必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.121.193.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56306
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.121.193.1.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 13:40:56 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 1.193.121.242.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 1.193.121.242.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
60.250.23.105 attackbotsspam
Oct 18 07:53:15 localhost sshd\[9071\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.250.23.105  user=root
Oct 18 07:53:17 localhost sshd\[9071\]: Failed password for root from 60.250.23.105 port 50712 ssh2
Oct 18 07:56:57 localhost sshd\[9435\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.250.23.105  user=root
2019-10-18 14:18:00
2.95.39.10 attackspambots
Oct 18 05:42:47 toyboy sshd[31686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.95.39.10  user=r.r
Oct 18 05:42:49 toyboy sshd[31686]: Failed password for r.r from 2.95.39.10 port 44673 ssh2
Oct 18 05:42:51 toyboy sshd[31686]: Failed password for r.r from 2.95.39.10 port 44673 ssh2
Oct 18 05:42:54 toyboy sshd[31686]: Failed password for r.r from 2.95.39.10 port 44673 ssh2
Oct 18 05:42:57 toyboy sshd[31686]: Failed password for r.r from 2.95.39.10 port 44673 ssh2
Oct 18 05:42:59 toyboy sshd[31686]: Failed password for r.r from 2.95.39.10 port 44673 ssh2
Oct 18 05:43:01 toyboy sshd[31686]: Failed password for r.r from 2.95.39.10 port 44673 ssh2
Oct 18 05:43:01 toyboy sshd[31686]: Disconnecting: Too many authentication failures for r.r from 2.95.39.10 port 44673 ssh2 [preauth]
Oct 18 05:43:01 toyboy sshd[31686]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.95.39.10  user=r.r


........
----------------------------------------------
2019-10-18 14:46:26
58.47.177.158 attackbots
Oct 17 20:45:10 php1 sshd\[12284\]: Invalid user jesse from 58.47.177.158
Oct 17 20:45:10 php1 sshd\[12284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.47.177.158
Oct 17 20:45:12 php1 sshd\[12284\]: Failed password for invalid user jesse from 58.47.177.158 port 58361 ssh2
Oct 17 20:49:36 php1 sshd\[12730\]: Invalid user sp from 58.47.177.158
Oct 17 20:49:36 php1 sshd\[12730\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.47.177.158
2019-10-18 14:52:02
172.69.33.199 attackbotsspam
10/18/2019-05:52:56.449406 172.69.33.199 Protocol: 6 ET POLICY Cleartext WordPress Login
2019-10-18 14:44:40
51.75.133.167 attackspambots
Oct 18 06:08:41 SilenceServices sshd[25665]: Failed password for root from 51.75.133.167 port 56312 ssh2
Oct 18 06:12:28 SilenceServices sshd[26775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.133.167
Oct 18 06:12:30 SilenceServices sshd[26775]: Failed password for invalid user aombeva from 51.75.133.167 port 38560 ssh2
2019-10-18 14:37:13
191.252.184.219 attack
Lines containing failures of 191.252.184.219
Oct 17 14:09:13 nextcloud sshd[7665]: Invalid user user from 191.252.184.219 port 46174
Oct 17 14:09:13 nextcloud sshd[7665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.252.184.219
Oct 17 14:09:15 nextcloud sshd[7665]: Failed password for invalid user user from 191.252.184.219 port 46174 ssh2
Oct 17 14:09:15 nextcloud sshd[7665]: Received disconnect from 191.252.184.219 port 46174:11: Bye Bye [preauth]
Oct 17 14:09:15 nextcloud sshd[7665]: Disconnected from invalid user user 191.252.184.219 port 46174 [preauth]
Oct 17 14:19:34 nextcloud sshd[10482]: Invalid user torgzal from 191.252.184.219 port 48218
Oct 17 14:19:34 nextcloud sshd[10482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.252.184.219
Oct 17 14:19:37 nextcloud sshd[10482]: Failed password for invalid user torgzal from 191.252.184.219 port 48218 ssh2
Oct 17 14:19:37 nextcl........
------------------------------
2019-10-18 14:46:47
216.239.90.19 attackbotsspam
Automatic report - Banned IP Access
2019-10-18 14:31:13
67.174.104.7 attackspam
Oct 18 08:18:25 dedicated sshd[25581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.174.104.7  user=root
Oct 18 08:18:27 dedicated sshd[25581]: Failed password for root from 67.174.104.7 port 35338 ssh2
2019-10-18 14:30:47
132.232.18.128 attack
2019-10-18T07:37:35.825257lon01.zurich-datacenter.net sshd\[21488\]: Invalid user archana from 132.232.18.128 port 49994
2019-10-18T07:37:35.833457lon01.zurich-datacenter.net sshd\[21488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.18.128
2019-10-18T07:37:37.995684lon01.zurich-datacenter.net sshd\[21488\]: Failed password for invalid user archana from 132.232.18.128 port 49994 ssh2
2019-10-18T07:42:10.791255lon01.zurich-datacenter.net sshd\[21586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.18.128  user=root
2019-10-18T07:42:13.038873lon01.zurich-datacenter.net sshd\[21586\]: Failed password for root from 132.232.18.128 port 58936 ssh2
...
2019-10-18 14:39:13
167.114.157.86 attackbotsspam
Invalid user cxf from 167.114.157.86 port 43007
2019-10-18 14:49:11
123.207.123.252 attackspam
$f2bV_matches
2019-10-18 14:40:52
103.60.126.65 attackbots
Oct 17 20:35:27 php1 sshd\[3525\]: Invalid user jobs from 103.60.126.65
Oct 17 20:35:27 php1 sshd\[3525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.60.126.65
Oct 17 20:35:29 php1 sshd\[3525\]: Failed password for invalid user jobs from 103.60.126.65 port 21972 ssh2
Oct 17 20:40:17 php1 sshd\[4012\]: Invalid user welcome from 103.60.126.65
Oct 17 20:40:17 php1 sshd\[4012\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.60.126.65
2019-10-18 14:50:04
218.29.42.220 attackbotsspam
2019-10-18T06:36:53.579456abusebot-5.cloudsearch.cf sshd\[16335\]: Invalid user swsgest from 218.29.42.220 port 41287
2019-10-18 14:44:12
106.13.53.173 attackbotsspam
Oct 18 07:54:35 markkoudstaal sshd[22321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.53.173
Oct 18 07:54:37 markkoudstaal sshd[22321]: Failed password for invalid user osql from 106.13.53.173 port 34096 ssh2
Oct 18 07:59:56 markkoudstaal sshd[22823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.53.173
2019-10-18 14:17:47
72.167.190.198 attackbots
xmlrpc attack
2019-10-18 14:23:42

最近上报的IP列表

167.116.15.175 154.143.255.250 8.132.36.210 214.93.83.72
199.226.136.17 208.213.135.83 22.132.114.185 165.57.131.165
78.249.103.197 155.180.102.217 234.158.82.170 235.21.252.234
221.117.161.188 242.239.169.240 55.158.134.27 122.64.34.218
57.72.156.101 244.212.239.207 196.135.20.105 158.126.62.112