必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.81.64.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17954
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;221.81.64.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 22:10:08 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
242.64.81.221.in-addr.arpa domain name pointer softbank221081064242.bbtec.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.64.81.221.in-addr.arpa	name = softbank221081064242.bbtec.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
171.249.216.65 attackbots
1580996510 - 02/06/2020 14:41:50 Host: 171.249.216.65/171.249.216.65 Port: 445 TCP Blocked
2020-02-07 02:29:02
216.218.206.114 attackspambots
3389BruteforceFW22
2020-02-07 02:41:52
46.148.205.2 attackbotsspam
Feb  6 14:54:05 silence02 sshd[23169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.148.205.2
Feb  6 14:54:07 silence02 sshd[23169]: Failed password for invalid user ror from 46.148.205.2 port 47005 ssh2
Feb  6 14:57:09 silence02 sshd[23464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.148.205.2
2020-02-07 02:32:49
156.197.173.82 attackspam
SMB Server BruteForce Attack
2020-02-07 02:13:30
222.186.180.142 attackbots
02/06/2020-13:20:17.367818 222.186.180.142 Protocol: 6 ET SCAN Potential SSH Scan
2020-02-07 02:30:43
132.232.108.149 attackbotsspam
2020-02-06T12:39:00.5710711495-001 sshd[52742]: Invalid user zfj from 132.232.108.149 port 42098
2020-02-06T12:39:00.5746761495-001 sshd[52742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.108.149
2020-02-06T12:39:00.5710711495-001 sshd[52742]: Invalid user zfj from 132.232.108.149 port 42098
2020-02-06T12:39:02.9013521495-001 sshd[52742]: Failed password for invalid user zfj from 132.232.108.149 port 42098 ssh2
2020-02-06T12:43:07.3734471495-001 sshd[53008]: Invalid user fcc from 132.232.108.149 port 54391
2020-02-06T12:43:07.3814031495-001 sshd[53008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.108.149
2020-02-06T12:43:07.3734471495-001 sshd[53008]: Invalid user fcc from 132.232.108.149 port 54391
2020-02-06T12:43:09.2818651495-001 sshd[53008]: Failed password for invalid user fcc from 132.232.108.149 port 54391 ssh2
2020-02-06T12:47:17.1834251495-001 sshd[53262]: Invalid user ukm
...
2020-02-07 02:19:50
23.30.36.85 attackbots
Feb  6 14:40:26 vserver sshd\[19950\]: Invalid user admin from 23.30.36.85Feb  6 14:40:28 vserver sshd\[19950\]: Failed password for invalid user admin from 23.30.36.85 port 55035 ssh2Feb  6 14:41:28 vserver sshd\[19958\]: Invalid user ubuntu from 23.30.36.85Feb  6 14:41:30 vserver sshd\[19958\]: Failed password for invalid user ubuntu from 23.30.36.85 port 55167 ssh2
...
2020-02-07 02:45:07
216.117.141.33 attack
Feb  6 14:22:42 mxgate1 postfix/postscreen[3583]: CONNECT from [216.117.141.33]:38242 to [176.31.12.44]:25
Feb  6 14:22:42 mxgate1 postfix/dnsblog[3978]: addr 216.117.141.33 listed by domain zen.spamhaus.org as 127.0.0.3
Feb  6 14:22:48 mxgate1 postfix/postscreen[3583]: DNSBL rank 2 for [216.117.141.33]:38242
Feb  6 14:22:48 mxgate1 postfix/tlsproxy[4095]: CONNECT from [216.117.141.33]:38242
Feb x@x
Feb  6 14:22:48 mxgate1 postfix/postscreen[3583]: DISCONNECT [216.117.141.33]:38242
Feb  6 14:22:48 mxgate1 postfix/tlsproxy[4095]: DISCONNECT [216.117.141.33]:38242


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=216.117.141.33
2020-02-07 02:08:42
66.70.188.152 attackbots
port scan and connect, tcp 8080 (http-proxy)
2020-02-07 02:27:47
197.250.128.34 attackspam
Feb  6 10:41:51 firewall sshd[18901]: Failed password for root from 197.250.128.34 port 23466 ssh2
Feb  6 10:41:54 firewall sshd[18905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.250.128.34  user=root
Feb  6 10:41:57 firewall sshd[18905]: Failed password for root from 197.250.128.34 port 19141 ssh2
...
2020-02-07 02:21:04
79.194.201.238 attack
Feb  6 16:05:08 www sshd\[71852\]: Invalid user qeb from 79.194.201.238
Feb  6 16:05:08 www sshd\[71852\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.194.201.238
Feb  6 16:05:10 www sshd\[71852\]: Failed password for invalid user qeb from 79.194.201.238 port 39230 ssh2
...
2020-02-07 02:36:49
41.143.132.23 attack
trying to access non-authorized port
2020-02-07 02:44:21
180.247.223.184 attackspambots
20/2/6@08:41:33: FAIL: Alarm-Network address from=180.247.223.184
...
2020-02-07 02:40:50
185.36.81.51 attackbots
Rude login attack (6 tries in 1d)
2020-02-07 02:16:24
188.36.146.149 attack
Brute force SMTP login attempted.
...
2020-02-07 02:31:02

最近上报的IP列表

227.138.41.164 247.73.65.84 141.103.73.62 230.45.94.251
128.84.36.167 119.118.168.232 185.24.141.224 115.247.161.186
95.16.239.114 208.27.49.56 15.36.32.116 159.185.247.123
50.4.201.62 47.250.147.140 49.239.133.42 59.64.194.132
119.191.94.244 51.132.75.100 149.253.6.78 84.202.59.127