必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.146.113.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57553
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.146.113.67.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031200 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 12 18:21:23 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 67.113.146.242.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 67.113.146.242.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.51.142.251 attackspam
SSH/22 MH Probe, BF, Hack -
2019-12-30 21:15:45
152.115.62.241 attackspambots
19/12/30@01:21:17: FAIL: Alarm-Intrusion address from=152.115.62.241
...
2019-12-30 21:15:23
179.232.1.252 attackspambots
Dec 30 04:07:14 plusreed sshd[24717]: Invalid user danagher from 179.232.1.252
...
2019-12-30 21:27:48
123.20.244.61 attackbotsspam
Lines containing failures of 123.20.244.61
Dec 30 07:20:18 MAKserver05 sshd[24868]: Invalid user admin from 123.20.244.61 port 48307
Dec 30 07:20:19 MAKserver05 sshd[24868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.20.244.61 
Dec 30 07:20:20 MAKserver05 sshd[24868]: Failed password for invalid user admin from 123.20.244.61 port 48307 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=123.20.244.61
2019-12-30 20:53:47
115.94.204.156 attack
Dec 30 13:52:57 mout sshd[5746]: Invalid user server from 115.94.204.156 port 47586
2019-12-30 21:06:26
154.120.226.102 attackspam
Dec 30 08:48:10 lnxded64 sshd[18298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.120.226.102
2019-12-30 21:26:39
193.227.16.92 attackspam
20 attempts against mh-misbehave-ban on ice.magehost.pro
2019-12-30 21:14:50
107.152.174.115 attack
(From EdFrez689@gmail.com) Hi!

Do you know that there are modern features that can be integrated to your website to help it run the business with ease for both your company and your clients? I'm quite sure you've thought about making some improvements on how your site looks, but did you know that not only can you make it look better, but you can also make it more user-friendly so that your can attract more clients. I was just looking at your website and I thought I'd share some of my ideas with you. 

I am a professional web designer that is dedicated to helping businesses grow. We do this by making sure that your website is the best that it can be in terms of aesthetics, functionality, and reliability in handling your business online. I can give you plenty of information and examples of what we've done for other clients and what the results have been. The freelance work I do is done locally and is never outsourced.

I'll be glad to give you more information about the redesign at a time that's best for
2019-12-30 20:55:33
128.199.235.18 attack
Dec 30 06:15:43 nxxxxxxx sshd[23688]: Invalid user wwwrun from 128.199.235.18
Dec 30 06:15:43 nxxxxxxx sshd[23688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.235.18 
Dec 30 06:15:44 nxxxxxxx sshd[23688]: Failed password for invalid user wwwrun from 128.199.235.18 port 39704 ssh2
Dec 30 06:15:44 nxxxxxxx sshd[23688]: Received disconnect from 128.199.235.18: 11: Bye Bye [preauth]
Dec 30 06:30:22 nxxxxxxx sshd[25580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.235.18  user=r.r
Dec 30 06:30:24 nxxxxxxx sshd[25580]: Failed password for r.r from 128.199.235.18 port 38630 ssh2
Dec 30 06:30:25 nxxxxxxx sshd[25580]: Received disconnect from 128.199.235.18: 11: Bye Bye [preauth]
Dec 30 06:33:28 nxxxxxxx sshd[25924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.235.18  user=r.r
Dec 30 06:33:30 nxxxxxxx sshd[25924]: Failed pas........
-------------------------------
2019-12-30 21:30:07
123.16.140.50 attackbotsspam
Lines containing failures of 123.16.140.50
Dec 30 07:21:01 MAKserver05 sshd[24956]: Invalid user admin from 123.16.140.50 port 52673
Dec 30 07:21:02 MAKserver05 sshd[24956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.16.140.50 
Dec 30 07:21:04 MAKserver05 sshd[24956]: Failed password for invalid user admin from 123.16.140.50 port 52673 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=123.16.140.50
2019-12-30 20:55:11
27.78.14.83 attack
$f2bV_matches
2019-12-30 21:08:12
171.241.157.187 attack
1577686847 - 12/30/2019 07:20:47 Host: 171.241.157.187/171.241.157.187 Port: 445 TCP Blocked
2019-12-30 21:31:06
162.144.158.101 attack
2019-12-30 21:33:09
90.52.46.169 attackspam
Unauthorized connection attempt detected from IP address 90.52.46.169 to port 22
2019-12-30 21:21:19
117.54.226.50 attackbots
Unauthorized connection attempt detected from IP address 117.54.226.50 to port 1433
2019-12-30 21:10:09

最近上报的IP列表

189.48.110.237 171.118.62.243 178.29.213.179 18.183.54.95
44.125.170.69 247.198.23.239 34.84.72.70 57.249.252.204
101.70.248.81 78.153.136.108 147.70.52.214 142.45.43.65
123.40.128.249 203.237.78.186 219.11.170.172 243.90.23.251
182.167.112.37 43.80.33.103 84.129.72.250 24.218.152.253