必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 241.239.42.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25311
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;241.239.42.157.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 13:39:07 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 157.42.239.241.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 157.42.239.241.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.240.130.106 attackspambots
May 27 05:45:14 v22019038103785759 sshd\[31284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.240.130.106  user=root
May 27 05:45:16 v22019038103785759 sshd\[31284\]: Failed password for root from 218.240.130.106 port 53155 ssh2
May 27 05:48:38 v22019038103785759 sshd\[31440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.240.130.106  user=root
May 27 05:48:40 v22019038103785759 sshd\[31440\]: Failed password for root from 218.240.130.106 port 48374 ssh2
May 27 05:52:03 v22019038103785759 sshd\[31615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.240.130.106  user=root
...
2020-05-27 16:37:56
137.74.206.80 attackspam
137.74.206.80 - - [27/May/2020:05:51:58 +0200] "POST /wp-login.php HTTP/1.1" 200 3432 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
137.74.206.80 - - [27/May/2020:05:51:58 +0200] "POST /wp-login.php HTTP/1.1" 200 3411 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-05-27 16:41:43
140.143.238.46 attack
2020-05-27T03:12:52.549995morrigan.ad5gb.com sshd[19014]: Failed password for root from 140.143.238.46 port 55782 ssh2
2020-05-27T03:12:53.546963morrigan.ad5gb.com sshd[19014]: Disconnected from authenticating user root 140.143.238.46 port 55782 [preauth]
2020-05-27T03:18:58.601587morrigan.ad5gb.com sshd[20676]: Invalid user radu from 140.143.238.46 port 53148
2020-05-27 16:41:11
58.215.75.147 attackbots
[portscan] tcp/1433 [MsSQL]
[scan/connect: 2 time(s)]
*(RWIN=8192)(05271018)
2020-05-27 16:25:16
81.177.174.59 attackbots
WebFormToEmail Comment SPAM
2020-05-27 16:26:06
124.239.149.193 attackspambots
Failed password for invalid user alexis from 124.239.149.193 port 37837 ssh2
2020-05-27 16:16:07
139.59.10.186 attackbotsspam
May 27 06:52:41 h1745522 sshd[12370]: Invalid user hals from 139.59.10.186 port 47646
May 27 06:52:41 h1745522 sshd[12370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.10.186
May 27 06:52:41 h1745522 sshd[12370]: Invalid user hals from 139.59.10.186 port 47646
May 27 06:52:43 h1745522 sshd[12370]: Failed password for invalid user hals from 139.59.10.186 port 47646 ssh2
May 27 06:56:47 h1745522 sshd[12542]: Invalid user xena from 139.59.10.186 port 53110
May 27 06:56:47 h1745522 sshd[12542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.10.186
May 27 06:56:47 h1745522 sshd[12542]: Invalid user xena from 139.59.10.186 port 53110
May 27 06:56:49 h1745522 sshd[12542]: Failed password for invalid user xena from 139.59.10.186 port 53110 ssh2
May 27 07:00:42 h1745522 sshd[12674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.10.186  user=root
May
...
2020-05-27 16:12:24
220.123.241.30 attack
Bruteforce detected by fail2ban
2020-05-27 15:59:32
106.12.88.232 attackspambots
May 27 09:25:53 Ubuntu-1404-trusty-64-minimal sshd\[30238\]: Invalid user nurishah from 106.12.88.232
May 27 09:25:53 Ubuntu-1404-trusty-64-minimal sshd\[30238\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.88.232
May 27 09:25:55 Ubuntu-1404-trusty-64-minimal sshd\[30238\]: Failed password for invalid user nurishah from 106.12.88.232 port 41888 ssh2
May 27 09:34:02 Ubuntu-1404-trusty-64-minimal sshd\[8367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.88.232  user=root
May 27 09:34:03 Ubuntu-1404-trusty-64-minimal sshd\[8367\]: Failed password for root from 106.12.88.232 port 33466 ssh2
2020-05-27 16:17:00
118.189.74.228 attackspam
2020-05-27 07:55:24,502 fail2ban.actions        [937]: NOTICE  [sshd] Ban 118.189.74.228
2020-05-27 08:30:27,589 fail2ban.actions        [937]: NOTICE  [sshd] Ban 118.189.74.228
2020-05-27 09:08:08,696 fail2ban.actions        [937]: NOTICE  [sshd] Ban 118.189.74.228
2020-05-27 09:47:12,122 fail2ban.actions        [937]: NOTICE  [sshd] Ban 118.189.74.228
2020-05-27 10:23:11,722 fail2ban.actions        [937]: NOTICE  [sshd] Ban 118.189.74.228
...
2020-05-27 16:23:26
39.59.64.169 attack
IP 39.59.64.169 attacked honeypot on port: 8080 at 5/27/2020 4:52:50 AM
2020-05-27 16:03:05
115.79.75.190 attackspam
VN_MAINT-VN-VNNIC_<177>1590551530 [1:2010935:3] ET SCAN Suspicious inbound to MSSQL port 1433 [Classification: Potentially Bad Traffic] [Priority: 2]:  {TCP} 115.79.75.190:43664
2020-05-27 16:32:04
218.250.168.47 attackspam
Port probing on unauthorized port 5555
2020-05-27 16:23:45
222.186.30.218 attack
May 27 09:56:49 abendstille sshd\[30017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.218  user=root
May 27 09:56:51 abendstille sshd\[30017\]: Failed password for root from 222.186.30.218 port 42169 ssh2
May 27 09:56:54 abendstille sshd\[30017\]: Failed password for root from 222.186.30.218 port 42169 ssh2
May 27 09:56:56 abendstille sshd\[30017\]: Failed password for root from 222.186.30.218 port 42169 ssh2
May 27 09:56:58 abendstille sshd\[30209\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.218  user=root
...
2020-05-27 15:58:27
195.54.167.47 attackspambots
firewall-block, port(s): 8497/tcp
2020-05-27 16:11:37

最近上报的IP列表

186.23.148.200 5.231.148.55 107.77.29.161 196.38.245.78
12.112.176.206 195.243.12.176 117.13.205.170 64.70.207.9
225.139.119.46 161.66.119.87 174.21.222.56 2.219.135.91
194.231.177.143 164.210.192.245 17.74.150.9 115.22.234.165
211.73.240.3 127.221.8.199 248.45.69.135 132.190.194.111