必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 215.42.11.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13386
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;215.42.11.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 21:28:50 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 12.11.42.215.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 215.42.11.12.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
145.239.87.109 attackbotsspam
2019-10-08T07:44:14.627681tmaserv sshd\[12449\]: Invalid user Www!23 from 145.239.87.109 port 50356
2019-10-08T07:44:14.630218tmaserv sshd\[12449\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.ip-145-239-87.eu
2019-10-08T07:44:17.241706tmaserv sshd\[12449\]: Failed password for invalid user Www!23 from 145.239.87.109 port 50356 ssh2
2019-10-08T07:48:33.388737tmaserv sshd\[12686\]: Invalid user Example@2017 from 145.239.87.109 port 33336
2019-10-08T07:48:33.391365tmaserv sshd\[12686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.ip-145-239-87.eu
2019-10-08T07:48:34.897996tmaserv sshd\[12686\]: Failed password for invalid user Example@2017 from 145.239.87.109 port 33336 ssh2
...
2019-10-08 13:58:19
218.188.210.214 attackbots
Oct  8 08:09:07 vps691689 sshd[24884]: Failed password for root from 218.188.210.214 port 36682 ssh2
Oct  8 08:14:14 vps691689 sshd[25012]: Failed password for root from 218.188.210.214 port 49446 ssh2
...
2019-10-08 14:15:06
45.66.32.45 attackbots
Automatic report - Banned IP Access
2019-10-08 13:24:12
147.135.255.107 attackspambots
Oct  8 06:50:13 www sshd\[59346\]: Invalid user sex from 147.135.255.107Oct  8 06:50:15 www sshd\[59346\]: Failed password for invalid user sex from 147.135.255.107 port 57294 ssh2Oct  8 06:57:06 www sshd\[59461\]: Invalid user paintball1 from 147.135.255.107
...
2019-10-08 14:07:32
193.112.58.212 attackspambots
Oct  8 07:00:30 tux-35-217 sshd\[9502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.58.212  user=root
Oct  8 07:00:32 tux-35-217 sshd\[9502\]: Failed password for root from 193.112.58.212 port 51484 ssh2
Oct  8 07:04:15 tux-35-217 sshd\[9541\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.58.212  user=root
Oct  8 07:04:18 tux-35-217 sshd\[9541\]: Failed password for root from 193.112.58.212 port 51292 ssh2
...
2019-10-08 13:42:21
36.236.33.198 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/36.236.33.198/ 
 TW - 1H : (327)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 36.236.33.198 
 
 CIDR : 36.236.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 WYKRYTE ATAKI Z ASN3462 :  
  1H - 22 
  3H - 42 
  6H - 66 
 12H - 145 
 24H - 316 
 
 DateTime : 2019-10-08 05:56:58 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-08 14:18:06
188.165.255.8 attackbotsspam
Oct  8 07:17:16 SilenceServices sshd[26767]: Failed password for root from 188.165.255.8 port 48946 ssh2
Oct  8 07:20:42 SilenceServices sshd[27650]: Failed password for root from 188.165.255.8 port 60086 ssh2
2019-10-08 13:28:18
183.134.199.68 attack
Oct  8 06:05:20 hcbbdb sshd\[23224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.134.199.68  user=root
Oct  8 06:05:21 hcbbdb sshd\[23224\]: Failed password for root from 183.134.199.68 port 53634 ssh2
Oct  8 06:09:03 hcbbdb sshd\[23664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.134.199.68  user=root
Oct  8 06:09:05 hcbbdb sshd\[23664\]: Failed password for root from 183.134.199.68 port 55511 ssh2
Oct  8 06:12:51 hcbbdb sshd\[24102\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.134.199.68  user=root
2019-10-08 14:13:21
51.254.206.149 attackbotsspam
Oct  8 06:36:44 SilenceServices sshd[15923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.206.149
Oct  8 06:36:47 SilenceServices sshd[15923]: Failed password for invalid user Digital2017 from 51.254.206.149 port 49050 ssh2
Oct  8 06:40:26 SilenceServices sshd[16968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.206.149
2019-10-08 14:11:12
152.250.41.161 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/152.250.41.161/ 
 BR - 1H : (317)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN27699 
 
 IP : 152.250.41.161 
 
 CIDR : 152.250.0.0/16 
 
 PREFIX COUNT : 267 
 
 UNIQUE IP COUNT : 6569728 
 
 
 WYKRYTE ATAKI Z ASN27699 :  
  1H - 10 
  3H - 25 
  6H - 43 
 12H - 82 
 24H - 124 
 
 DateTime : 2019-10-08 05:56:58 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-08 14:16:18
139.59.5.65 attackbotsspam
[ssh] SSH attack
2019-10-08 13:46:19
95.167.225.81 attackspambots
2019-10-08T05:03:09.835706abusebot-4.cloudsearch.cf sshd\[22296\]: Invalid user Qwerty123\$ from 95.167.225.81 port 55280
2019-10-08 13:59:42
77.245.35.170 attackbotsspam
2019-10-08T05:01:20.255144hub.schaetter.us sshd\[10666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.245.35.170  user=root
2019-10-08T05:01:22.343217hub.schaetter.us sshd\[10666\]: Failed password for root from 77.245.35.170 port 47664 ssh2
2019-10-08T05:05:11.516825hub.schaetter.us sshd\[10713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.245.35.170  user=root
2019-10-08T05:05:13.650329hub.schaetter.us sshd\[10713\]: Failed password for root from 77.245.35.170 port 38838 ssh2
2019-10-08T05:09:09.080653hub.schaetter.us sshd\[10737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.245.35.170  user=root
...
2019-10-08 13:20:50
218.234.206.107 attackspam
Oct  8 01:45:29 xtremcommunity sshd\[302792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.234.206.107  user=root
Oct  8 01:45:31 xtremcommunity sshd\[302792\]: Failed password for root from 218.234.206.107 port 40218 ssh2
Oct  8 01:50:12 xtremcommunity sshd\[302932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.234.206.107  user=root
Oct  8 01:50:13 xtremcommunity sshd\[302932\]: Failed password for root from 218.234.206.107 port 51960 ssh2
Oct  8 01:54:53 xtremcommunity sshd\[303019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.234.206.107  user=root
...
2019-10-08 14:05:44
112.166.148.28 attackspambots
Apr 26 08:14:03 ubuntu sshd[32380]: Failed password for invalid user ok from 112.166.148.28 port 40518 ssh2
Apr 26 08:16:48 ubuntu sshd[32425]: Failed password for ftp from 112.166.148.28 port 37376 ssh2
Apr 26 08:19:33 ubuntu sshd[32470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.166.148.28
2019-10-08 13:48:45

最近上报的IP列表

175.70.105.135 135.103.163.39 137.183.72.151 24.112.240.20
170.200.47.164 216.117.122.71 253.32.70.55 76.247.255.176
130.23.15.73 39.30.182.46 251.11.151.125 62.227.49.98
16.93.0.253 185.247.82.129 238.37.116.241 184.60.45.35
4.36.27.191 58.224.100.77 84.144.123.245 190.29.22.110