必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Villasanta

省份(region): Lombardy

国家(country): Italy

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 217.141.20.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41572
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;217.141.20.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121703 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 18 11:09:35 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
242.20.141.217.in-addr.arpa domain name pointer host-217-141-20-242.business.telecomitalia.it.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.20.141.217.in-addr.arpa	name = host-217-141-20-242.business.telecomitalia.it.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
80.82.46.191 attackbots
Icarus honeypot on github
2020-05-06 21:16:28
201.124.108.32 attackbots
May  6 14:54:18 sticky sshd\[3991\]: Invalid user werner from 201.124.108.32 port 47411
May  6 14:54:18 sticky sshd\[3991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.124.108.32
May  6 14:54:20 sticky sshd\[3991\]: Failed password for invalid user werner from 201.124.108.32 port 47411 ssh2
May  6 14:58:41 sticky sshd\[4007\]: Invalid user www from 201.124.108.32 port 52347
May  6 14:58:41 sticky sshd\[4007\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.124.108.32
...
2020-05-06 21:14:24
37.191.233.81 attackspambots
GET /adv,/cgi-bin/weblogin.cgi?username=admin';ls #&password=asdf HTTP/1.1
2020-05-06 21:24:19
103.24.109.200 attackspam
1588766513 - 05/06/2020 14:01:53 Host: 103.24.109.200/103.24.109.200 Port: 445 TCP Blocked
2020-05-06 21:07:28
180.241.241.136 attack
Unauthorized connection attempt from IP address 180.241.241.136 on Port 445(SMB)
2020-05-06 21:25:11
167.172.153.137 attackspam
...
2020-05-06 21:00:41
91.202.147.136 attack
Unauthorized connection attempt from IP address 91.202.147.136 on Port 445(SMB)
2020-05-06 21:20:13
162.243.136.76 attack
Unauthorized connection attempt from IP address 162.243.136.76 on Port 445(SMB)
2020-05-06 21:21:54
139.59.8.118 attackbots
May  6 13:38:29 mx01 sshd[26350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.8.118  user=r.r
May  6 13:38:31 mx01 sshd[26350]: Failed password for r.r from 139.59.8.118 port 3774 ssh2
May  6 13:38:31 mx01 sshd[26350]: Received disconnect from 139.59.8.118: 11: Bye Bye [preauth]
May  6 13:45:00 mx01 sshd[27325]: Invalid user mariann from 139.59.8.118
May  6 13:45:00 mx01 sshd[27325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.8.118 
May  6 13:45:02 mx01 sshd[27325]: Failed password for invalid user mariann from 139.59.8.118 port 23391 ssh2
May  6 13:45:02 mx01 sshd[27325]: Received disconnect from 139.59.8.118: 11: Bye Bye [preauth]
May  6 13:47:52 mx01 sshd[27869]: Invalid user tiago from 139.59.8.118
May  6 13:47:52 mx01 sshd[27869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.8.118 
May  6 13:47:54 mx01 sshd[27869]:........
-------------------------------
2020-05-06 21:09:16
88.214.205.84 attackspambots
HTTP 503 XSS Attempt
2020-05-06 21:27:40
186.29.70.85 attackbotsspam
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "tj" at 2020-05-06T12:51:01Z
2020-05-06 21:06:13
37.78.64.231 attackspam
Unauthorized connection attempt from IP address 37.78.64.231 on Port 445(SMB)
2020-05-06 21:12:38
121.241.55.18 attackbots
Unauthorized connection attempt from IP address 121.241.55.18 on Port 445(SMB)
2020-05-06 21:01:25
88.208.60.136 attack
HTTP 503 XSS Attempt
2020-05-06 20:47:57
220.78.28.68 attack
2020-05-06T07:02:24.756335linuxbox-skyline sshd[214247]: Invalid user cron from 220.78.28.68 port 4430
...
2020-05-06 21:10:36

最近上报的IP列表

28.139.219.235 161.140.221.114 125.251.165.224 241.51.111.166
231.240.245.152 209.138.80.28 217.90.242.69 57.218.81.206
84.146.200.197 195.220.39.230 131.231.176.5 253.221.172.144
91.212.251.183 74.44.150.209 244.13.71.56 76.65.144.25
27.70.185.242 128.231.136.126 186.235.61.90 104.44.58.22