必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 22.42.249.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61938
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;22.42.249.103.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 18:56:53 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 103.249.42.22.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 103.249.42.22.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.142.186.181 attackspambots
2020-01-08T22:40:53.452222shield sshd\[25666\]: Invalid user system from 14.142.186.181 port 58670
2020-01-08T22:40:53.457602shield sshd\[25666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.186.181
2020-01-08T22:40:55.808183shield sshd\[25666\]: Failed password for invalid user system from 14.142.186.181 port 58670 ssh2
2020-01-08T22:45:05.805407shield sshd\[28089\]: Invalid user icinga from 14.142.186.181 port 38274
2020-01-08T22:45:05.811285shield sshd\[28089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.186.181
2020-01-09 07:34:27
89.136.33.247 attack
SSH-bruteforce attempts
2020-01-09 07:33:02
218.92.0.191 attackbotsspam
Jan  9 00:30:44 dcd-gentoo sshd[29718]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Jan  9 00:30:46 dcd-gentoo sshd[29718]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Jan  9 00:30:44 dcd-gentoo sshd[29718]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Jan  9 00:30:46 dcd-gentoo sshd[29718]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Jan  9 00:30:44 dcd-gentoo sshd[29718]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Jan  9 00:30:46 dcd-gentoo sshd[29718]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Jan  9 00:30:46 dcd-gentoo sshd[29718]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.191 port 58032 ssh2
...
2020-01-09 07:44:05
120.92.153.47 attackspambots
Fail2Ban - SMTP Bruteforce Attempt
2020-01-09 07:34:43
201.157.194.106 attackbots
Jan  6 04:54:21 vegas sshd[1137]: Invalid user userftp from 201.157.194.106 port 58945
Jan  6 04:54:21 vegas sshd[1137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.157.194.106
Jan  6 04:54:22 vegas sshd[1137]: Failed password for invalid user userftp from 201.157.194.106 port 58945 ssh2
Jan  6 05:18:37 vegas sshd[6269]: Invalid user voiceforwildlife from 201.157.194.106 port 36491
Jan  6 05:18:37 vegas sshd[6269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.157.194.106

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=201.157.194.106
2020-01-09 07:36:27
222.186.180.17 attack
Jan  9 00:58:48 localhost sshd\[26166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
Jan  9 00:58:50 localhost sshd\[26166\]: Failed password for root from 222.186.180.17 port 56460 ssh2
Jan  9 00:58:53 localhost sshd\[26166\]: Failed password for root from 222.186.180.17 port 56460 ssh2
2020-01-09 08:03:02
157.230.128.195 attackspambots
firewall-block, port(s): 10573/tcp
2020-01-09 07:36:41
185.175.93.18 attack
Portscan or hack attempt detected by psad/fwsnort
2020-01-09 07:55:34
80.82.65.74 attackbotsspam
Multiport scan : 6 ports scanned 3309 4001 5000 8080 8291 14153
2020-01-09 07:49:18
193.254.35.138 attackbotsspam
Jan  8 14:44:54 woof sshd[10214]: Invalid user oj from 193.254.35.138
Jan  8 14:44:54 woof sshd[10214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.254.35.138
Jan  8 14:44:56 woof sshd[10214]: Failed password for invalid user oj from 193.254.35.138 port 49156 ssh2
Jan  8 14:44:57 woof sshd[10214]: Received disconnect from 193.254.35.138: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=193.254.35.138
2020-01-09 07:40:10
223.75.33.155 attack
Unauthorised access (Jan  8) SRC=223.75.33.155 LEN=40 TOS=0x04 TTL=51 ID=14325 TCP DPT=8080 WINDOW=1312 SYN 
Unauthorised access (Jan  7) SRC=223.75.33.155 LEN=40 TOS=0x04 TTL=49 ID=27587 TCP DPT=8080 WINDOW=1312 SYN 
Unauthorised access (Jan  6) SRC=223.75.33.155 LEN=40 TOS=0x04 TTL=49 ID=37936 TCP DPT=8080 WINDOW=1312 SYN
2020-01-09 07:46:57
31.222.195.30 attackbotsspam
Jan  8 23:44:57 [host] sshd[21451]: Invalid user server02 from 31.222.195.30
Jan  8 23:44:57 [host] sshd[21451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.222.195.30
Jan  8 23:44:59 [host] sshd[21451]: Failed password for invalid user server02 from 31.222.195.30 port 19732 ssh2
2020-01-09 08:07:11
88.228.146.176 attackspam
" "
2020-01-09 07:34:09
156.19.42.138 attackbotsspam
20/1/8@16:08:47: FAIL: Alarm-Network address from=156.19.42.138
...
2020-01-09 07:37:54
188.166.165.100 attack
Jan  8 12:10:47 web9 sshd\[12572\]: Invalid user wsn from 188.166.165.100
Jan  8 12:10:47 web9 sshd\[12572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.165.100
Jan  8 12:10:49 web9 sshd\[12572\]: Failed password for invalid user wsn from 188.166.165.100 port 46788 ssh2
Jan  8 12:13:41 web9 sshd\[13112\]: Invalid user webmin from 188.166.165.100
Jan  8 12:13:41 web9 sshd\[13112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.165.100
2020-01-09 07:30:59

最近上报的IP列表

162.212.248.77 37.80.9.191 76.96.22.135 163.14.80.28
200.15.217.67 185.231.175.179 49.98.191.9 121.73.58.170
214.3.44.36 31.223.173.103 140.43.191.181 251.73.89.47
84.165.142.58 74.253.79.91 94.56.198.212 247.3.119.120
66.38.8.105 21.227.247.111 143.60.239.34 59.219.98.42