必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.242.42.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13564
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.242.42.50.			IN	A

;; AUTHORITY SECTION:
.			163	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 01:33:07 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
50.42.242.212.in-addr.arpa domain name pointer post.telenor.dk.
50.42.242.212.in-addr.arpa domain name pointer mail.sonofon.dk.
50.42.242.212.in-addr.arpa domain name pointer net.telenor.dk.
50.42.242.212.in-addr.arpa domain name pointer uf6.telenor.dk.
50.42.242.212.in-addr.arpa domain name pointer netmail.telenor.dk.
50.42.242.212.in-addr.arpa domain name pointer webmail.telenor.dk.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
50.42.242.212.in-addr.arpa	name = netmail.telenor.dk.
50.42.242.212.in-addr.arpa	name = webmail.telenor.dk.
50.42.242.212.in-addr.arpa	name = post.telenor.dk.
50.42.242.212.in-addr.arpa	name = mail.sonofon.dk.
50.42.242.212.in-addr.arpa	name = net.telenor.dk.
50.42.242.212.in-addr.arpa	name = uf6.telenor.dk.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.42.7 attackspam
2020-07-29T22:05[Censored Hostname] sshd[20814]: Failed password for root from 222.186.42.7 port 64165 ssh2
2020-07-29T22:05[Censored Hostname] sshd[20814]: Failed password for root from 222.186.42.7 port 64165 ssh2
2020-07-29T22:05[Censored Hostname] sshd[20814]: Failed password for root from 222.186.42.7 port 64165 ssh2[...]
2020-07-30 04:18:45
200.34.245.127 attackbotsspam
xmlrpc attack
2020-07-30 04:04:57
121.100.17.42 attack
Jul 29 15:16:59 XXXXXX sshd[2096]: Invalid user test from 121.100.17.42 port 54248
2020-07-30 03:45:19
194.26.29.82 attackbots
[MK-VM3] Blocked by UFW
2020-07-30 04:03:47
187.151.162.117 attackspambots
Jul 29 07:10:38 euve59663 sshd[7968]: Bad protocol version identificati=
on '' from 187.151.162.117
Jul 29 07:11:07 euve59663 sshd[7969]: reveeclipse mapping checking getaddri=
nfo for dsl-187-151-162-117-dyn.prod-infinhostnameum.com.mx [187.151.162.117]=
 failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 29 07:11:07 euve59663 sshd[7969]: Invalid user NetLinx from 187.151=
.162.117
Jul 29 07:11:09 euve59663 sshd[7969]: pam_unix(sshd:auth): authenticati=
on failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D187.=
151.162.117=20
Jul 29 07:11:11 euve59663 sshd[7969]: Failed password for invalid user =
NetLinx from 187.151.162.117 port 41376 ssh2
Jul 29 07:11:14 euve59663 sshd[7969]: Connection closed by 187.151.162.=
117 [preauth]
Jul 29 07:11:33 euve59663 sshd[7973]: reveeclipse mapping checking getaddri=
nfo for dsl-187-151-162-117-dyn.prod-infinhostnameum.com.mx [187.151.162.117]=
 failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 29 07:11:33 euve59663 sshd[7973]: Invalid user........
-------------------------------
2020-07-30 04:04:06
138.197.180.102 attackspam
2020-07-29T13:46:05.801306shield sshd\[16383\]: Invalid user niiv from 138.197.180.102 port 37980
2020-07-29T13:46:05.812490shield sshd\[16383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.180.102
2020-07-29T13:46:07.056736shield sshd\[16383\]: Failed password for invalid user niiv from 138.197.180.102 port 37980 ssh2
2020-07-29T13:49:57.667270shield sshd\[16766\]: Invalid user shachunyang from 138.197.180.102 port 53304
2020-07-29T13:49:57.676231shield sshd\[16766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.180.102
2020-07-30 04:14:16
95.142.160.6 attackspambots
Jul 29 17:16:27 ws24vmsma01 sshd[222547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.142.160.6
Jul 29 17:16:30 ws24vmsma01 sshd[222547]: Failed password for invalid user nexthink from 95.142.160.6 port 59356 ssh2
...
2020-07-30 04:22:53
187.18.108.73 attackspam
Jul 29 19:53:38 vpn01 sshd[3629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.18.108.73
Jul 29 19:53:40 vpn01 sshd[3629]: Failed password for invalid user johngarry from 187.18.108.73 port 34127 ssh2
...
2020-07-30 03:50:35
120.86.127.45 attackbots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-07-29T19:24:06Z and 2020-07-29T19:30:10Z
2020-07-30 04:23:33
188.131.178.32 attackbots
Jul 29 16:35:58 minden010 sshd[27432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.178.32
Jul 29 16:36:00 minden010 sshd[27432]: Failed password for invalid user nxroot from 188.131.178.32 port 40638 ssh2
Jul 29 16:41:32 minden010 sshd[29494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.178.32
...
2020-07-30 03:51:51
85.248.227.163 attackspambots
Automatic report - Banned IP Access
2020-07-30 04:21:42
14.162.94.207 attack
Jul 29 18:56:20 vpn01 sshd[2883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.162.94.207
Jul 29 18:56:22 vpn01 sshd[2883]: Failed password for invalid user aziz from 14.162.94.207 port 51780 ssh2
...
2020-07-30 04:09:03
106.52.8.171 attackspambots
Jul 29 18:29:11 scw-tender-jepsen sshd[5951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.8.171
Jul 29 18:29:13 scw-tender-jepsen sshd[5951]: Failed password for invalid user jinhaoxuan from 106.52.8.171 port 41662 ssh2
2020-07-30 03:52:27
43.224.156.26 attack
SSH Brute-Force attacks
2020-07-30 03:50:05
139.59.243.224 attack
Invalid user lijinze from 139.59.243.224 port 45708
2020-07-30 03:51:02

最近上报的IP列表

212.241.16.182 212.243.83.62 212.242.42.52 212.242.42.54
212.243.109.47 212.243.73.107 212.24.98.12 212.25.0.46
212.25.129.5 212.25.83.149 212.25.83.150 212.25.26.200
212.25.26.241 212.25.183.111 212.250.3.80 212.25.26.173
212.251.116.193 212.250.82.205 212.251.12.163 212.250.30.11