]: Invalid user gaurav from 165.227.96.190
Nov  9 01:11:41 [host] sshd[26957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.96.190
Nov  9 01:11:44 [host] sshd[26957]: Failed password for invalid user gaurav from 165.227.96.190 port 33360 ssh2
2019-11-09 08:43:23
52.141.36.143 attackbots
2019-11-09T01:21:32.273641mail01 postfix/smtpd[11418]: warning: unknown[52.141.36.143]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-09T01:23:16.118938mail01 postfix/smtpd[11418]: warning: unknown[52.141.36.143]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-09T01:25:01.115370mail01 postfix/smtpd[10794]: warning: unknown[52.141.36.143]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-09 08:42:01
5.2.142.130 attackspambots
Nov  9 02:16:37 taivassalofi sshd[206601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.2.142.130
Nov  9 02:16:39 taivassalofi sshd[206601]: Failed password for invalid user WWW@1234 from 5.2.142.130 port 37478 ssh2
...
2019-11-09 08:26:44
115.78.0.214 attack
Telnet Server BruteForce Attack
2019-11-09 08:18:03
185.173.35.61 attackspam
Automatic report - Banned IP Access
2019-11-09 08:14:41
88.214.26.20 attackspambots
191108 16:56:33 \[Warning\] Access denied for user 'backup'@'88.214.26.20' \(using password: YES\)
191108 17:08:49 \[Warning\] Access denied for user 'admin'@'88.214.26.20' \(using password: YES\)
191108 17:22:57 \[Warning\] Access denied for user 'backup'@'88.214.26.20' \(using password: YES\)
...
2019-11-09 08:51:33
182.52.134.179 attackbots
Nov  9 00:40:53 vps691689 sshd[21041]: Failed password for root from 182.52.134.179 port 42070 ssh2
Nov  9 00:45:14 vps691689 sshd[21742]: Failed password for root from 182.52.134.179 port 49816 ssh2
...
2019-11-09 08:45:20
175.5.114.211 attackbots
FTP: login Brute Force attempt, PTR: PTR record not found
2019-11-09 08:33:31
117.139.166.27 attack
SSH Brute-Forcing (ownc)
2019-11-09 08:47:07
62.234.66.145 attackspambots
Nov  9 01:10:05 vps691689 sshd[22242]: Failed password for root from 62.234.66.145 port 55757 ssh2
Nov  9 01:14:29 vps691689 sshd[22346]: Failed password for root from 62.234.66.145 port 45254 ssh2
...
2019-11-09 08:22:42

最近上报的IP列表

29.12.35.186 166.74.118.179 203.184.199.206 71.230.60.161
1.10.133.222 191.230.26.50 60.238.202.86 12.61.47.82
212.33.251.225 38.111.20.33 5.154.38.205 124.211.53.181
66.195.72.124 194.192.253.6 52.108.28.219 94.158.9.91
156.223.129.221 163.204.93.103 174.143.67.105 117.82.129.155